Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ssd.exe

Overview

General Information

Sample name:ssd.exe
Analysis ID:1577133
MD5:25faaf0547ddfa428eebeb9f294a543d
SHA1:ce2e4895d420c6b978242a599c0ab342f91766cb
SHA256:c620d711c48043d706ee5bc200e6087db4b9d46b854ad8d8eb8ba47c9c770662
Tags:exeuser-mamrmtsh
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Found API chain indicative of sandbox detection
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ssd.exe (PID: 7024 cmdline: "C:\Users\user\Desktop\ssd.exe" MD5: 25FAAF0547DDFA428EEBEB9F294A543D)
    • RegSvcs.exe (PID: 7136 cmdline: "C:\Users\user\Desktop\ssd.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.pgsu.co.id", "Username": "joko.wahyono@pgsu.co.id", "Password": "Vecls16@Vezs           "}
SourceRuleDescriptionAuthorStrings
00000001.00000002.4173195807.0000000002A09000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.4172227410.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000002.4172227410.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1726252699.0000000003680000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.ssd.exe.3680000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.ssd.exe.3680000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    1.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                    • 0x334d7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                    • 0x33549:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                    • 0x335d3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                    • 0x33665:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                    • 0x336cf:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                    • 0x33741:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                    • 0x337d7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                    • 0x33867:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                    Click to see the 4 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 107.178.108.41, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7136, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 1.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.pgsu.co.id", "Username": "joko.wahyono@pgsu.co.id", "Password": "Vecls16@Vezs "}
                    Source: ssd.exeVirustotal: Detection: 25%Perma Link
                    Source: ssd.exeReversingLabs: Detection: 47%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: ssd.exeJoe Sandbox ML: detected
                    Source: ssd.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: Binary string: wntdll.pdbUGP source: ssd.exe, 00000000.00000003.1723560778.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, ssd.exe, 00000000.00000003.1723978034.0000000003700000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: ssd.exe, 00000000.00000003.1723560778.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, ssd.exe, 00000000.00000003.1723978034.0000000003700000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007FDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_007FDBBE
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_008068EE FindFirstFileW,FindClose,0_2_008068EE
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0080698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0080698F
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007FD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD076
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007FD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD3A9
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00809642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00809642
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0080979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0080979D
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00809B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00809B2B
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00805C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00805C97
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 107.178.108.41:587
                    Source: Joe Sandbox ViewIP Address: 107.178.108.41 107.178.108.41
                    Source: Joe Sandbox ViewASN Name: IOFLOODUS IOFLOODUS
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 107.178.108.41:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0080CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0080CE44
                    Source: global trafficDNS traffic detected: DNS query: mail.pgsu.co.id
                    Source: RegSvcs.exe, 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.pgsu.co.id
                    Source: RegSvcs.exe, 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pgsu.co.id
                    Source: RegSvcs.exe, 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172556761.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174617727.0000000005CB0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172556761.0000000000C5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
                    Source: RegSvcs.exe, 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172556761.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174617727.0000000005CB0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172556761.0000000000C5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                    Source: RegSvcs.exe, 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172556761.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174617727.0000000005CB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: RegSvcs.exe, 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172556761.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174617727.0000000005CB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: ssd.exe, 00000000.00000002.1726252699.0000000003680000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172227410.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.ssd.exe.3680000.1.raw.unpack, cPKWk.cs.Net Code: gdCwU6rsZ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0080EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0080EAFF
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0080ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0080ED6A
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0080EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0080EAFF
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007FAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_007FAA57
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00829576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00829576

                    System Summary

                    barindex
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.ssd.exe.3680000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.ssd.exe.3680000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1726252699.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: ssd.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: ssd.exe, 00000000.00000000.1698277177.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f02efb90-a
                    Source: ssd.exe, 00000000.00000000.1698277177.0000000000852000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_71c9f74b-a
                    Source: ssd.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7279f5e8-1
                    Source: ssd.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e0fa8b94-6
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007FD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_007FD5EB
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007F1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_007F1201
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007FE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007FE8F6
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007980600_2_00798060
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_008020460_2_00802046
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007F82980_2_007F8298
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007CE4FF0_2_007CE4FF
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007C676B0_2_007C676B
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_008248730_2_00824873
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0079CAF00_2_0079CAF0
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007BCAA00_2_007BCAA0
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007ACC390_2_007ACC39
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007C6DD90_2_007C6DD9
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007AB1190_2_007AB119
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007991C00_2_007991C0
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B13940_2_007B1394
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B17060_2_007B1706
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B781B0_2_007B781B
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007A997D0_2_007A997D
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007979200_2_00797920
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B19B00_2_007B19B0
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B7A4A0_2_007B7A4A
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B1C770_2_007B1C77
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B7CA70_2_007B7CA7
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007C9EEE0_2_007C9EEE
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0081BE440_2_0081BE44
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B1F320_2_007B1F32
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00FC3F500_2_00FC3F50
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00FD93801_2_00FD9380
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00FD4AA01_2_00FD4AA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00FD9B481_2_00FD9B48
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00FDCDC81_2_00FDCDC8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00FD3E881_2_00FD3E88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00FD41D01_2_00FD41D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00FDF4C01_2_00FDF4C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E0DD001_2_05E0DD00
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E0BCF81_2_05E0BCF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E03F401_2_05E03F40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E056C81_2_05E056C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E08E2F1_2_05E08E2F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E000401_2_05E00040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E02AF01_2_05E02AF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E04FE81_2_05E04FE8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E032381_2_05E03238
                    Source: C:\Users\user\Desktop\ssd.exeCode function: String function: 007AF9F2 appears 31 times
                    Source: C:\Users\user\Desktop\ssd.exeCode function: String function: 007B0A30 appears 46 times
                    Source: ssd.exe, 00000000.00000002.1726252699.0000000003680000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef1a08a05-b195-4d04-8a01-a86b7545550f.exe4 vs ssd.exe
                    Source: ssd.exe, 00000000.00000003.1722082888.00000000037E3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ssd.exe
                    Source: ssd.exe, 00000000.00000003.1723560778.00000000039CD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ssd.exe
                    Source: ssd.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.ssd.exe.3680000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.ssd.exe.3680000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1726252699.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.ssd.exe.3680000.1.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ssd.exe.3680000.1.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ssd.exe.3680000.1.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ssd.exe.3680000.1.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.ssd.exe.3680000.1.raw.unpack, 6oQOw74dfIt.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ssd.exe.3680000.1.raw.unpack, aMIWm.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.ssd.exe.3680000.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ssd.exe.3680000.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@3/1
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_008037B5 GetLastError,FormatMessageW,0_2_008037B5
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007F10BF AdjustTokenPrivileges,CloseHandle,0_2_007F10BF
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007F16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007F16C3
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_008051CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_008051CD
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0081A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0081A67C
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0080648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0080648E
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007942A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_007942A2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\ssd.exeFile created: C:\Users\user\AppData\Local\Temp\aut8611.tmpJump to behavior
                    Source: ssd.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: ssd.exeVirustotal: Detection: 25%
                    Source: ssd.exeReversingLabs: Detection: 47%
                    Source: unknownProcess created: C:\Users\user\Desktop\ssd.exe "C:\Users\user\Desktop\ssd.exe"
                    Source: C:\Users\user\Desktop\ssd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ssd.exe"
                    Source: C:\Users\user\Desktop\ssd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ssd.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: ssd.exeStatic file information: File size 1177600 > 1048576
                    Source: ssd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: ssd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: ssd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: ssd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: ssd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: ssd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: ssd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: ssd.exe, 00000000.00000003.1723560778.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, ssd.exe, 00000000.00000003.1723978034.0000000003700000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: ssd.exe, 00000000.00000003.1723560778.00000000038A0000.00000004.00001000.00020000.00000000.sdmp, ssd.exe, 00000000.00000003.1723978034.0000000003700000.00000004.00001000.00020000.00000000.sdmp
                    Source: ssd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: ssd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: ssd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: ssd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: ssd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B0A76 push ecx; ret 0_2_007B0A89
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05E03AD7 push ebx; retf 1_2_05E03ADA
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007AF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007AF98E
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00821C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00821C41
                    Source: C:\Users\user\Desktop\ssd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\ssd.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97004
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\ssd.exeAPI/Special instruction interceptor: Address: FC3B74
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7628Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2181Jump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeAPI coverage: 4.0 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007FDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_007FDBBE
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_008068EE FindFirstFileW,FindClose,0_2_008068EE
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0080698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0080698F
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007FD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD076
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007FD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007FD3A9
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00809642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00809642
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0080979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0080979D
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00809B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00809B2B
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00805C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00805C97
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99438Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99203Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99094Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98969Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98841Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98726Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98617Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98439Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97719Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96094Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95969Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 93985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 93860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 93735Jump to behavior
                    Source: RegSvcs.exe, 00000001.00000002.4174617727.0000000005CB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_0080EAA2 BlockInput,0_2_0080EAA2
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007C2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007C2622
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B4CE8 mov eax, dword ptr fs:[00000030h]0_2_007B4CE8
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00FC2790 mov eax, dword ptr fs:[00000030h]0_2_00FC2790
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00FC3DE0 mov eax, dword ptr fs:[00000030h]0_2_00FC3DE0
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00FC3E40 mov eax, dword ptr fs:[00000030h]0_2_00FC3E40
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007F0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_007F0B62
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007C2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007C2622
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007B083F
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B09D5 SetUnhandledExceptionFilter,0_2_007B09D5
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_007B0C21
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\ssd.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 850008Jump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007F1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_007F1201
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007D2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_007D2BA5
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007FB226 SendInput,keybd_event,0_2_007FB226
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_008122DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_008122DA
                    Source: C:\Users\user\Desktop\ssd.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\ssd.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007F0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_007F0B62
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007F1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_007F1663
                    Source: ssd.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: ssd.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007B0698 cpuid 0_2_007B0698
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00808195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00808195
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007ED27A GetUserNameW,0_2_007ED27A
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007CBB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_007CBB6F
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_007942DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007942DE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ssd.exe.3680000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ssd.exe.3680000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.4173195807.0000000002A09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4172227410.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726252699.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4173195807.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ssd.exe PID: 7024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7136, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: ssd.exeBinary or memory string: WIN_81
                    Source: ssd.exeBinary or memory string: WIN_XP
                    Source: ssd.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                    Source: ssd.exeBinary or memory string: WIN_XPe
                    Source: ssd.exeBinary or memory string: WIN_VISTA
                    Source: ssd.exeBinary or memory string: WIN_7
                    Source: ssd.exeBinary or memory string: WIN_8
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ssd.exe.3680000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ssd.exe.3680000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.4172227410.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726252699.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4173195807.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ssd.exe PID: 7024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7136, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ssd.exe.3680000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ssd.exe.3680000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.4173195807.0000000002A09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4172227410.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726252699.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4173195807.0000000002991000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ssd.exe PID: 7024, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7136, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00811204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00811204
                    Source: C:\Users\user\Desktop\ssd.exeCode function: 0_2_00811806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00811806
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    221
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS138
                    System Information Discovery
                    Distributed Component Object Model221
                    Input Capture
                    1
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets331
                    Security Software Discovery
                    SSH4
                    Clipboard Data
                    11
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts221
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials221
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    ssd.exe25%VirustotalBrowse
                    ssd.exe47%ReversingLabsWin32.Trojan.AutoitInject
                    ssd.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://mail.pgsu.co.id0%Avira URL Cloudsafe
                    http://r10.o.lencr.org0#0%Avira URL Cloudsafe
                    http://pgsu.co.id0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    pgsu.co.id
                    107.178.108.41
                    truetrue
                      unknown
                      mail.pgsu.co.id
                      unknown
                      unknowntrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://pgsu.co.idRegSvcs.exe, 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://r10.o.lencr.org0#RegSvcs.exe, 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172556761.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174617727.0000000005CB0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172556761.0000000000C5B000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://account.dyn.com/ssd.exe, 00000000.00000002.1726252699.0000000003680000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172227410.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                          high
                          http://mail.pgsu.co.idRegSvcs.exe, 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://x1.c.lencr.org/0RegSvcs.exe, 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172556761.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174617727.0000000005CB0000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://x1.i.lencr.org/0RegSvcs.exe, 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172556761.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174617727.0000000005CB0000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://r10.i.lencr.org/0RegSvcs.exe, 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172556761.0000000000C4A000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4174617727.0000000005CB0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4172556761.0000000000C5B000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                107.178.108.41
                                pgsu.co.idUnited States
                                53755IOFLOODUStrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1577133
                                Start date and time:2024-12-18 06:43:07 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 7m 58s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:6
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:ssd.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@3/2@3/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 49
                                • Number of non-executed functions: 305
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.63
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                TimeTypeDescription
                                00:44:05API Interceptor11950997x Sleep call for process: RegSvcs.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                107.178.108.41newrfq.exeGet hashmaliciousAgentTeslaBrowse
                                  mp.exeGet hashmaliciousAgentTeslaBrowse
                                    ttp.exeGet hashmaliciousAgentTeslaBrowse
                                      06.exeGet hashmaliciousAgentTeslaBrowse
                                        sdfg.exeGet hashmaliciousAgentTeslaBrowse
                                          pmm.exeGet hashmaliciousAgentTeslaBrowse
                                            Q7bAgeTZB8vmku7.exeGet hashmaliciousAgentTeslaBrowse
                                              QcgYuePXfjXfcUD.exeGet hashmaliciousAgentTeslaBrowse
                                                XXKPgtA6DfbWnGL.exeGet hashmaliciousAgentTeslaBrowse
                                                  Q2EoNFhO7QQHxgS.exeGet hashmaliciousAgentTeslaBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    IOFLOODUSSqWzv6g2gV.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    RXnQXC1eJa.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    37O0XUq6Vp.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    tO8laPAv1k.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    nPcYcCBa00.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    JLrciUppSu.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    122046760.batGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    pkqLAMAv96.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    IIC0XbKFjS.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    873406390.batGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    No context
                                                    No context
                                                    Process:C:\Users\user\Desktop\ssd.exe
                                                    File Type:SVr2 curses screen image, big-endian
                                                    Category:dropped
                                                    Size (bytes):240128
                                                    Entropy (8bit):6.736217826096293
                                                    Encrypted:false
                                                    SSDEEP:6144:1DGD3BlYLwLcff/TdUGDBV0nePpfL7M9zH7DMI0sDtUMxb5QJ:y3BliKybdUGDBV0nexL49r7++tfxeJ
                                                    MD5:4634966E7C85316D16A5422DBDAAEE02
                                                    SHA1:CCA402BDBB445C1C55F43B6C2A0422BE9A830697
                                                    SHA-256:66E040957F2F1F35BC92B40204088E16E25DF68A544A611009C8A9CBE4253A0E
                                                    SHA-512:2B21CB66E50D1BD02E0A312E6E979AC040F4651FAB1C04BF9512AF1C8BEE52C1204CF17213D95F23B1E2B971198A8218CF94C334C9D5D8EA265E1C034F01DC19
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:...CA271NH4B..26.NZM1UPCqLAOCB271JH4BDV264NZM1UPC1LAOCB271JH.BDV<).@Z.8.q.0..n.*[D.::[%67_.W/4#^!p!Tl3:-b[Y...gb)9VS.CWG.UPC1LAO..27}KK4r.wT64NZM1UP.1N@DBI27.IH4JDV264ND.2UPc1LA.@B27qJH.BDV064JZM1UPC1HAOCB271JH0BDT264NZM3U..1LQOCR271JX4BTV264NZ]1UPC1LAOCB2..IH{BDV2.7N.H1UPC1LAOCB271JH4BDV.54BZM1UPC1LAOCB271JH4BDV264NZM1UPC1LAOCB271JH4BDV264NZM.UPK1LAOCB271JH<bDVz64NZM1UPC1Lo;&:F71Jl.ADV.64N.N1URC1LAOCB271JH4BdV2V.<)?RUPCwIAOC.171LH4B.U264NZM1UPC1LA.CBr.C/$[!DV>64NZ.2UPA1LA.@B271JH4BDV264.ZMsUPC1LAOCB271JH4BD.164NZMyUPC3LDO..07.zI4ADV274N\M1UPC1LAOCB271JH4BDV264NZM1UPC1LAOCB271JH4BDV264S.......<qI 5.../.A..!..7..>.E.JX...?.....e1P..4.U}..J....6.:2HK......V??T%b".LP.\......>...B8.L...3..>E..h.......xM0.j.:..R:=mP<1#&laVW+:].F.364NZ.......&;.h.2EV.P<....n_I....?OCBV71J:4BD7264.ZM1:PC1"AOC<2714H4B.V26tNZM.UPC.LAO.B27.JH4<DV2.IAU..90..AOCB2...x./...i.y..c!.O.#w...S...nG..=^.9..v..M..*..U`\7i.lEEP636I^N=h^...nAF623ML7NyXy..{...z...>...dK.44BDV26.NZ.1UP.L.OCB.7.J.BDV..4.Z.1...1
                                                    Process:C:\Users\user\Desktop\ssd.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):156798
                                                    Entropy (8bit):7.946494125243928
                                                    Encrypted:false
                                                    SSDEEP:3072:sNNthfQGm3Dm27/GD57q36wVDLJx/50uWaHND4vg3zCr+pnltmIOLIyb9f:ithfP0rh6eFx/mUHlEgjCr+pmiw9f
                                                    MD5:5DD91E16056B4E8DD3B9C4C672F56B61
                                                    SHA1:8714529867D50718DF822832640F2A86DA64A8AE
                                                    SHA-256:7E55F29BFEC93F7498525D294A41E03C4922CE005FD79D0C04B869B805D6E84C
                                                    SHA-512:33425D02970C138A637EB666D1A1ED6CA23DBB20D196E8FA1285690AD4E56A85C2937B51D6B6D6200F7AD0040EB3EC783D6D7E99B3977837B1CA8AE974A7B28B
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:EA06........:..o1.R&.-.e6.S.T.V.C..(4....d....J..m4.....g.@..y).P+_..b...@1...D..U.,.o_.U..I.zCp..-.9..[..a.{=.S9.T.T:..*.....e7...sK...T.d.cN.Q(T...#I.M)@...|.UZ........K.*...}&.i.(.[4..m.(TJ..~&uX..cL...u ...4.U.21].....I.^.8_.....p.@.OJk4..}|.".`.."5Z.,.g.....z.2.w&.Q..Kf..D.D..O.:cU..%.6J....Jg. .".I..0S....2y.....>.B.Fhr.%nCD.O..]h.aA..<...o..Z...+.OL.......:e.....&...&h.,L..Jup.........7....O.4......K.....C..M..).R...V9..D.....3.;,....2U[.G...m7..,..:.R)z..k..U......"..*.......B...E..B.fi../.g..O..\.....E"..&..M.B-\.,.k.N....c#.[,5j..u]...0..Y..`..^_^M;..#S*-Z.P.@3:n..._...}>..~..U.2...A7..! .$.....p....h..@.8K......"..D...}....kI..xx-..a......>..~.KO......r..>/#..>..^...Q....{.9..n...7g..@..[.roi.[(.Z..g6....Ez....m..4.e3..&...b....{.S)z...s...d.......\......o..M..cJ....L.Z.Lz....3/.He.x..Kh.I.....n.Fl.[..#...b.J..U...cS..ht9....F&Sy..$.R)..:.3..j.x.6.O.O. .e.M@.F.Si..yM..jV..2.E..9...*.2...).&WZ..o...*oA.......o3.P....z.N.Q.....'W....n.`..
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):6.849734287180739
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:ssd.exe
                                                    File size:1'177'600 bytes
                                                    MD5:25faaf0547ddfa428eebeb9f294a543d
                                                    SHA1:ce2e4895d420c6b978242a599c0ab342f91766cb
                                                    SHA256:c620d711c48043d706ee5bc200e6087db4b9d46b854ad8d8eb8ba47c9c770662
                                                    SHA512:1fb8cfeeb80a05b205aa5c9e8251a8492f1d54bdd8ae819e9aac459bb5b809da6064d0de27ffc6ee8aa360318676eccdf8282198ac8c9065eb3d7be6a24d72f7
                                                    SSDEEP:24576:YqDEvCTbMWu7rQYlBQcBiT6rprG8aHXzSMGaqMlHB7:YTvC/MTQYxsWR7aH5Gaq
                                                    TLSH:5D45AF0373918022FE97D9331B56E611DBBD6D260123AF5F1B982D7AB9F0061173EA63
                                                    File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                    Icon Hash:0131719696496713
                                                    Entrypoint:0x420577
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x67621757 [Wed Dec 18 00:29:11 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:1
                                                    File Version Major:5
                                                    File Version Minor:1
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:1
                                                    Import Hash:948cc502fe9226992dce9417f952fce3
                                                    Instruction
                                                    call 00007FC95142CCE3h
                                                    jmp 00007FC95142C5EFh
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    push dword ptr [ebp+08h]
                                                    mov esi, ecx
                                                    call 00007FC95142C7CDh
                                                    mov dword ptr [esi], 0049FDF0h
                                                    mov eax, esi
                                                    pop esi
                                                    pop ebp
                                                    retn 0004h
                                                    and dword ptr [ecx+04h], 00000000h
                                                    mov eax, ecx
                                                    and dword ptr [ecx+08h], 00000000h
                                                    mov dword ptr [ecx+04h], 0049FDF8h
                                                    mov dword ptr [ecx], 0049FDF0h
                                                    ret
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    push dword ptr [ebp+08h]
                                                    mov esi, ecx
                                                    call 00007FC95142C79Ah
                                                    mov dword ptr [esi], 0049FE0Ch
                                                    mov eax, esi
                                                    pop esi
                                                    pop ebp
                                                    retn 0004h
                                                    and dword ptr [ecx+04h], 00000000h
                                                    mov eax, ecx
                                                    and dword ptr [ecx+08h], 00000000h
                                                    mov dword ptr [ecx+04h], 0049FE14h
                                                    mov dword ptr [ecx], 0049FE0Ch
                                                    ret
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    mov esi, ecx
                                                    lea eax, dword ptr [esi+04h]
                                                    mov dword ptr [esi], 0049FDD0h
                                                    and dword ptr [eax], 00000000h
                                                    and dword ptr [eax+04h], 00000000h
                                                    push eax
                                                    mov eax, dword ptr [ebp+08h]
                                                    add eax, 04h
                                                    push eax
                                                    call 00007FC95142F38Dh
                                                    pop ecx
                                                    pop ecx
                                                    mov eax, esi
                                                    pop esi
                                                    pop ebp
                                                    retn 0004h
                                                    lea eax, dword ptr [ecx+04h]
                                                    mov dword ptr [ecx], 0049FDD0h
                                                    push eax
                                                    call 00007FC95142F3D8h
                                                    pop ecx
                                                    ret
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    mov esi, ecx
                                                    lea eax, dword ptr [esi+04h]
                                                    mov dword ptr [esi], 0049FDD0h
                                                    push eax
                                                    call 00007FC95142F3C1h
                                                    test byte ptr [ebp+08h], 00000001h
                                                    pop ecx
                                                    Programming Language:
                                                    • [ C ] VS2008 SP1 build 30729
                                                    • [IMP] VS2008 SP1 build 30729
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x48cf4.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x11d0000x7594.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0xd40000x48cf40x48e00c54bc71953a05a029935395250ffe6c0False0.762666836406518data7.181132023276914IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x11d0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0xd44580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                    RT_ICON0xd45800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                    RT_ICON0xd46a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                    RT_ICON0xd47d00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 4838 x 4838 px/mEnglishGreat Britain0.06979770495682007
                                                    RT_MENU0xe4ff80x50dataEnglishGreat Britain0.9
                                                    RT_STRING0xe50480x594dataEnglishGreat Britain0.3333333333333333
                                                    RT_STRING0xe55dc0x68adataEnglishGreat Britain0.2735961768219833
                                                    RT_STRING0xe5c680x490dataEnglishGreat Britain0.3715753424657534
                                                    RT_STRING0xe60f80x5fcdataEnglishGreat Britain0.3087467362924282
                                                    RT_STRING0xe66f40x65cdataEnglishGreat Britain0.34336609336609336
                                                    RT_STRING0xe6d500x466dataEnglishGreat Britain0.3605683836589698
                                                    RT_STRING0xe71b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                    RT_RCDATA0xe73100x354c5data1.0003481304023196
                                                    RT_GROUP_ICON0x11c7d80x14dataEnglishGreat Britain1.25
                                                    RT_GROUP_ICON0x11c7ec0x14dataEnglishGreat Britain1.25
                                                    RT_GROUP_ICON0x11c8000x14dataEnglishGreat Britain1.15
                                                    RT_GROUP_ICON0x11c8140x14dataEnglishGreat Britain1.25
                                                    RT_VERSION0x11c8280xdcdataEnglishGreat Britain0.6181818181818182
                                                    RT_MANIFEST0x11c9040x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                    DLLImport
                                                    WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                    MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                    WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                    PSAPI.DLLGetProcessMemoryInfo
                                                    IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                    USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                    UxTheme.dllIsThemeActive
                                                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                    USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                    GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                    SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                    OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishGreat Britain
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 18, 2024 06:44:08.490076065 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:08.609749079 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:08.610006094 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:09.791816950 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:09.792901039 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:09.912617922 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:10.165899038 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:10.166187048 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:10.286040068 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:10.540127993 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:10.549988031 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:10.669596910 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:10.935507059 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:10.935559034 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:10.935595989 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:10.935724974 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:10.979847908 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:11.126552105 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:11.143821955 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:11.263518095 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:11.517092943 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:11.540909052 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:11.660625935 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:11.913366079 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:11.914351940 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:12.037499905 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:12.290782928 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:12.291162014 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:12.410903931 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:12.668148994 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:12.668445110 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:12.788244963 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:13.041817904 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:13.042109966 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:13.161735058 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:13.521370888 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:13.521775007 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:13.641442060 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:13.894263983 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:13.895344973 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:13.895399094 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:13.895426989 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:13.895606995 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:44:14.015292883 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:14.015361071 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:14.015393972 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:14.015420914 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:14.348985910 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:44:14.389719009 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:45:46.011425972 CET49730587192.168.2.4107.178.108.41
                                                    Dec 18, 2024 06:45:46.133493900 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:45:46.387346983 CET58749730107.178.108.41192.168.2.4
                                                    Dec 18, 2024 06:45:46.392534971 CET49730587192.168.2.4107.178.108.41
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 18, 2024 06:44:05.986648083 CET6343953192.168.2.41.1.1.1
                                                    Dec 18, 2024 06:44:06.981102943 CET6343953192.168.2.41.1.1.1
                                                    Dec 18, 2024 06:44:07.995556116 CET6343953192.168.2.41.1.1.1
                                                    Dec 18, 2024 06:44:08.481827021 CET53634391.1.1.1192.168.2.4
                                                    Dec 18, 2024 06:44:08.481873989 CET53634391.1.1.1192.168.2.4
                                                    Dec 18, 2024 06:44:08.481904030 CET53634391.1.1.1192.168.2.4
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Dec 18, 2024 06:44:05.986648083 CET192.168.2.41.1.1.10x9c7eStandard query (0)mail.pgsu.co.idA (IP address)IN (0x0001)false
                                                    Dec 18, 2024 06:44:06.981102943 CET192.168.2.41.1.1.10x9c7eStandard query (0)mail.pgsu.co.idA (IP address)IN (0x0001)false
                                                    Dec 18, 2024 06:44:07.995556116 CET192.168.2.41.1.1.10x9c7eStandard query (0)mail.pgsu.co.idA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Dec 18, 2024 06:44:08.481827021 CET1.1.1.1192.168.2.40x9c7eNo error (0)mail.pgsu.co.idpgsu.co.idCNAME (Canonical name)IN (0x0001)false
                                                    Dec 18, 2024 06:44:08.481827021 CET1.1.1.1192.168.2.40x9c7eNo error (0)pgsu.co.id107.178.108.41A (IP address)IN (0x0001)false
                                                    Dec 18, 2024 06:44:08.481873989 CET1.1.1.1192.168.2.40x9c7eNo error (0)mail.pgsu.co.idpgsu.co.idCNAME (Canonical name)IN (0x0001)false
                                                    Dec 18, 2024 06:44:08.481873989 CET1.1.1.1192.168.2.40x9c7eNo error (0)pgsu.co.id107.178.108.41A (IP address)IN (0x0001)false
                                                    Dec 18, 2024 06:44:08.481904030 CET1.1.1.1192.168.2.40x9c7eNo error (0)mail.pgsu.co.idpgsu.co.idCNAME (Canonical name)IN (0x0001)false
                                                    Dec 18, 2024 06:44:08.481904030 CET1.1.1.1192.168.2.40x9c7eNo error (0)pgsu.co.id107.178.108.41A (IP address)IN (0x0001)false
                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                    Dec 18, 2024 06:44:09.791816950 CET58749730107.178.108.41192.168.2.4220-grogolvps.padinet.com ESMTP Exim 4.98 #2 Wed, 18 Dec 2024 12:44:09 +0700
                                                    220-We do not authorize the use of this system to transport unsolicited,
                                                    220 and/or bulk e-mail.
                                                    Dec 18, 2024 06:44:09.792901039 CET49730587192.168.2.4107.178.108.41EHLO 767668
                                                    Dec 18, 2024 06:44:10.165899038 CET58749730107.178.108.41192.168.2.4250-grogolvps.padinet.com Hello 767668 [8.46.123.189]
                                                    250-SIZE 52428800
                                                    250-LIMITS MAILMAX=1000 RCPTMAX=50000
                                                    250-8BITMIME
                                                    250-PIPELINING
                                                    250-PIPECONNECT
                                                    250-AUTH PLAIN LOGIN
                                                    250-STARTTLS
                                                    250 HELP
                                                    Dec 18, 2024 06:44:10.166187048 CET49730587192.168.2.4107.178.108.41STARTTLS
                                                    Dec 18, 2024 06:44:10.540127993 CET58749730107.178.108.41192.168.2.4220 TLS go ahead

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:00:44:01
                                                    Start date:18/12/2024
                                                    Path:C:\Users\user\Desktop\ssd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\ssd.exe"
                                                    Imagebase:0x790000
                                                    File size:1'177'600 bytes
                                                    MD5 hash:25FAAF0547DDFA428EEBEB9F294A543D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1726252699.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1726252699.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1726252699.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:00:44:04
                                                    Start date:18/12/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\ssd.exe"
                                                    Imagebase:0x600000
                                                    File size:45'984 bytes
                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4173195807.0000000002A09000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4172227410.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4172227410.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4173195807.00000000029DE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4173195807.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4173195807.0000000002991000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:high
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:3.2%
                                                      Dynamic/Decrypted Code Coverage:1.5%
                                                      Signature Coverage:3%
                                                      Total number of Nodes:1994
                                                      Total number of Limit Nodes:60
                                                      execution_graph 94661 7b03fb 94662 7b0407 __FrameHandler3::FrameUnwindToState 94661->94662 94690 7afeb1 94662->94690 94664 7b040e 94665 7b0561 94664->94665 94668 7b0438 94664->94668 94717 7b083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 94665->94717 94667 7b0568 94718 7b4e52 28 API calls _abort 94667->94718 94679 7b0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 94668->94679 94701 7c247d 94668->94701 94670 7b056e 94719 7b4e04 28 API calls _abort 94670->94719 94674 7b0576 94675 7b0457 94677 7b04d8 94709 7b0959 94677->94709 94679->94677 94713 7b4e1a 38 API calls 3 library calls 94679->94713 94681 7b04de 94682 7b04f3 94681->94682 94714 7b0992 GetModuleHandleW 94682->94714 94684 7b04fa 94684->94667 94685 7b04fe 94684->94685 94686 7b0507 94685->94686 94715 7b4df5 28 API calls _abort 94685->94715 94716 7b0040 13 API calls 2 library calls 94686->94716 94689 7b050f 94689->94675 94691 7afeba 94690->94691 94720 7b0698 IsProcessorFeaturePresent 94691->94720 94693 7afec6 94721 7b2c94 10 API calls 3 library calls 94693->94721 94695 7afecb 94696 7afecf 94695->94696 94722 7c2317 94695->94722 94696->94664 94699 7afee6 94699->94664 94702 7c2494 94701->94702 94703 7b0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 94702->94703 94704 7b0451 94703->94704 94704->94675 94705 7c2421 94704->94705 94706 7c2450 94705->94706 94707 7b0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 94706->94707 94708 7c2479 94707->94708 94708->94679 94797 7b2340 94709->94797 94712 7b097f 94712->94681 94713->94677 94714->94684 94715->94686 94716->94689 94717->94667 94718->94670 94719->94674 94720->94693 94721->94695 94726 7cd1f6 94722->94726 94725 7b2cbd 8 API calls 3 library calls 94725->94696 94729 7cd20f 94726->94729 94730 7cd213 94726->94730 94728 7afed8 94728->94699 94728->94725 94744 7b0a8c 94729->94744 94730->94729 94732 7c4bfb 94730->94732 94733 7c4c07 __FrameHandler3::FrameUnwindToState 94732->94733 94751 7c2f5e EnterCriticalSection 94733->94751 94735 7c4c0e 94752 7c50af 94735->94752 94737 7c4c1d 94743 7c4c2c 94737->94743 94765 7c4a8f 29 API calls 94737->94765 94740 7c4c27 94766 7c4b45 GetStdHandle GetFileType 94740->94766 94741 7c4c3d __fread_nolock 94741->94730 94767 7c4c48 LeaveCriticalSection _abort 94743->94767 94745 7b0a97 IsProcessorFeaturePresent 94744->94745 94746 7b0a95 94744->94746 94748 7b0c5d 94745->94748 94746->94728 94796 7b0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 94748->94796 94750 7b0d40 94750->94728 94751->94735 94753 7c50bb __FrameHandler3::FrameUnwindToState 94752->94753 94754 7c50df 94753->94754 94755 7c50c8 94753->94755 94768 7c2f5e EnterCriticalSection 94754->94768 94776 7bf2d9 20 API calls __dosmaperr 94755->94776 94758 7c50cd 94777 7c27ec 26 API calls __cftof 94758->94777 94760 7c5117 94778 7c513e LeaveCriticalSection _abort 94760->94778 94761 7c50d7 __fread_nolock 94761->94737 94762 7c50eb 94762->94760 94769 7c5000 94762->94769 94765->94740 94766->94743 94767->94741 94768->94762 94779 7c4c7d 94769->94779 94771 7c501f 94787 7c29c8 94771->94787 94772 7c5012 94772->94771 94786 7c3405 11 API calls 2 library calls 94772->94786 94775 7c5071 94775->94762 94776->94758 94777->94761 94778->94761 94784 7c4c8a __dosmaperr 94779->94784 94780 7c4cca 94794 7bf2d9 20 API calls __dosmaperr 94780->94794 94781 7c4cb5 RtlAllocateHeap 94783 7c4cc8 94781->94783 94781->94784 94783->94772 94784->94780 94784->94781 94793 7b4ead 7 API calls 2 library calls 94784->94793 94786->94772 94788 7c29d3 RtlFreeHeap 94787->94788 94792 7c29fc __dosmaperr 94787->94792 94789 7c29e8 94788->94789 94788->94792 94795 7bf2d9 20 API calls __dosmaperr 94789->94795 94791 7c29ee GetLastError 94791->94792 94792->94775 94793->94784 94794->94783 94795->94791 94796->94750 94798 7b096c GetStartupInfoW 94797->94798 94798->94712 94799 791098 94804 7942de 94799->94804 94803 7910a7 94825 79a961 94804->94825 94808 794342 94813 794378 94808->94813 94842 7993b2 94808->94842 94810 79436c 94846 7937a0 94810->94846 94811 79441b GetCurrentProcess IsWow64Process 94814 794437 94811->94814 94813->94811 94819 7d37df 94813->94819 94815 79444f LoadLibraryA 94814->94815 94816 7d3824 GetSystemInfo 94814->94816 94817 79449c GetSystemInfo 94815->94817 94818 794460 GetProcAddress 94815->94818 94821 794476 94817->94821 94818->94817 94820 794470 GetNativeSystemInfo 94818->94820 94820->94821 94822 79447a FreeLibrary 94821->94822 94823 79109d 94821->94823 94822->94823 94824 7b00a3 29 API calls __onexit 94823->94824 94824->94803 94850 7afe0b 94825->94850 94827 79a976 94860 7afddb 94827->94860 94829 7942f5 GetVersionExW 94830 796b57 94829->94830 94831 7d4ba1 94830->94831 94832 796b67 _wcslen 94830->94832 94833 7993b2 22 API calls 94831->94833 94835 796b7d 94832->94835 94836 796ba2 94832->94836 94834 7d4baa 94833->94834 94834->94834 94885 796f34 94835->94885 94838 7afddb 22 API calls 94836->94838 94840 796bae 94838->94840 94839 796b85 __fread_nolock 94839->94808 94841 7afe0b 22 API calls 94840->94841 94841->94839 94843 7993c0 94842->94843 94844 7993c9 __fread_nolock 94842->94844 94843->94844 94889 79aec9 94843->94889 94844->94810 94844->94844 94847 7937ae 94846->94847 94848 7993b2 22 API calls 94847->94848 94849 7937c2 94848->94849 94849->94813 94852 7afddb 94850->94852 94853 7afdfa 94852->94853 94856 7afdfc 94852->94856 94870 7bea0c 94852->94870 94877 7b4ead 7 API calls 2 library calls 94852->94877 94853->94827 94855 7b066d 94879 7b32a4 RaiseException 94855->94879 94856->94855 94878 7b32a4 RaiseException 94856->94878 94859 7b068a 94859->94827 94863 7afde0 94860->94863 94861 7bea0c ___std_exception_copy 21 API calls 94861->94863 94862 7afdfa 94862->94829 94863->94861 94863->94862 94866 7afdfc 94863->94866 94882 7b4ead 7 API calls 2 library calls 94863->94882 94865 7b066d 94884 7b32a4 RaiseException 94865->94884 94866->94865 94883 7b32a4 RaiseException 94866->94883 94869 7b068a 94869->94829 94875 7c3820 __dosmaperr 94870->94875 94871 7c385e 94881 7bf2d9 20 API calls __dosmaperr 94871->94881 94873 7c3849 RtlAllocateHeap 94874 7c385c 94873->94874 94873->94875 94874->94852 94875->94871 94875->94873 94880 7b4ead 7 API calls 2 library calls 94875->94880 94877->94852 94878->94855 94879->94859 94880->94875 94881->94874 94882->94863 94883->94865 94884->94869 94886 796f4c 94885->94886 94888 796f46 94885->94888 94887 7afe0b 22 API calls 94886->94887 94887->94888 94888->94839 94890 79aed9 __fread_nolock 94889->94890 94891 79aedc 94889->94891 94890->94844 94892 7afddb 22 API calls 94891->94892 94893 79aee7 94892->94893 94894 7afe0b 22 API calls 94893->94894 94894->94890 94895 79105b 94900 79344d 94895->94900 94897 79106a 94931 7b00a3 29 API calls __onexit 94897->94931 94899 791074 94901 79345d __wsopen_s 94900->94901 94902 79a961 22 API calls 94901->94902 94903 793513 94902->94903 94932 793a5a 94903->94932 94905 79351c 94939 793357 94905->94939 94912 79a961 22 API calls 94913 79354d 94912->94913 94960 79a6c3 94913->94960 94916 7d3176 RegQueryValueExW 94917 7d320c RegCloseKey 94916->94917 94918 7d3193 94916->94918 94920 793578 94917->94920 94930 7d321e _wcslen 94917->94930 94919 7afe0b 22 API calls 94918->94919 94921 7d31ac 94919->94921 94920->94897 94966 795722 94921->94966 94924 7d31d4 94925 796b57 22 API calls 94924->94925 94927 7d31ee messages 94925->94927 94926 794c6d 22 API calls 94926->94930 94927->94917 94929 79515f 22 API calls 94929->94930 94930->94920 94930->94926 94930->94929 94969 799cb3 94930->94969 94931->94899 94975 7d1f50 94932->94975 94935 799cb3 22 API calls 94936 793a8d 94935->94936 94977 793aa2 94936->94977 94938 793a97 94938->94905 94940 7d1f50 __wsopen_s 94939->94940 94941 793364 GetFullPathNameW 94940->94941 94942 793386 94941->94942 94943 796b57 22 API calls 94942->94943 94944 7933a4 94943->94944 94945 7933c6 94944->94945 94946 7933dd 94945->94946 94947 7d30bb 94945->94947 94987 7933ee 94946->94987 94949 7afddb 22 API calls 94947->94949 94951 7d30c5 _wcslen 94949->94951 94950 7933e8 94954 79515f 94950->94954 94952 7afe0b 22 API calls 94951->94952 94953 7d30fe __fread_nolock 94952->94953 94955 79516e 94954->94955 94959 79518f __fread_nolock 94954->94959 94957 7afe0b 22 API calls 94955->94957 94956 7afddb 22 API calls 94958 793544 94956->94958 94957->94959 94958->94912 94959->94956 94961 79a6dd 94960->94961 94962 793556 RegOpenKeyExW 94960->94962 94963 7afddb 22 API calls 94961->94963 94962->94916 94962->94920 94964 79a6e7 94963->94964 94965 7afe0b 22 API calls 94964->94965 94965->94962 94967 7afddb 22 API calls 94966->94967 94968 795734 RegQueryValueExW 94967->94968 94968->94924 94968->94927 94970 799cc2 _wcslen 94969->94970 94971 7afe0b 22 API calls 94970->94971 94972 799cea __fread_nolock 94971->94972 94973 7afddb 22 API calls 94972->94973 94974 799d00 94973->94974 94974->94930 94976 793a67 GetModuleFileNameW 94975->94976 94976->94935 94978 7d1f50 __wsopen_s 94977->94978 94979 793aaf GetFullPathNameW 94978->94979 94980 793ae9 94979->94980 94981 793ace 94979->94981 94983 79a6c3 22 API calls 94980->94983 94982 796b57 22 API calls 94981->94982 94984 793ada 94982->94984 94983->94984 94985 7937a0 22 API calls 94984->94985 94986 793ae6 94985->94986 94986->94938 94988 7933fe _wcslen 94987->94988 94989 7d311d 94988->94989 94990 793411 94988->94990 94992 7afddb 22 API calls 94989->94992 94997 79a587 94990->94997 94994 7d3127 94992->94994 94993 79341e __fread_nolock 94993->94950 94995 7afe0b 22 API calls 94994->94995 94996 7d3157 __fread_nolock 94995->94996 94998 79a59d 94997->94998 95001 79a598 __fread_nolock 94997->95001 94999 7afe0b 22 API calls 94998->94999 95000 7df80f 94998->95000 94999->95001 95000->95000 95001->94993 95002 7c90fa 95003 7c911f 95002->95003 95004 7c9107 95002->95004 95010 7c917a 95003->95010 95016 7c9117 95003->95016 95061 7cfdc4 21 API calls 2 library calls 95003->95061 95059 7bf2d9 20 API calls __dosmaperr 95004->95059 95006 7c910c 95060 7c27ec 26 API calls __cftof 95006->95060 95022 7bd955 95010->95022 95011 7c9192 95029 7c8c32 95011->95029 95013 7c9199 95014 7bd955 __fread_nolock 26 API calls 95013->95014 95013->95016 95015 7c91c5 95014->95015 95015->95016 95017 7bd955 __fread_nolock 26 API calls 95015->95017 95018 7c91d3 95017->95018 95018->95016 95019 7bd955 __fread_nolock 26 API calls 95018->95019 95020 7c91e3 95019->95020 95021 7bd955 __fread_nolock 26 API calls 95020->95021 95021->95016 95023 7bd961 95022->95023 95024 7bd976 95022->95024 95062 7bf2d9 20 API calls __dosmaperr 95023->95062 95024->95011 95026 7bd966 95063 7c27ec 26 API calls __cftof 95026->95063 95028 7bd971 95028->95011 95030 7c8c3e __FrameHandler3::FrameUnwindToState 95029->95030 95031 7c8c5e 95030->95031 95032 7c8c46 95030->95032 95034 7c8d24 95031->95034 95038 7c8c97 95031->95038 95130 7bf2c6 20 API calls __dosmaperr 95032->95130 95137 7bf2c6 20 API calls __dosmaperr 95034->95137 95035 7c8c4b 95131 7bf2d9 20 API calls __dosmaperr 95035->95131 95041 7c8cbb 95038->95041 95042 7c8ca6 95038->95042 95039 7c8d29 95138 7bf2d9 20 API calls __dosmaperr 95039->95138 95064 7c5147 EnterCriticalSection 95041->95064 95132 7bf2c6 20 API calls __dosmaperr 95042->95132 95044 7c8cb3 95139 7c27ec 26 API calls __cftof 95044->95139 95046 7c8cc1 95048 7c8cdd 95046->95048 95049 7c8cf2 95046->95049 95047 7c8cab 95133 7bf2d9 20 API calls __dosmaperr 95047->95133 95134 7bf2d9 20 API calls __dosmaperr 95048->95134 95065 7c8d45 95049->95065 95051 7c8c53 __fread_nolock 95051->95013 95055 7c8ce2 95135 7bf2c6 20 API calls __dosmaperr 95055->95135 95056 7c8ced 95136 7c8d1c LeaveCriticalSection __wsopen_s 95056->95136 95059->95006 95060->95016 95061->95010 95062->95026 95063->95028 95064->95046 95066 7c8d6f 95065->95066 95067 7c8d57 95065->95067 95069 7c90d9 95066->95069 95074 7c8db4 95066->95074 95149 7bf2c6 20 API calls __dosmaperr 95067->95149 95165 7bf2c6 20 API calls __dosmaperr 95069->95165 95070 7c8d5c 95150 7bf2d9 20 API calls __dosmaperr 95070->95150 95073 7c90de 95166 7bf2d9 20 API calls __dosmaperr 95073->95166 95076 7c8dbf 95074->95076 95077 7c8d64 95074->95077 95082 7c8def 95074->95082 95151 7bf2c6 20 API calls __dosmaperr 95076->95151 95077->95056 95078 7c8dcc 95167 7c27ec 26 API calls __cftof 95078->95167 95080 7c8dc4 95152 7bf2d9 20 API calls __dosmaperr 95080->95152 95084 7c8e08 95082->95084 95085 7c8e2e 95082->95085 95086 7c8e4a 95082->95086 95084->95085 95090 7c8e15 95084->95090 95153 7bf2c6 20 API calls __dosmaperr 95085->95153 95156 7c3820 21 API calls __dosmaperr 95086->95156 95089 7c8e33 95154 7bf2d9 20 API calls __dosmaperr 95089->95154 95140 7cf89b 95090->95140 95091 7c8e61 95094 7c29c8 _free 20 API calls 95091->95094 95097 7c8e6a 95094->95097 95095 7c8fb3 95098 7c9029 95095->95098 95100 7c8fcc GetConsoleMode 95095->95100 95096 7c8e3a 95155 7c27ec 26 API calls __cftof 95096->95155 95101 7c29c8 _free 20 API calls 95097->95101 95102 7c902d ReadFile 95098->95102 95100->95098 95103 7c8fdd 95100->95103 95104 7c8e71 95101->95104 95105 7c9047 95102->95105 95106 7c90a1 GetLastError 95102->95106 95103->95102 95107 7c8fe3 ReadConsoleW 95103->95107 95108 7c8e7b 95104->95108 95109 7c8e96 95104->95109 95105->95106 95112 7c901e 95105->95112 95110 7c90ae 95106->95110 95111 7c9005 95106->95111 95107->95112 95114 7c8fff GetLastError 95107->95114 95157 7bf2d9 20 API calls __dosmaperr 95108->95157 95159 7c9424 28 API calls __wsopen_s 95109->95159 95163 7bf2d9 20 API calls __dosmaperr 95110->95163 95127 7c8e45 __fread_nolock 95111->95127 95160 7bf2a3 20 API calls __dosmaperr 95111->95160 95122 7c906c 95112->95122 95123 7c9083 95112->95123 95112->95127 95114->95111 95115 7c29c8 _free 20 API calls 95115->95077 95118 7c90b3 95164 7bf2c6 20 API calls __dosmaperr 95118->95164 95120 7c8e80 95158 7bf2c6 20 API calls __dosmaperr 95120->95158 95161 7c8a61 31 API calls 3 library calls 95122->95161 95126 7c909a 95123->95126 95123->95127 95162 7c88a1 29 API calls __wsopen_s 95126->95162 95127->95115 95129 7c909f 95129->95127 95130->95035 95131->95051 95132->95047 95133->95044 95134->95055 95135->95056 95136->95051 95137->95039 95138->95044 95139->95051 95141 7cf8a8 95140->95141 95142 7cf8b5 95140->95142 95168 7bf2d9 20 API calls __dosmaperr 95141->95168 95146 7cf8c1 95142->95146 95169 7bf2d9 20 API calls __dosmaperr 95142->95169 95145 7cf8ad 95145->95095 95146->95095 95147 7cf8e2 95170 7c27ec 26 API calls __cftof 95147->95170 95149->95070 95150->95077 95151->95080 95152->95078 95153->95089 95154->95096 95155->95127 95156->95091 95157->95120 95158->95127 95159->95090 95160->95127 95161->95127 95162->95129 95163->95118 95164->95127 95165->95073 95166->95078 95167->95077 95168->95145 95169->95147 95170->95145 95171 79f7bf 95172 79f7d3 95171->95172 95173 79fcb6 95171->95173 95175 79fcc2 95172->95175 95176 7afddb 22 API calls 95172->95176 95266 79aceb 23 API calls messages 95173->95266 95267 79aceb 23 API calls messages 95175->95267 95178 79f7e5 95176->95178 95178->95175 95179 79fd3d 95178->95179 95180 79f83e 95178->95180 95268 801155 22 API calls 95179->95268 95198 79ed9d messages 95180->95198 95206 7a1310 95180->95206 95183 7afddb 22 API calls 95204 79ec76 messages 95183->95204 95184 79fef7 95192 79a8c7 22 API calls 95184->95192 95184->95198 95187 7e4b0b 95274 80359c 82 API calls __wsopen_s 95187->95274 95188 79a8c7 22 API calls 95188->95204 95189 7e4600 95189->95198 95269 79a8c7 95189->95269 95192->95198 95195 7b0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95195->95204 95196 79fbe3 95196->95198 95200 7e4bdc 95196->95200 95205 79f3ae messages 95196->95205 95197 79a961 22 API calls 95197->95204 95199 7b00a3 29 API calls pre_c_initialization 95199->95204 95275 80359c 82 API calls __wsopen_s 95200->95275 95202 7e4beb 95276 80359c 82 API calls __wsopen_s 95202->95276 95203 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95203->95204 95204->95183 95204->95184 95204->95187 95204->95188 95204->95189 95204->95195 95204->95196 95204->95197 95204->95198 95204->95199 95204->95202 95204->95203 95204->95205 95264 7a01e0 235 API calls 2 library calls 95204->95264 95265 7a06a0 41 API calls messages 95204->95265 95205->95198 95273 80359c 82 API calls __wsopen_s 95205->95273 95207 7a17b0 95206->95207 95208 7a1376 95206->95208 95429 7b0242 5 API calls __Init_thread_wait 95207->95429 95210 7a1390 95208->95210 95211 7e6331 95208->95211 95277 7a1940 95210->95277 95434 81709c 235 API calls 95211->95434 95213 7a17ba 95216 7a17fb 95213->95216 95218 799cb3 22 API calls 95213->95218 95215 7e633d 95215->95204 95221 7e6346 95216->95221 95223 7a182c 95216->95223 95227 7a17d4 95218->95227 95219 7a1940 9 API calls 95220 7a13b6 95219->95220 95220->95216 95222 7a13ec 95220->95222 95435 80359c 82 API calls __wsopen_s 95221->95435 95222->95221 95246 7a1408 __fread_nolock 95222->95246 95431 79aceb 23 API calls messages 95223->95431 95226 7a1839 95432 7ad217 235 API calls 95226->95432 95430 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95227->95430 95230 7e636e 95436 80359c 82 API calls __wsopen_s 95230->95436 95231 7a152f 95233 7a153c 95231->95233 95234 7e63d1 95231->95234 95236 7a1940 9 API calls 95233->95236 95438 815745 54 API calls _wcslen 95234->95438 95238 7a1549 95236->95238 95237 7afddb 22 API calls 95237->95246 95241 7e64fa 95238->95241 95243 7a1940 9 API calls 95238->95243 95239 7a1872 95433 7afaeb 23 API calls 95239->95433 95240 7afe0b 22 API calls 95240->95246 95250 7e6369 95241->95250 95439 80359c 82 API calls __wsopen_s 95241->95439 95248 7a1563 95243->95248 95246->95226 95246->95230 95246->95231 95246->95237 95246->95240 95247 7e63b2 95246->95247 95246->95250 95287 79ec40 95246->95287 95437 80359c 82 API calls __wsopen_s 95247->95437 95248->95241 95251 79a8c7 22 API calls 95248->95251 95253 7a15c7 messages 95248->95253 95250->95204 95251->95253 95252 7a1940 9 API calls 95252->95253 95253->95239 95253->95241 95253->95250 95253->95252 95254 7a167b messages 95253->95254 95311 806ef1 95253->95311 95391 81958b 95253->95391 95394 81e505 95253->95394 95407 81959f 95253->95407 95410 80f0ec 95253->95410 95419 794f39 95253->95419 95425 7fd4ce 95253->95425 95255 7a171d 95254->95255 95428 7ace17 22 API calls messages 95254->95428 95255->95204 95264->95204 95265->95204 95266->95175 95267->95179 95268->95198 95270 79a8db 95269->95270 95272 79a8ea __fread_nolock 95269->95272 95271 7afe0b 22 API calls 95270->95271 95270->95272 95271->95272 95272->95198 95273->95198 95274->95198 95275->95202 95276->95198 95278 7a1981 95277->95278 95284 7a195d 95277->95284 95440 7b0242 5 API calls __Init_thread_wait 95278->95440 95280 7a198b 95280->95284 95441 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95280->95441 95282 7a8727 95286 7a13a0 95282->95286 95443 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95282->95443 95284->95286 95442 7b0242 5 API calls __Init_thread_wait 95284->95442 95286->95219 95288 79ec76 messages 95287->95288 95289 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95288->95289 95290 7afddb 22 API calls 95288->95290 95291 79fef7 95288->95291 95294 7e4b0b 95288->95294 95295 79a8c7 22 API calls 95288->95295 95296 7e4600 95288->95296 95302 7b0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95288->95302 95303 79fbe3 95288->95303 95304 79a961 22 API calls 95288->95304 95307 7b00a3 29 API calls pre_c_initialization 95288->95307 95308 7e4beb 95288->95308 95309 79ed9d messages 95288->95309 95310 79f3ae messages 95288->95310 95444 7a01e0 235 API calls 2 library calls 95288->95444 95445 7a06a0 41 API calls messages 95288->95445 95289->95288 95290->95288 95299 79a8c7 22 API calls 95291->95299 95291->95309 95447 80359c 82 API calls __wsopen_s 95294->95447 95295->95288 95300 79a8c7 22 API calls 95296->95300 95296->95309 95299->95309 95300->95309 95302->95288 95305 7e4bdc 95303->95305 95303->95309 95303->95310 95304->95288 95448 80359c 82 API calls __wsopen_s 95305->95448 95307->95288 95449 80359c 82 API calls __wsopen_s 95308->95449 95309->95246 95310->95309 95446 80359c 82 API calls __wsopen_s 95310->95446 95312 79a961 22 API calls 95311->95312 95313 806f1d 95312->95313 95314 79a961 22 API calls 95313->95314 95315 806f26 95314->95315 95316 806f3a 95315->95316 95658 79b567 95315->95658 95450 797510 95316->95450 95319 806fbc 95322 797510 53 API calls 95319->95322 95320 8070bf 95473 794ecb 95320->95473 95325 806fc8 95322->95325 95324 806f57 _wcslen 95324->95319 95324->95320 95333 8070e9 95324->95333 95329 79a8c7 22 API calls 95325->95329 95332 806fdb 95325->95332 95326 8070e5 95328 79a961 22 API calls 95326->95328 95326->95333 95327 794ecb 94 API calls 95327->95326 95330 80711a 95328->95330 95329->95332 95334 79a961 22 API calls 95330->95334 95331 807027 95337 797510 53 API calls 95331->95337 95332->95331 95336 807005 95332->95336 95339 79a8c7 22 API calls 95332->95339 95333->95253 95335 807126 95334->95335 95338 79a961 22 API calls 95335->95338 95340 7933c6 22 API calls 95336->95340 95341 807034 95337->95341 95342 80712f 95338->95342 95339->95336 95343 80700f 95340->95343 95344 807047 95341->95344 95345 80703d 95341->95345 95348 79a961 22 API calls 95342->95348 95349 797510 53 API calls 95343->95349 95663 7fe199 GetFileAttributesW 95344->95663 95346 79a8c7 22 API calls 95345->95346 95346->95344 95351 807138 95348->95351 95352 80701b 95349->95352 95350 807050 95353 807063 95350->95353 95356 794c6d 22 API calls 95350->95356 95354 797510 53 API calls 95351->95354 95355 796350 22 API calls 95352->95355 95358 797510 53 API calls 95353->95358 95364 807069 95353->95364 95357 807145 95354->95357 95355->95331 95356->95353 95495 79525f 95357->95495 95360 8070a0 95358->95360 95664 7fd076 57 API calls 95360->95664 95361 807166 95537 794c6d 95361->95537 95364->95333 95366 8071a9 95367 79a8c7 22 API calls 95366->95367 95369 8071ba 95367->95369 95368 794c6d 22 API calls 95370 807186 95368->95370 95540 796350 95369->95540 95370->95366 95373 796b57 22 API calls 95370->95373 95374 80719b 95373->95374 95376 796b57 22 API calls 95374->95376 95375 796350 22 API calls 95377 8071d6 95375->95377 95376->95366 95378 796350 22 API calls 95377->95378 95379 8071e4 95378->95379 95380 797510 53 API calls 95379->95380 95381 8071f0 95380->95381 95549 7fd7bc 95381->95549 95383 807201 95384 7fd4ce 4 API calls 95383->95384 95385 80720b 95384->95385 95386 797510 53 API calls 95385->95386 95390 807239 95385->95390 95387 807229 95386->95387 95603 802947 95387->95603 95389 794f39 68 API calls 95389->95333 95390->95389 96201 817f59 95391->96201 95393 81959b 95393->95253 95395 797510 53 API calls 95394->95395 95396 81e51d 95395->95396 95397 79a961 22 API calls 95396->95397 95398 81e52b 95397->95398 95399 79b567 39 API calls 95398->95399 95400 81e536 95399->95400 95401 81e560 95400->95401 95403 797510 53 API calls 95400->95403 96293 7962b5 22 API calls 95401->96293 95405 81e551 95403->95405 95404 81e56c 95404->95253 95406 796d25 22 API calls 95405->95406 95406->95401 95408 817f59 120 API calls 95407->95408 95409 8195af 95408->95409 95409->95253 95411 797510 53 API calls 95410->95411 95412 80f126 95411->95412 96294 799e90 95412->96294 95414 80f136 95415 80f15b 95414->95415 95416 79ec40 235 API calls 95414->95416 95418 80f15f 95415->95418 96322 799c6e 22 API calls 95415->96322 95416->95415 95418->95253 95420 794f4a 95419->95420 95421 794f43 95419->95421 95423 794f59 95420->95423 95424 794f6a FreeLibrary 95420->95424 95422 7be678 67 API calls 95421->95422 95422->95420 95423->95253 95424->95423 96337 7fdbbe lstrlenW 95425->96337 95428->95254 95429->95213 95430->95216 95431->95226 95432->95239 95433->95239 95434->95215 95435->95250 95436->95250 95437->95250 95438->95248 95439->95250 95440->95280 95441->95284 95442->95282 95443->95286 95444->95288 95445->95288 95446->95309 95447->95309 95448->95308 95449->95309 95451 797525 95450->95451 95467 797522 95450->95467 95452 79755b 95451->95452 95453 79752d 95451->95453 95454 7d50f6 95452->95454 95457 79756d 95452->95457 95464 7d500f 95452->95464 95665 7b51c6 26 API calls 95453->95665 95668 7b5183 26 API calls 95454->95668 95666 7afb21 51 API calls 95457->95666 95458 79753d 95461 7afddb 22 API calls 95458->95461 95459 7d510e 95459->95459 95463 797547 95461->95463 95465 799cb3 22 API calls 95463->95465 95466 7afe0b 22 API calls 95464->95466 95472 7d5088 95464->95472 95465->95467 95468 7d5058 95466->95468 95467->95324 95469 7afddb 22 API calls 95468->95469 95470 7d507f 95469->95470 95471 799cb3 22 API calls 95470->95471 95471->95472 95667 7afb21 51 API calls 95472->95667 95669 794e90 LoadLibraryA 95473->95669 95478 7d3ccf 95480 794f39 68 API calls 95478->95480 95479 794ef6 LoadLibraryExW 95677 794e59 LoadLibraryA 95479->95677 95482 7d3cd6 95480->95482 95484 794e59 3 API calls 95482->95484 95486 7d3cde 95484->95486 95699 7950f5 95486->95699 95487 794f20 95487->95486 95488 794f2c 95487->95488 95489 794f39 68 API calls 95488->95489 95491 794f31 95489->95491 95491->95326 95491->95327 95494 7d3d05 95496 79a961 22 API calls 95495->95496 95497 795275 95496->95497 95498 79a961 22 API calls 95497->95498 95499 79527d 95498->95499 95500 79a961 22 API calls 95499->95500 95501 795285 95500->95501 95502 79a961 22 API calls 95501->95502 95503 79528d 95502->95503 95504 7d3df5 95503->95504 95505 7952c1 95503->95505 95506 79a8c7 22 API calls 95504->95506 95507 796d25 22 API calls 95505->95507 95508 7d3dfe 95506->95508 95509 7952cf 95507->95509 95510 79a6c3 22 API calls 95508->95510 95511 7993b2 22 API calls 95509->95511 95513 795304 95510->95513 95512 7952d9 95511->95512 95512->95513 95514 796d25 22 API calls 95512->95514 95515 795325 95513->95515 95529 795349 95513->95529 95535 7d3e20 95513->95535 95517 7952fa 95514->95517 95519 794c6d 22 API calls 95515->95519 95515->95529 95518 7993b2 22 API calls 95517->95518 95518->95513 95521 795332 95519->95521 95520 795370 95524 795384 95520->95524 95527 79a8c7 22 API calls 95520->95527 95528 796d25 22 API calls 95521->95528 95521->95529 95522 796b57 22 API calls 95533 7d3ee0 95522->95533 95523 79535a 95523->95520 95526 79a8c7 22 API calls 95523->95526 95525 79538f 95524->95525 95530 79a8c7 22 API calls 95524->95530 95531 79a8c7 22 API calls 95525->95531 95536 79539a 95525->95536 95526->95520 95527->95524 95528->95529 95846 796d25 95529->95846 95530->95525 95531->95536 95532 794c6d 22 API calls 95532->95533 95533->95529 95533->95532 95859 7949bd 22 API calls __fread_nolock 95533->95859 95535->95522 95536->95361 95538 79aec9 22 API calls 95537->95538 95539 794c78 95538->95539 95539->95366 95539->95368 95541 796362 95540->95541 95542 7d4a51 95540->95542 95860 796373 95541->95860 95870 794a88 22 API calls __fread_nolock 95542->95870 95545 79636e 95545->95375 95546 7d4a5b 95547 7d4a67 95546->95547 95548 79a8c7 22 API calls 95546->95548 95548->95547 95550 7fd7d8 95549->95550 95551 7fd7dd 95550->95551 95552 7fd7f3 95550->95552 95554 79a8c7 22 API calls 95551->95554 95602 7fd7ee 95551->95602 95553 79a961 22 API calls 95552->95553 95555 7fd7fb 95553->95555 95554->95602 95556 79a961 22 API calls 95555->95556 95557 7fd803 95556->95557 95558 79a961 22 API calls 95557->95558 95559 7fd80e 95558->95559 95560 79a961 22 API calls 95559->95560 95561 7fd816 95560->95561 95562 79a961 22 API calls 95561->95562 95563 7fd81e 95562->95563 95564 79a961 22 API calls 95563->95564 95565 7fd826 95564->95565 95566 79a961 22 API calls 95565->95566 95567 7fd82e 95566->95567 95568 79a961 22 API calls 95567->95568 95569 7fd836 95568->95569 95570 79525f 22 API calls 95569->95570 95571 7fd84d 95570->95571 95572 79525f 22 API calls 95571->95572 95573 7fd866 95572->95573 95574 794c6d 22 API calls 95573->95574 95575 7fd872 95574->95575 95576 7fd885 95575->95576 95577 7993b2 22 API calls 95575->95577 95578 794c6d 22 API calls 95576->95578 95577->95576 95579 7fd88e 95578->95579 95580 7fd89e 95579->95580 95582 7993b2 22 API calls 95579->95582 95581 7fd8b0 95580->95581 95583 79a8c7 22 API calls 95580->95583 95584 796350 22 API calls 95581->95584 95582->95580 95583->95581 95585 7fd8bb 95584->95585 95871 7fd978 22 API calls 95585->95871 95587 7fd8ca 95872 7fd978 22 API calls 95587->95872 95589 7fd8dd 95590 794c6d 22 API calls 95589->95590 95591 7fd8e7 95590->95591 95592 7fd8fe 95591->95592 95593 7fd8ec 95591->95593 95594 794c6d 22 API calls 95592->95594 95595 7933c6 22 API calls 95593->95595 95596 7fd907 95594->95596 95597 7fd8f9 95595->95597 95598 7fd925 95596->95598 95599 7933c6 22 API calls 95596->95599 95600 796350 22 API calls 95597->95600 95601 796350 22 API calls 95598->95601 95599->95597 95600->95598 95601->95602 95602->95383 95604 802954 __wsopen_s 95603->95604 95605 7afe0b 22 API calls 95604->95605 95606 802971 95605->95606 95607 795722 22 API calls 95606->95607 95608 80297b 95607->95608 95609 80274e 27 API calls 95608->95609 95610 802986 95609->95610 95611 79511f 64 API calls 95610->95611 95612 80299b 95611->95612 95613 802a6c 95612->95613 95614 8029bf 95612->95614 95615 802e66 75 API calls 95613->95615 95899 802e66 95614->95899 95631 802a38 95615->95631 95619 7950f5 40 API calls 95620 802a91 95619->95620 95622 7950f5 40 API calls 95620->95622 95621 802a75 messages 95621->95390 95624 802aa1 95622->95624 95623 8029ed 95906 7bd583 26 API calls 95623->95906 95625 7950f5 40 API calls 95624->95625 95627 802abc 95625->95627 95628 7950f5 40 API calls 95627->95628 95629 802acc 95628->95629 95630 7950f5 40 API calls 95629->95630 95632 802ae7 95630->95632 95631->95619 95631->95621 95633 7950f5 40 API calls 95632->95633 95634 802af7 95633->95634 95635 7950f5 40 API calls 95634->95635 95636 802b07 95635->95636 95637 7950f5 40 API calls 95636->95637 95638 802b17 95637->95638 95873 803017 GetTempPathW GetTempFileNameW 95638->95873 95640 802b22 95641 7be5eb 29 API calls 95640->95641 95652 802b33 95641->95652 95642 802bed 95883 7be678 95642->95883 95644 802bf8 95646 802c12 95644->95646 95647 802bfe DeleteFileW 95644->95647 95645 7950f5 40 API calls 95645->95652 95648 802c91 CopyFileW 95646->95648 95654 802c18 95646->95654 95647->95621 95649 802ca7 DeleteFileW 95648->95649 95650 802cb9 DeleteFileW 95648->95650 95649->95621 95896 802fd8 CreateFileW 95650->95896 95652->95621 95652->95642 95652->95645 95874 7bdbb3 95652->95874 95907 8022ce 95654->95907 95657 802c80 DeleteFileW 95657->95621 95659 79b57f 95658->95659 95660 79b578 95658->95660 95659->95316 95660->95659 96200 7b62d1 39 API calls 95660->96200 95662 79b5c2 95662->95316 95663->95350 95664->95364 95665->95458 95666->95458 95667->95454 95668->95459 95670 794ea8 GetProcAddress 95669->95670 95671 794ec6 95669->95671 95672 794eb8 95670->95672 95674 7be5eb 95671->95674 95672->95671 95673 794ebf FreeLibrary 95672->95673 95673->95671 95707 7be52a 95674->95707 95676 794eea 95676->95478 95676->95479 95678 794e8d 95677->95678 95679 794e6e GetProcAddress 95677->95679 95682 794f80 95678->95682 95680 794e7e 95679->95680 95680->95678 95681 794e86 FreeLibrary 95680->95681 95681->95678 95683 7afe0b 22 API calls 95682->95683 95684 794f95 95683->95684 95685 795722 22 API calls 95684->95685 95686 794fa1 __fread_nolock 95685->95686 95687 7d3d1d 95686->95687 95688 7950a5 95686->95688 95698 794fdc 95686->95698 95770 80304d 74 API calls 95687->95770 95759 7942a2 CreateStreamOnHGlobal 95688->95759 95691 7d3d22 95693 79511f 64 API calls 95691->95693 95692 7950f5 40 API calls 95692->95698 95694 7d3d45 95693->95694 95695 7950f5 40 API calls 95694->95695 95696 79506e messages 95695->95696 95696->95487 95698->95691 95698->95692 95698->95696 95765 79511f 95698->95765 95700 7d3d70 95699->95700 95701 795107 95699->95701 95792 7be8c4 95701->95792 95704 8028fe 95829 80274e 95704->95829 95706 802919 95706->95494 95710 7be536 __FrameHandler3::FrameUnwindToState 95707->95710 95708 7be544 95732 7bf2d9 20 API calls __dosmaperr 95708->95732 95710->95708 95712 7be574 95710->95712 95711 7be549 95733 7c27ec 26 API calls __cftof 95711->95733 95714 7be579 95712->95714 95715 7be586 95712->95715 95734 7bf2d9 20 API calls __dosmaperr 95714->95734 95724 7c8061 95715->95724 95718 7be58f 95719 7be5a2 95718->95719 95720 7be595 95718->95720 95736 7be5d4 LeaveCriticalSection __fread_nolock 95719->95736 95735 7bf2d9 20 API calls __dosmaperr 95720->95735 95722 7be554 __fread_nolock 95722->95676 95725 7c806d __FrameHandler3::FrameUnwindToState 95724->95725 95737 7c2f5e EnterCriticalSection 95725->95737 95727 7c807b 95738 7c80fb 95727->95738 95731 7c80ac __fread_nolock 95731->95718 95732->95711 95733->95722 95734->95722 95735->95722 95736->95722 95737->95727 95745 7c811e 95738->95745 95739 7c8177 95740 7c4c7d __dosmaperr 20 API calls 95739->95740 95741 7c8180 95740->95741 95743 7c29c8 _free 20 API calls 95741->95743 95744 7c8189 95743->95744 95750 7c8088 95744->95750 95756 7c3405 11 API calls 2 library calls 95744->95756 95745->95739 95745->95745 95745->95750 95754 7b918d EnterCriticalSection 95745->95754 95755 7b91a1 LeaveCriticalSection 95745->95755 95748 7c81a8 95757 7b918d EnterCriticalSection 95748->95757 95751 7c80b7 95750->95751 95758 7c2fa6 LeaveCriticalSection 95751->95758 95753 7c80be 95753->95731 95754->95745 95755->95745 95756->95748 95757->95750 95758->95753 95760 7942bc FindResourceExW 95759->95760 95764 7942d9 95759->95764 95761 7d35ba LoadResource 95760->95761 95760->95764 95762 7d35cf SizeofResource 95761->95762 95761->95764 95763 7d35e3 LockResource 95762->95763 95762->95764 95763->95764 95764->95698 95766 79512e 95765->95766 95769 7d3d90 95765->95769 95771 7bece3 95766->95771 95770->95691 95774 7beaaa 95771->95774 95773 79513c 95773->95698 95775 7beab6 __FrameHandler3::FrameUnwindToState 95774->95775 95776 7beac2 95775->95776 95778 7beae8 95775->95778 95787 7bf2d9 20 API calls __dosmaperr 95776->95787 95789 7b918d EnterCriticalSection 95778->95789 95780 7beac7 95788 7c27ec 26 API calls __cftof 95780->95788 95781 7beaf4 95790 7bec0a 62 API calls 2 library calls 95781->95790 95784 7beb08 95791 7beb27 LeaveCriticalSection __fread_nolock 95784->95791 95786 7bead2 __fread_nolock 95786->95773 95787->95780 95788->95786 95789->95781 95790->95784 95791->95786 95795 7be8e1 95792->95795 95794 795118 95794->95704 95796 7be8ed __FrameHandler3::FrameUnwindToState 95795->95796 95797 7be92d 95796->95797 95798 7be900 ___scrt_fastfail 95796->95798 95799 7be925 __fread_nolock 95796->95799 95808 7b918d EnterCriticalSection 95797->95808 95822 7bf2d9 20 API calls __dosmaperr 95798->95822 95799->95794 95801 7be937 95809 7be6f8 95801->95809 95803 7be91a 95823 7c27ec 26 API calls __cftof 95803->95823 95808->95801 95810 7be727 95809->95810 95813 7be70a ___scrt_fastfail 95809->95813 95824 7be96c LeaveCriticalSection __fread_nolock 95810->95824 95811 7be717 95825 7bf2d9 20 API calls __dosmaperr 95811->95825 95813->95810 95813->95811 95815 7be76a __fread_nolock 95813->95815 95815->95810 95816 7be886 ___scrt_fastfail 95815->95816 95818 7bd955 __fread_nolock 26 API calls 95815->95818 95821 7c8d45 __fread_nolock 38 API calls 95815->95821 95827 7bcf78 26 API calls 4 library calls 95815->95827 95828 7bf2d9 20 API calls __dosmaperr 95816->95828 95818->95815 95820 7be71c 95826 7c27ec 26 API calls __cftof 95820->95826 95821->95815 95822->95803 95823->95799 95824->95799 95825->95820 95826->95810 95827->95815 95828->95820 95832 7be4e8 95829->95832 95831 80275d 95831->95706 95835 7be469 95832->95835 95834 7be505 95834->95831 95836 7be478 95835->95836 95837 7be48c 95835->95837 95843 7bf2d9 20 API calls __dosmaperr 95836->95843 95842 7be488 __alldvrm 95837->95842 95845 7c333f 11 API calls 2 library calls 95837->95845 95839 7be47d 95844 7c27ec 26 API calls __cftof 95839->95844 95842->95834 95843->95839 95844->95842 95845->95842 95847 796d91 95846->95847 95848 796d34 95846->95848 95849 7993b2 22 API calls 95847->95849 95848->95847 95850 796d3f 95848->95850 95855 796d62 __fread_nolock 95849->95855 95851 7d4c9d 95850->95851 95852 796d5a 95850->95852 95854 7afddb 22 API calls 95851->95854 95853 796f34 22 API calls 95852->95853 95853->95855 95856 7d4ca7 95854->95856 95855->95523 95857 7afe0b 22 API calls 95856->95857 95858 7d4cda 95857->95858 95859->95533 95861 7963b6 __fread_nolock 95860->95861 95862 796382 95860->95862 95861->95545 95862->95861 95863 7d4a82 95862->95863 95864 7963a9 95862->95864 95865 7afddb 22 API calls 95863->95865 95866 79a587 22 API calls 95864->95866 95867 7d4a91 95865->95867 95866->95861 95868 7afe0b 22 API calls 95867->95868 95869 7d4ac5 __fread_nolock 95868->95869 95870->95546 95871->95587 95872->95589 95873->95640 95875 7bdbc1 95874->95875 95881 7bdbdd 95874->95881 95876 7bdbcd 95875->95876 95877 7bdbe3 95875->95877 95875->95881 95939 7bf2d9 20 API calls __dosmaperr 95876->95939 95936 7bd9cc 95877->95936 95880 7bdbd2 95940 7c27ec 26 API calls __cftof 95880->95940 95881->95652 95884 7be684 __FrameHandler3::FrameUnwindToState 95883->95884 95885 7be6aa 95884->95885 95886 7be695 95884->95886 95895 7be6a5 __fread_nolock 95885->95895 96075 7b918d EnterCriticalSection 95885->96075 96092 7bf2d9 20 API calls __dosmaperr 95886->96092 95888 7be69a 96093 7c27ec 26 API calls __cftof 95888->96093 95891 7be6c6 96076 7be602 95891->96076 95893 7be6d1 96094 7be6ee LeaveCriticalSection __fread_nolock 95893->96094 95895->95644 95897 803013 95896->95897 95898 802fff SetFileTime CloseHandle 95896->95898 95897->95621 95898->95897 95900 802e7a 95899->95900 95901 8029c4 95900->95901 95902 7950f5 40 API calls 95900->95902 95903 8028fe 27 API calls 95900->95903 95904 79511f 64 API calls 95900->95904 95901->95621 95905 7bd583 26 API calls 95901->95905 95902->95900 95903->95900 95904->95900 95905->95623 95906->95631 95908 8022e7 95907->95908 95909 8022d9 95907->95909 95911 80232c 95908->95911 95912 7be5eb 29 API calls 95908->95912 95931 8022f0 95908->95931 95910 7be5eb 29 API calls 95909->95910 95910->95908 96168 802557 95911->96168 95914 802311 95912->95914 95914->95911 95916 80231a 95914->95916 95915 802370 95917 802374 95915->95917 95918 802395 95915->95918 95920 7be678 67 API calls 95916->95920 95916->95931 95919 802381 95917->95919 95922 7be678 67 API calls 95917->95922 96172 802171 95918->96172 95926 7be678 67 API calls 95919->95926 95919->95931 95920->95931 95922->95919 95923 80239d 95924 8023c3 95923->95924 95925 8023a3 95923->95925 96179 8023f3 95924->96179 95927 8023b0 95925->95927 95929 7be678 67 API calls 95925->95929 95926->95931 95930 7be678 67 API calls 95927->95930 95927->95931 95929->95927 95930->95931 95931->95650 95931->95657 95932 8023ca 95933 8023de 95932->95933 95934 7be678 67 API calls 95932->95934 95933->95931 95935 7be678 67 API calls 95933->95935 95934->95933 95935->95931 95941 7bd97b 95936->95941 95938 7bd9f0 95938->95881 95939->95880 95940->95881 95942 7bd987 __FrameHandler3::FrameUnwindToState 95941->95942 95949 7b918d EnterCriticalSection 95942->95949 95944 7bd995 95950 7bd9f4 95944->95950 95948 7bd9b3 __fread_nolock 95948->95938 95949->95944 95958 7c49a1 95950->95958 95956 7bd9a2 95957 7bd9c0 LeaveCriticalSection __fread_nolock 95956->95957 95957->95948 95959 7bd955 __fread_nolock 26 API calls 95958->95959 95960 7c49b0 95959->95960 95961 7cf89b __fread_nolock 26 API calls 95960->95961 95962 7c49b6 95961->95962 95966 7bda09 95962->95966 95979 7c3820 21 API calls __dosmaperr 95962->95979 95964 7c4a15 95965 7c29c8 _free 20 API calls 95964->95965 95965->95966 95967 7bda3a 95966->95967 95970 7bda4c 95967->95970 95973 7bda24 95967->95973 95968 7bda5a 96005 7bf2d9 20 API calls __dosmaperr 95968->96005 95970->95968 95970->95973 95976 7bda85 __fread_nolock 95970->95976 95971 7bda5f 96006 7c27ec 26 API calls __cftof 95971->96006 95978 7c4a56 62 API calls 95973->95978 95975 7bd955 __fread_nolock 26 API calls 95975->95976 95976->95973 95976->95975 95980 7c59be 95976->95980 96007 7bdc0b 95976->96007 95978->95956 95979->95964 95981 7c59ca __FrameHandler3::FrameUnwindToState 95980->95981 95982 7c59ea 95981->95982 95983 7c59d2 95981->95983 95985 7c5a88 95982->95985 95989 7c5a1f 95982->95989 96067 7bf2c6 20 API calls __dosmaperr 95983->96067 96072 7bf2c6 20 API calls __dosmaperr 95985->96072 95986 7c59d7 96068 7bf2d9 20 API calls __dosmaperr 95986->96068 95988 7c5a8d 96073 7bf2d9 20 API calls __dosmaperr 95988->96073 96013 7c5147 EnterCriticalSection 95989->96013 95993 7c59df __fread_nolock 95993->95976 95994 7c5a95 96074 7c27ec 26 API calls __cftof 95994->96074 95995 7c5a25 95997 7c5a56 95995->95997 95998 7c5a41 95995->95998 96014 7c5aa9 95997->96014 96069 7bf2d9 20 API calls __dosmaperr 95998->96069 96001 7c5a46 96070 7bf2c6 20 API calls __dosmaperr 96001->96070 96002 7c5a51 96071 7c5a80 LeaveCriticalSection __wsopen_s 96002->96071 96005->95971 96006->95973 96008 7bdc1f 96007->96008 96009 7bdc23 96007->96009 96008->95976 96009->96008 96010 7bd955 __fread_nolock 26 API calls 96009->96010 96011 7bdc43 96010->96011 96012 7c59be __wsopen_s 62 API calls 96011->96012 96012->96008 96013->95995 96015 7c5ad7 96014->96015 96054 7c5ad0 96014->96054 96016 7c5afa 96015->96016 96017 7c5adb 96015->96017 96020 7c5b2e 96016->96020 96026 7c5b4b 96016->96026 96019 7bf2c6 __dosmaperr 20 API calls 96017->96019 96018 7b0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96021 7c5cb1 96018->96021 96022 7c5ae0 96019->96022 96023 7bf2c6 __dosmaperr 20 API calls 96020->96023 96021->96002 96024 7bf2d9 __dosmaperr 20 API calls 96022->96024 96027 7c5b33 96023->96027 96028 7c5ae7 96024->96028 96025 7c5b61 96030 7c564e __wsopen_s 39 API calls 96025->96030 96026->96025 96029 7c9424 __wsopen_s 28 API calls 96026->96029 96031 7bf2d9 __dosmaperr 20 API calls 96027->96031 96032 7c27ec __cftof 26 API calls 96028->96032 96029->96025 96033 7c5b6a 96030->96033 96034 7c5b3b 96031->96034 96032->96054 96035 7c5b6f 96033->96035 96036 7c5ba8 96033->96036 96039 7c27ec __cftof 26 API calls 96034->96039 96037 7c5b95 96035->96037 96038 7c5b73 96035->96038 96040 7c5bbc 96036->96040 96041 7c5c02 WriteFile 96036->96041 96043 7c542e __wsopen_s 45 API calls 96037->96043 96042 7c5c69 96038->96042 96047 7c55e1 __wsopen_s GetLastError WriteConsoleW CreateFileW 96038->96047 96039->96054 96045 7c5bc4 96040->96045 96046 7c5bf2 96040->96046 96044 7c5c25 GetLastError 96041->96044 96049 7c5b8b 96041->96049 96042->96054 96055 7bf2d9 __dosmaperr 20 API calls 96042->96055 96043->96049 96044->96049 96050 7c5bc9 96045->96050 96051 7c5be2 96045->96051 96048 7c56c4 __wsopen_s 7 API calls 96046->96048 96047->96049 96053 7c5be0 96048->96053 96049->96042 96049->96054 96058 7c5c45 96049->96058 96050->96042 96056 7c5bd2 96050->96056 96052 7c5891 __wsopen_s 8 API calls 96051->96052 96052->96053 96053->96049 96054->96018 96057 7c5c8e 96055->96057 96059 7c57a3 __wsopen_s 7 API calls 96056->96059 96060 7bf2c6 __dosmaperr 20 API calls 96057->96060 96061 7c5c4c 96058->96061 96062 7c5c60 96058->96062 96059->96053 96060->96054 96064 7bf2d9 __dosmaperr 20 API calls 96061->96064 96063 7bf2a3 __dosmaperr 20 API calls 96062->96063 96063->96054 96065 7c5c51 96064->96065 96066 7bf2c6 __dosmaperr 20 API calls 96065->96066 96066->96054 96067->95986 96068->95993 96069->96001 96070->96002 96071->95993 96072->95988 96073->95994 96074->95993 96075->95891 96077 7be60f 96076->96077 96078 7be624 96076->96078 96114 7bf2d9 20 API calls __dosmaperr 96077->96114 96081 7bdc0b 62 API calls 96078->96081 96084 7be61f 96078->96084 96080 7be614 96115 7c27ec 26 API calls __cftof 96080->96115 96083 7be638 96081->96083 96095 7c4d7a 96083->96095 96084->95893 96087 7bd955 __fread_nolock 26 API calls 96088 7be646 96087->96088 96099 7c862f 96088->96099 96091 7c29c8 _free 20 API calls 96091->96084 96092->95888 96093->95895 96094->95895 96096 7be640 96095->96096 96097 7c4d90 96095->96097 96096->96087 96097->96096 96098 7c29c8 _free 20 API calls 96097->96098 96098->96096 96100 7c863e 96099->96100 96101 7c8653 96099->96101 96119 7bf2c6 20 API calls __dosmaperr 96100->96119 96103 7c868e 96101->96103 96108 7c867a 96101->96108 96121 7bf2c6 20 API calls __dosmaperr 96103->96121 96105 7c8643 96120 7bf2d9 20 API calls __dosmaperr 96105->96120 96106 7c8693 96122 7bf2d9 20 API calls __dosmaperr 96106->96122 96116 7c8607 96108->96116 96111 7be64c 96111->96084 96111->96091 96112 7c869b 96123 7c27ec 26 API calls __cftof 96112->96123 96114->96080 96115->96084 96124 7c8585 96116->96124 96118 7c862b 96118->96111 96119->96105 96120->96111 96121->96106 96122->96112 96123->96111 96125 7c8591 __FrameHandler3::FrameUnwindToState 96124->96125 96135 7c5147 EnterCriticalSection 96125->96135 96127 7c859f 96128 7c85c6 96127->96128 96129 7c85d1 96127->96129 96136 7c86ae 96128->96136 96151 7bf2d9 20 API calls __dosmaperr 96129->96151 96132 7c85cc 96152 7c85fb LeaveCriticalSection __wsopen_s 96132->96152 96134 7c85ee __fread_nolock 96134->96118 96135->96127 96153 7c53c4 96136->96153 96138 7c86c4 96166 7c5333 21 API calls 2 library calls 96138->96166 96140 7c86be 96140->96138 96143 7c53c4 __wsopen_s 26 API calls 96140->96143 96150 7c86f6 96140->96150 96141 7c53c4 __wsopen_s 26 API calls 96145 7c8702 CloseHandle 96141->96145 96142 7c871c 96146 7c873e 96142->96146 96167 7bf2a3 20 API calls __dosmaperr 96142->96167 96144 7c86ed 96143->96144 96147 7c53c4 __wsopen_s 26 API calls 96144->96147 96145->96138 96148 7c870e GetLastError 96145->96148 96146->96132 96147->96150 96148->96138 96150->96138 96150->96141 96151->96132 96152->96134 96154 7c53e6 96153->96154 96155 7c53d1 96153->96155 96157 7bf2c6 __dosmaperr 20 API calls 96154->96157 96161 7c540b 96154->96161 96156 7bf2c6 __dosmaperr 20 API calls 96155->96156 96158 7c53d6 96156->96158 96159 7c5416 96157->96159 96160 7bf2d9 __dosmaperr 20 API calls 96158->96160 96162 7bf2d9 __dosmaperr 20 API calls 96159->96162 96163 7c53de 96160->96163 96161->96140 96164 7c541e 96162->96164 96163->96140 96165 7c27ec __cftof 26 API calls 96164->96165 96165->96163 96166->96142 96167->96146 96169 80257c 96168->96169 96171 802565 __fread_nolock 96168->96171 96170 7be8c4 __fread_nolock 40 API calls 96169->96170 96170->96171 96171->95915 96173 7bea0c ___std_exception_copy 21 API calls 96172->96173 96174 80217f 96173->96174 96175 7bea0c ___std_exception_copy 21 API calls 96174->96175 96176 802190 96175->96176 96177 7bea0c ___std_exception_copy 21 API calls 96176->96177 96178 80219c 96177->96178 96178->95923 96186 802408 96179->96186 96180 8024c0 96191 802724 96180->96191 96182 8021cc 40 API calls 96182->96186 96183 8024c7 96183->95932 96186->96180 96186->96182 96186->96183 96187 802606 96186->96187 96195 802269 40 API calls 96186->96195 96188 802617 96187->96188 96189 80261d 96187->96189 96188->96189 96196 8026d7 96188->96196 96189->96186 96192 802731 96191->96192 96193 802742 96191->96193 96194 7bdbb3 65 API calls 96192->96194 96193->96183 96194->96193 96195->96186 96197 802703 96196->96197 96198 802714 96196->96198 96199 7bdbb3 65 API calls 96197->96199 96198->96188 96199->96198 96200->95662 96202 797510 53 API calls 96201->96202 96203 817f90 96202->96203 96229 817fd5 messages 96203->96229 96239 818cd3 96203->96239 96205 818281 96206 81844f 96205->96206 96210 81828f 96205->96210 96280 818ee4 60 API calls 96206->96280 96209 81845e 96209->96210 96211 81846a 96209->96211 96252 817e86 96210->96252 96211->96229 96212 797510 53 API calls 96226 818049 96212->96226 96217 8182c8 96267 7afc70 96217->96267 96220 818302 96274 7963eb 22 API calls 96220->96274 96221 8182e8 96273 80359c 82 API calls __wsopen_s 96221->96273 96224 8182f3 GetCurrentProcess TerminateProcess 96224->96220 96225 818311 96275 796a50 22 API calls 96225->96275 96226->96205 96226->96212 96226->96229 96271 7f417d 22 API calls __fread_nolock 96226->96271 96272 81851d 42 API calls _strftime 96226->96272 96228 81832a 96238 818352 96228->96238 96276 7a04f0 22 API calls 96228->96276 96229->95393 96231 8184c5 96231->96229 96234 8184d9 FreeLibrary 96231->96234 96232 818341 96277 818b7b 75 API calls 96232->96277 96234->96229 96238->96231 96278 7a04f0 22 API calls 96238->96278 96279 79aceb 23 API calls messages 96238->96279 96281 818b7b 75 API calls 96238->96281 96240 79aec9 22 API calls 96239->96240 96241 818cee CharLowerBuffW 96240->96241 96282 7f8e54 96241->96282 96245 79a961 22 API calls 96246 818d2a 96245->96246 96247 796d25 22 API calls 96246->96247 96248 818d3e 96247->96248 96249 7993b2 22 API calls 96248->96249 96251 818d48 _wcslen 96249->96251 96250 818e5e _wcslen 96250->96226 96251->96250 96289 81851d 42 API calls _strftime 96251->96289 96253 817ea1 96252->96253 96254 817eec 96252->96254 96255 7afe0b 22 API calls 96253->96255 96258 819096 96254->96258 96256 817ec3 96255->96256 96256->96254 96257 7afddb 22 API calls 96256->96257 96257->96256 96259 8192ab messages 96258->96259 96263 8190ba _strcat _wcslen 96258->96263 96259->96217 96260 79b38f 39 API calls 96260->96263 96261 79b567 39 API calls 96261->96263 96262 79b6b5 39 API calls 96262->96263 96263->96259 96263->96260 96263->96261 96263->96262 96264 797510 53 API calls 96263->96264 96265 7bea0c 21 API calls ___std_exception_copy 96263->96265 96292 7fefae 24 API calls _wcslen 96263->96292 96264->96263 96265->96263 96269 7afc85 96267->96269 96268 7afd1d VirtualProtect 96270 7afceb 96268->96270 96269->96268 96269->96270 96270->96220 96270->96221 96271->96226 96272->96226 96273->96224 96274->96225 96275->96228 96276->96232 96277->96238 96278->96238 96279->96238 96280->96209 96281->96238 96284 7f8e74 _wcslen 96282->96284 96283 7f8f63 96283->96245 96283->96251 96284->96283 96285 7f8ea9 96284->96285 96286 7f8f68 96284->96286 96285->96283 96290 7ace60 41 API calls 96285->96290 96286->96283 96291 7ace60 41 API calls 96286->96291 96289->96250 96290->96285 96291->96286 96292->96263 96293->95404 96323 796270 96294->96323 96296 799fd2 96329 79a4a1 22 API calls __fread_nolock 96296->96329 96298 799fec 96298->95414 96301 79a6c3 22 API calls 96321 799eb5 96301->96321 96302 7df7c4 96334 7f96e2 84 API calls __wsopen_s 96302->96334 96303 7df699 96310 7afddb 22 API calls 96303->96310 96304 79a4a1 22 API calls 96304->96321 96306 79a405 96306->96298 96336 7f96e2 84 API calls __wsopen_s 96306->96336 96309 7df7d2 96335 79a4a1 22 API calls __fread_nolock 96309->96335 96312 7df754 96310->96312 96314 7afe0b 22 API calls 96312->96314 96313 7df7e8 96313->96298 96315 79a12c __fread_nolock 96314->96315 96315->96302 96315->96306 96317 79a587 22 API calls 96317->96321 96318 79aec9 22 API calls 96319 79a0db CharUpperBuffW 96318->96319 96330 79a673 22 API calls 96319->96330 96321->96296 96321->96301 96321->96302 96321->96303 96321->96304 96321->96306 96321->96315 96321->96317 96321->96318 96328 794573 41 API calls _wcslen 96321->96328 96331 7948c8 23 API calls 96321->96331 96332 7949bd 22 API calls __fread_nolock 96321->96332 96333 79a673 22 API calls 96321->96333 96322->95418 96324 7afe0b 22 API calls 96323->96324 96325 796295 96324->96325 96326 7afddb 22 API calls 96325->96326 96327 7962a3 96326->96327 96327->96321 96328->96321 96329->96298 96330->96321 96331->96321 96332->96321 96333->96321 96334->96309 96335->96313 96336->96298 96338 7fdbdc GetFileAttributesW 96337->96338 96339 7fd4d5 96337->96339 96338->96339 96340 7fdbe8 FindFirstFileW 96338->96340 96339->95253 96340->96339 96341 7fdbf9 FindClose 96340->96341 96341->96339 96342 fc327b 96343 fc3282 96342->96343 96344 fc328a 96343->96344 96345 fc3320 96343->96345 96349 fc2f30 96344->96349 96362 fc3bd0 9 API calls 96345->96362 96348 fc3307 96363 fc0920 96349->96363 96352 fc3000 CreateFileW 96353 fc2fcf 96352->96353 96356 fc300d 96352->96356 96354 fc3029 VirtualAlloc 96353->96354 96353->96356 96360 fc3130 CloseHandle 96353->96360 96361 fc3140 VirtualFree 96353->96361 96366 fc3e40 GetPEB 96353->96366 96355 fc304a ReadFile 96354->96355 96354->96356 96355->96356 96357 fc3068 VirtualAlloc 96355->96357 96358 fc321c VirtualFree 96356->96358 96359 fc322a 96356->96359 96357->96353 96357->96356 96358->96359 96359->96348 96360->96353 96361->96353 96362->96348 96368 fc3de0 GetPEB 96363->96368 96365 fc0fab 96365->96353 96367 fc3e6a 96366->96367 96367->96352 96369 fc3e0a 96368->96369 96369->96365 96370 791033 96375 794c91 96370->96375 96374 791042 96376 79a961 22 API calls 96375->96376 96377 794cff 96376->96377 96383 793af0 96377->96383 96380 794d9c 96381 791038 96380->96381 96386 7951f7 22 API calls __fread_nolock 96380->96386 96382 7b00a3 29 API calls __onexit 96381->96382 96382->96374 96387 793b1c 96383->96387 96386->96380 96388 793b0f 96387->96388 96389 793b29 96387->96389 96388->96380 96389->96388 96390 793b30 RegOpenKeyExW 96389->96390 96390->96388 96391 793b4a RegQueryValueExW 96390->96391 96392 793b80 RegCloseKey 96391->96392 96393 793b6b 96391->96393 96392->96388 96393->96392 96394 7e3f75 96405 7aceb1 96394->96405 96396 7e3f8b 96397 7e4006 96396->96397 96472 7ae300 23 API calls 96396->96472 96414 79bf40 96397->96414 96400 7e3fe6 96402 7e4052 96400->96402 96473 801abf 22 API calls 96400->96473 96403 7e4a88 96402->96403 96474 80359c 82 API calls __wsopen_s 96402->96474 96406 7acebf 96405->96406 96407 7aced2 96405->96407 96475 79aceb 23 API calls messages 96406->96475 96409 7aced7 96407->96409 96410 7acf05 96407->96410 96413 7afddb 22 API calls 96409->96413 96476 79aceb 23 API calls messages 96410->96476 96412 7acec9 96412->96396 96413->96412 96477 79adf0 96414->96477 96416 79bf9d 96417 79bfa9 96416->96417 96418 7e04b6 96416->96418 96420 7e04c6 96417->96420 96421 79c01e 96417->96421 96496 80359c 82 API calls __wsopen_s 96418->96496 96497 80359c 82 API calls __wsopen_s 96420->96497 96482 79ac91 96421->96482 96424 79c7da 96429 7afe0b 22 API calls 96424->96429 96426 7f7120 22 API calls 96433 79c039 __fread_nolock messages 96426->96433 96439 79c808 __fread_nolock 96429->96439 96432 7e04f5 96435 7e055a 96432->96435 96498 7ad217 235 API calls 96432->96498 96433->96424 96433->96426 96433->96432 96433->96435 96436 7e091a 96433->96436 96438 79af8a 22 API calls 96433->96438 96433->96439 96442 79ec40 235 API calls 96433->96442 96443 7e08a5 96433->96443 96447 7e0591 96433->96447 96448 7e08f6 96433->96448 96454 7afddb 22 API calls 96433->96454 96455 79c237 96433->96455 96458 79c603 96433->96458 96459 7afe0b 22 API calls 96433->96459 96467 7e09bf 96433->96467 96469 79bbe0 40 API calls 96433->96469 96486 79ad81 96433->96486 96501 7f7099 22 API calls __fread_nolock 96433->96501 96502 815745 54 API calls _wcslen 96433->96502 96503 7aaa42 22 API calls messages 96433->96503 96504 7ff05c 40 API calls 96433->96504 96505 79a993 41 API calls 96433->96505 96506 79aceb 23 API calls messages 96433->96506 96435->96458 96499 80359c 82 API calls __wsopen_s 96435->96499 96509 803209 23 API calls 96436->96509 96437 7afe0b 22 API calls 96460 79c350 __fread_nolock messages 96437->96460 96438->96433 96439->96437 96442->96433 96444 79ec40 235 API calls 96443->96444 96446 7e08cf 96444->96446 96446->96458 96507 79a81b 41 API calls 96446->96507 96500 80359c 82 API calls __wsopen_s 96447->96500 96508 80359c 82 API calls __wsopen_s 96448->96508 96454->96433 96456 79c253 96455->96456 96457 79a8c7 22 API calls 96455->96457 96461 7e0976 96456->96461 96465 79c297 messages 96456->96465 96457->96456 96458->96402 96459->96433 96471 79c3ac 96460->96471 96495 7ace17 22 API calls messages 96460->96495 96510 79aceb 23 API calls messages 96461->96510 96465->96467 96493 79aceb 23 API calls messages 96465->96493 96466 79c335 96466->96467 96468 79c342 96466->96468 96467->96458 96511 80359c 82 API calls __wsopen_s 96467->96511 96494 79a704 22 API calls messages 96468->96494 96469->96433 96471->96402 96472->96400 96473->96397 96474->96403 96475->96412 96476->96412 96478 79ae01 96477->96478 96481 79ae1c messages 96477->96481 96479 79aec9 22 API calls 96478->96479 96480 79ae09 CharUpperBuffW 96479->96480 96480->96481 96481->96416 96483 79acae 96482->96483 96484 79acd1 96483->96484 96512 80359c 82 API calls __wsopen_s 96483->96512 96484->96433 96487 7dfadb 96486->96487 96488 79ad92 96486->96488 96489 7afddb 22 API calls 96488->96489 96490 79ad99 96489->96490 96513 79adcd 96490->96513 96493->96466 96494->96460 96495->96460 96496->96420 96497->96458 96498->96435 96499->96458 96500->96458 96501->96433 96502->96433 96503->96433 96504->96433 96505->96433 96506->96433 96507->96448 96508->96458 96509->96455 96510->96467 96511->96458 96512->96484 96517 79addd 96513->96517 96514 79adb6 96514->96433 96515 7afddb 22 API calls 96515->96517 96516 79a961 22 API calls 96516->96517 96517->96514 96517->96515 96517->96516 96518 79a8c7 22 API calls 96517->96518 96519 79adcd 22 API calls 96517->96519 96518->96517 96519->96517 96520 fc2cd0 96521 fc0920 GetPEB 96520->96521 96522 fc2dbb 96521->96522 96534 fc2bc0 96522->96534 96535 fc2bc9 Sleep 96534->96535 96536 fc2bd7 96535->96536 96537 792e37 96538 79a961 22 API calls 96537->96538 96539 792e4d 96538->96539 96616 794ae3 96539->96616 96541 792e6b 96542 793a5a 24 API calls 96541->96542 96543 792e7f 96542->96543 96544 799cb3 22 API calls 96543->96544 96545 792e8c 96544->96545 96546 794ecb 94 API calls 96545->96546 96547 792ea5 96546->96547 96548 792ead 96547->96548 96549 7d2cb0 96547->96549 96552 79a8c7 22 API calls 96548->96552 96646 802cf9 96549->96646 96551 7d2cc3 96553 7d2ccf 96551->96553 96555 794f39 68 API calls 96551->96555 96554 792ec3 96552->96554 96558 794f39 68 API calls 96553->96558 96630 796f88 22 API calls 96554->96630 96555->96553 96557 792ecf 96559 799cb3 22 API calls 96557->96559 96560 7d2ce5 96558->96560 96561 792edc 96559->96561 96672 793084 22 API calls 96560->96672 96631 79a81b 41 API calls 96561->96631 96564 792eec 96566 799cb3 22 API calls 96564->96566 96565 7d2d02 96673 793084 22 API calls 96565->96673 96568 792f12 96566->96568 96632 79a81b 41 API calls 96568->96632 96569 7d2d1e 96571 793a5a 24 API calls 96569->96571 96573 7d2d44 96571->96573 96572 792f21 96575 79a961 22 API calls 96572->96575 96674 793084 22 API calls 96573->96674 96577 792f3f 96575->96577 96576 7d2d50 96578 79a8c7 22 API calls 96576->96578 96633 793084 22 API calls 96577->96633 96580 7d2d5e 96578->96580 96675 793084 22 API calls 96580->96675 96582 792f4b 96634 7b4a28 40 API calls 3 library calls 96582->96634 96583 7d2d6d 96587 79a8c7 22 API calls 96583->96587 96585 792f59 96585->96560 96586 792f63 96585->96586 96635 7b4a28 40 API calls 3 library calls 96586->96635 96589 7d2d83 96587->96589 96676 793084 22 API calls 96589->96676 96590 792f6e 96590->96565 96592 792f78 96590->96592 96636 7b4a28 40 API calls 3 library calls 96592->96636 96593 7d2d90 96595 792f83 96595->96569 96596 792f8d 96595->96596 96637 7b4a28 40 API calls 3 library calls 96596->96637 96598 792f98 96599 792fdc 96598->96599 96638 793084 22 API calls 96598->96638 96599->96583 96600 792fe8 96599->96600 96600->96593 96640 7963eb 22 API calls 96600->96640 96602 792fbf 96604 79a8c7 22 API calls 96602->96604 96606 792fcd 96604->96606 96605 792ff8 96641 796a50 22 API calls 96605->96641 96639 793084 22 API calls 96606->96639 96609 793006 96642 7970b0 23 API calls 96609->96642 96613 793021 96614 793065 96613->96614 96643 796f88 22 API calls 96613->96643 96644 7970b0 23 API calls 96613->96644 96645 793084 22 API calls 96613->96645 96617 794af0 __wsopen_s 96616->96617 96618 796b57 22 API calls 96617->96618 96619 794b22 96617->96619 96618->96619 96620 794c6d 22 API calls 96619->96620 96629 794b58 96619->96629 96620->96619 96621 799cb3 22 API calls 96623 794c52 96621->96623 96622 799cb3 22 API calls 96622->96629 96624 79515f 22 API calls 96623->96624 96627 794c5e 96624->96627 96625 794c6d 22 API calls 96625->96629 96626 79515f 22 API calls 96626->96629 96627->96541 96628 794c29 96628->96621 96628->96627 96629->96622 96629->96625 96629->96626 96629->96628 96630->96557 96631->96564 96632->96572 96633->96582 96634->96585 96635->96590 96636->96595 96637->96598 96638->96602 96639->96599 96640->96605 96641->96609 96642->96613 96643->96613 96644->96613 96645->96613 96647 802d15 96646->96647 96648 79511f 64 API calls 96647->96648 96649 802d29 96648->96649 96650 802e66 75 API calls 96649->96650 96651 802d3b 96650->96651 96652 7950f5 40 API calls 96651->96652 96669 802d3f 96651->96669 96653 802d56 96652->96653 96654 7950f5 40 API calls 96653->96654 96655 802d66 96654->96655 96656 7950f5 40 API calls 96655->96656 96657 802d81 96656->96657 96658 7950f5 40 API calls 96657->96658 96659 802d9c 96658->96659 96660 79511f 64 API calls 96659->96660 96661 802db3 96660->96661 96662 7bea0c ___std_exception_copy 21 API calls 96661->96662 96663 802dba 96662->96663 96664 7bea0c ___std_exception_copy 21 API calls 96663->96664 96665 802dc4 96664->96665 96666 7950f5 40 API calls 96665->96666 96667 802dd8 96666->96667 96668 8028fe 27 API calls 96667->96668 96670 802dee 96668->96670 96669->96551 96670->96669 96671 8022ce 79 API calls 96670->96671 96671->96669 96672->96565 96673->96569 96674->96576 96675->96583 96676->96593 96677 793156 96680 793170 96677->96680 96681 793187 96680->96681 96682 7931eb 96681->96682 96683 79318c 96681->96683 96684 7931e9 96681->96684 96688 7d2dfb 96682->96688 96689 7931f1 96682->96689 96685 793199 96683->96685 96686 793265 PostQuitMessage 96683->96686 96687 7931d0 DefWindowProcW 96684->96687 96691 7d2e7c 96685->96691 96692 7931a4 96685->96692 96693 79316a 96686->96693 96687->96693 96736 7918e2 10 API calls 96688->96736 96694 7931f8 96689->96694 96695 79321d SetTimer RegisterWindowMessageW 96689->96695 96750 7fbf30 34 API calls ___scrt_fastfail 96691->96750 96697 7d2e68 96692->96697 96698 7931ae 96692->96698 96701 7d2d9c 96694->96701 96702 793201 KillTimer 96694->96702 96695->96693 96699 793246 CreatePopupMenu 96695->96699 96696 7d2e1c 96737 7ae499 42 API calls 96696->96737 96725 7fc161 96697->96725 96706 7d2e4d 96698->96706 96707 7931b9 96698->96707 96699->96693 96709 7d2dd7 MoveWindow 96701->96709 96710 7d2da1 96701->96710 96732 7930f2 Shell_NotifyIconW ___scrt_fastfail 96702->96732 96706->96687 96749 7f0ad7 22 API calls 96706->96749 96712 7931c4 96707->96712 96713 793253 96707->96713 96708 7d2e8e 96708->96687 96708->96693 96709->96693 96714 7d2da7 96710->96714 96715 7d2dc6 SetFocus 96710->96715 96711 793214 96733 793c50 DeleteObject DestroyWindow 96711->96733 96712->96687 96738 7930f2 Shell_NotifyIconW ___scrt_fastfail 96712->96738 96734 79326f 44 API calls ___scrt_fastfail 96713->96734 96714->96712 96719 7d2db0 96714->96719 96715->96693 96735 7918e2 10 API calls 96719->96735 96720 793263 96720->96693 96723 7d2e41 96739 793837 96723->96739 96726 7fc179 ___scrt_fastfail 96725->96726 96727 7fc276 96725->96727 96751 793923 96726->96751 96727->96693 96729 7fc25f KillTimer SetTimer 96729->96727 96730 7fc1a0 96730->96729 96731 7fc251 Shell_NotifyIconW 96730->96731 96731->96729 96732->96711 96733->96693 96734->96720 96735->96693 96736->96696 96737->96712 96738->96723 96740 793862 ___scrt_fastfail 96739->96740 96773 794212 96740->96773 96743 7938e8 96745 7d3386 Shell_NotifyIconW 96743->96745 96746 793906 Shell_NotifyIconW 96743->96746 96747 793923 24 API calls 96746->96747 96748 79391c 96747->96748 96748->96684 96749->96684 96750->96708 96752 79393f 96751->96752 96771 793a13 96751->96771 96753 796270 22 API calls 96752->96753 96754 79394d 96753->96754 96755 79395a 96754->96755 96756 7d3393 LoadStringW 96754->96756 96757 796b57 22 API calls 96755->96757 96758 7d33ad 96756->96758 96759 79396f 96757->96759 96762 79a8c7 22 API calls 96758->96762 96767 793994 ___scrt_fastfail 96758->96767 96760 7d33c9 96759->96760 96761 79397c 96759->96761 96764 796350 22 API calls 96760->96764 96761->96758 96763 793986 96761->96763 96762->96767 96765 796350 22 API calls 96763->96765 96766 7d33d7 96764->96766 96765->96767 96766->96767 96768 7933c6 22 API calls 96766->96768 96769 7939f9 Shell_NotifyIconW 96767->96769 96770 7d33f9 96768->96770 96769->96771 96772 7933c6 22 API calls 96770->96772 96771->96730 96772->96767 96774 7d35a4 96773->96774 96775 7938b7 96773->96775 96774->96775 96776 7d35ad DestroyIcon 96774->96776 96775->96743 96777 7fc874 42 API calls _strftime 96775->96777 96776->96775 96777->96743 96778 791cad SystemParametersInfoW 96779 7d2ba5 96780 7d2baf 96779->96780 96781 792b25 96779->96781 96783 793a5a 24 API calls 96780->96783 96807 792b83 7 API calls 96781->96807 96785 7d2bb8 96783->96785 96787 799cb3 22 API calls 96785->96787 96789 7d2bc6 96787->96789 96788 792b2f 96794 793837 49 API calls 96788->96794 96798 792b44 96788->96798 96790 7d2bce 96789->96790 96791 7d2bf5 96789->96791 96792 7933c6 22 API calls 96790->96792 96793 7933c6 22 API calls 96791->96793 96795 7d2bd9 96792->96795 96806 7d2bf1 GetForegroundWindow ShellExecuteW 96793->96806 96794->96798 96796 796350 22 API calls 96795->96796 96800 7d2be7 96796->96800 96799 792b5f 96798->96799 96811 7930f2 Shell_NotifyIconW ___scrt_fastfail 96798->96811 96802 792b66 SetCurrentDirectoryW 96799->96802 96803 7933c6 22 API calls 96800->96803 96805 792b7a 96802->96805 96803->96806 96804 7d2c26 96804->96799 96806->96804 96812 792cd4 7 API calls 96807->96812 96809 792b2a 96810 792c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96809->96810 96810->96788 96811->96799 96812->96809 96813 792de3 96814 792df0 __wsopen_s 96813->96814 96815 792e09 96814->96815 96816 7d2c2b ___scrt_fastfail 96814->96816 96817 793aa2 23 API calls 96815->96817 96818 7d2c47 GetOpenFileNameW 96816->96818 96819 792e12 96817->96819 96820 7d2c96 96818->96820 96829 792da5 96819->96829 96823 796b57 22 API calls 96820->96823 96825 7d2cab 96823->96825 96825->96825 96826 792e27 96847 7944a8 96826->96847 96830 7d1f50 __wsopen_s 96829->96830 96831 792db2 GetLongPathNameW 96830->96831 96832 796b57 22 API calls 96831->96832 96833 792dda 96832->96833 96834 793598 96833->96834 96835 79a961 22 API calls 96834->96835 96836 7935aa 96835->96836 96837 793aa2 23 API calls 96836->96837 96838 7935b5 96837->96838 96839 7935c0 96838->96839 96843 7d32eb 96838->96843 96840 79515f 22 API calls 96839->96840 96842 7935cc 96840->96842 96877 7935f3 96842->96877 96845 7d330d 96843->96845 96883 7ace60 41 API calls 96843->96883 96846 7935df 96846->96826 96848 794ecb 94 API calls 96847->96848 96849 7944cd 96848->96849 96850 7d3833 96849->96850 96851 794ecb 94 API calls 96849->96851 96852 802cf9 80 API calls 96850->96852 96853 7944e1 96851->96853 96854 7d3848 96852->96854 96853->96850 96855 7944e9 96853->96855 96856 7d384c 96854->96856 96857 7d3869 96854->96857 96859 7d3854 96855->96859 96860 7944f5 96855->96860 96861 794f39 68 API calls 96856->96861 96858 7afe0b 22 API calls 96857->96858 96869 7d38ae 96858->96869 96885 7fda5a 82 API calls 96859->96885 96884 79940c 136 API calls 2 library calls 96860->96884 96861->96859 96864 792e31 96865 7d3862 96865->96857 96866 7d3a5f 96872 7d3a67 96866->96872 96867 794f39 68 API calls 96867->96872 96869->96866 96869->96872 96874 799cb3 22 API calls 96869->96874 96886 7f967e 22 API calls __fread_nolock 96869->96886 96887 7f95ad 42 API calls _wcslen 96869->96887 96888 800b5a 22 API calls 96869->96888 96889 79a4a1 22 API calls __fread_nolock 96869->96889 96890 793ff7 22 API calls 96869->96890 96872->96867 96891 7f989b 82 API calls __wsopen_s 96872->96891 96874->96869 96878 793605 96877->96878 96882 793624 __fread_nolock 96877->96882 96881 7afe0b 22 API calls 96878->96881 96879 7afddb 22 API calls 96880 79363b 96879->96880 96880->96846 96881->96882 96882->96879 96883->96843 96884->96864 96885->96865 96886->96869 96887->96869 96888->96869 96889->96869 96890->96869 96891->96872 96892 791044 96897 7910f3 96892->96897 96894 79104a 96933 7b00a3 29 API calls __onexit 96894->96933 96896 791054 96934 791398 96897->96934 96901 79116a 96902 79a961 22 API calls 96901->96902 96903 791174 96902->96903 96904 79a961 22 API calls 96903->96904 96905 79117e 96904->96905 96906 79a961 22 API calls 96905->96906 96907 791188 96906->96907 96908 79a961 22 API calls 96907->96908 96909 7911c6 96908->96909 96910 79a961 22 API calls 96909->96910 96911 791292 96910->96911 96944 79171c 96911->96944 96915 7912c4 96916 79a961 22 API calls 96915->96916 96917 7912ce 96916->96917 96918 7a1940 9 API calls 96917->96918 96919 7912f9 96918->96919 96965 791aab 96919->96965 96921 791315 96922 791325 GetStdHandle 96921->96922 96923 79137a 96922->96923 96924 7d2485 96922->96924 96927 791387 OleInitialize 96923->96927 96924->96923 96925 7d248e 96924->96925 96926 7afddb 22 API calls 96925->96926 96928 7d2495 96926->96928 96927->96894 96972 80011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96928->96972 96930 7d249e 96973 800944 CreateThread 96930->96973 96932 7d24aa CloseHandle 96932->96923 96933->96896 96974 7913f1 96934->96974 96937 7913f1 22 API calls 96938 7913d0 96937->96938 96939 79a961 22 API calls 96938->96939 96940 7913dc 96939->96940 96941 796b57 22 API calls 96940->96941 96942 791129 96941->96942 96943 791bc3 6 API calls 96942->96943 96943->96901 96945 79a961 22 API calls 96944->96945 96946 79172c 96945->96946 96947 79a961 22 API calls 96946->96947 96948 791734 96947->96948 96949 79a961 22 API calls 96948->96949 96950 79174f 96949->96950 96951 7afddb 22 API calls 96950->96951 96952 79129c 96951->96952 96953 791b4a 96952->96953 96954 791b58 96953->96954 96955 79a961 22 API calls 96954->96955 96956 791b63 96955->96956 96957 79a961 22 API calls 96956->96957 96958 791b6e 96957->96958 96959 79a961 22 API calls 96958->96959 96960 791b79 96959->96960 96961 79a961 22 API calls 96960->96961 96962 791b84 96961->96962 96963 7afddb 22 API calls 96962->96963 96964 791b96 RegisterWindowMessageW 96963->96964 96964->96915 96966 7d272d 96965->96966 96967 791abb 96965->96967 96981 803209 23 API calls 96966->96981 96969 7afddb 22 API calls 96967->96969 96971 791ac3 96969->96971 96970 7d2738 96971->96921 96972->96930 96973->96932 96982 80092a 28 API calls 96973->96982 96975 79a961 22 API calls 96974->96975 96976 7913fc 96975->96976 96977 79a961 22 API calls 96976->96977 96978 791404 96977->96978 96979 79a961 22 API calls 96978->96979 96980 7913c6 96979->96980 96980->96937 96981->96970 96983 7e2a00 96997 79d7b0 messages 96983->96997 96984 79db11 PeekMessageW 96984->96997 96985 79d807 GetInputState 96985->96984 96985->96997 96987 7e1cbe TranslateAcceleratorW 96987->96997 96988 79da04 timeGetTime 96988->96997 96989 79db8f PeekMessageW 96989->96997 96990 79db73 TranslateMessage DispatchMessageW 96990->96989 96991 79dbaf Sleep 97009 79dbc0 96991->97009 96992 7e2b74 Sleep 96992->97009 96993 7ae551 timeGetTime 96993->97009 96994 7e1dda timeGetTime 97044 7ae300 23 API calls 96994->97044 96997->96984 96997->96985 96997->96987 96997->96988 96997->96989 96997->96990 96997->96991 96997->96992 96997->96994 96999 79d9d5 96997->96999 97011 79ec40 235 API calls 96997->97011 97012 7a1310 235 API calls 96997->97012 97013 79bf40 235 API calls 96997->97013 97015 79dfd0 96997->97015 97038 7aedf6 96997->97038 97043 79dd50 235 API calls 96997->97043 97045 803a2a 23 API calls 96997->97045 97046 80359c 82 API calls __wsopen_s 96997->97046 96998 7e2c0b GetExitCodeProcess 97001 7e2c37 CloseHandle 96998->97001 97002 7e2c21 WaitForSingleObject 96998->97002 97001->97009 97002->96997 97002->97001 97003 7e2a31 97003->96999 97004 8229bf GetForegroundWindow 97004->97009 97005 7e2ca9 Sleep 97005->96997 97009->96993 97009->96997 97009->96998 97009->96999 97009->97003 97009->97004 97009->97005 97047 815658 23 API calls 97009->97047 97048 7fe97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97009->97048 97049 7fd4dc 47 API calls 97009->97049 97011->96997 97012->96997 97013->96997 97016 79e010 97015->97016 97031 79e0dc messages 97016->97031 97052 7b0242 5 API calls __Init_thread_wait 97016->97052 97019 7e2fca 97021 79a961 22 API calls 97019->97021 97019->97031 97020 79a961 22 API calls 97020->97031 97022 7e2fe4 97021->97022 97053 7b00a3 29 API calls __onexit 97022->97053 97026 7e2fee 97054 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97026->97054 97030 79a8c7 22 API calls 97030->97031 97031->97020 97031->97030 97032 7a04f0 22 API calls 97031->97032 97033 79ec40 235 API calls 97031->97033 97034 79e3e1 97031->97034 97037 80359c 82 API calls 97031->97037 97050 79a81b 41 API calls 97031->97050 97051 7aa308 235 API calls 97031->97051 97055 7b0242 5 API calls __Init_thread_wait 97031->97055 97056 7b00a3 29 API calls __onexit 97031->97056 97057 7b01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97031->97057 97058 8147d4 235 API calls 97031->97058 97059 8168c1 235 API calls 97031->97059 97032->97031 97033->97031 97034->96997 97037->97031 97040 7aee12 97038->97040 97041 7aee09 97038->97041 97039 7aee36 IsDialogMessageW 97039->97040 97039->97041 97040->97039 97040->97041 97042 7eefaf GetClassLongW 97040->97042 97041->96997 97042->97039 97042->97040 97043->96997 97044->96997 97045->96997 97046->96997 97047->97009 97048->97009 97049->97009 97050->97031 97051->97031 97052->97019 97053->97026 97054->97031 97055->97031 97056->97031 97057->97031 97058->97031 97059->97031 97060 7c8402 97065 7c81be 97060->97065 97063 7c842a 97070 7c81ef try_get_first_available_module 97065->97070 97067 7c83ee 97084 7c27ec 26 API calls __cftof 97067->97084 97069 7c8343 97069->97063 97077 7d0984 97069->97077 97070->97070 97073 7c8338 97070->97073 97080 7b8e0b 40 API calls 2 library calls 97070->97080 97072 7c838c 97072->97073 97081 7b8e0b 40 API calls 2 library calls 97072->97081 97073->97069 97083 7bf2d9 20 API calls __dosmaperr 97073->97083 97075 7c83ab 97075->97073 97082 7b8e0b 40 API calls 2 library calls 97075->97082 97085 7d0081 97077->97085 97079 7d099f 97079->97063 97080->97072 97081->97075 97082->97073 97083->97067 97084->97069 97088 7d008d __FrameHandler3::FrameUnwindToState 97085->97088 97086 7d009b 97142 7bf2d9 20 API calls __dosmaperr 97086->97142 97088->97086 97090 7d00d4 97088->97090 97089 7d00a0 97143 7c27ec 26 API calls __cftof 97089->97143 97096 7d065b 97090->97096 97094 7d00aa __fread_nolock 97094->97079 97097 7d0678 97096->97097 97098 7d068d 97097->97098 97099 7d06a6 97097->97099 97159 7bf2c6 20 API calls __dosmaperr 97098->97159 97145 7c5221 97099->97145 97102 7d0692 97160 7bf2d9 20 API calls __dosmaperr 97102->97160 97103 7d06ab 97104 7d06cb 97103->97104 97105 7d06b4 97103->97105 97158 7d039a CreateFileW 97104->97158 97161 7bf2c6 20 API calls __dosmaperr 97105->97161 97109 7d06b9 97162 7bf2d9 20 API calls __dosmaperr 97109->97162 97110 7d0781 GetFileType 97113 7d078c GetLastError 97110->97113 97114 7d07d3 97110->97114 97112 7d0756 GetLastError 97164 7bf2a3 20 API calls __dosmaperr 97112->97164 97165 7bf2a3 20 API calls __dosmaperr 97113->97165 97167 7c516a 21 API calls 2 library calls 97114->97167 97115 7d0704 97115->97110 97115->97112 97163 7d039a CreateFileW 97115->97163 97119 7d079a CloseHandle 97119->97102 97122 7d07c3 97119->97122 97121 7d0749 97121->97110 97121->97112 97166 7bf2d9 20 API calls __dosmaperr 97122->97166 97124 7d07f4 97126 7d0840 97124->97126 97168 7d05ab 72 API calls 3 library calls 97124->97168 97125 7d07c8 97125->97102 97130 7d086d 97126->97130 97169 7d014d 72 API calls 4 library calls 97126->97169 97129 7d0866 97129->97130 97131 7d087e 97129->97131 97132 7c86ae __wsopen_s 29 API calls 97130->97132 97133 7d00f8 97131->97133 97134 7d08fc CloseHandle 97131->97134 97132->97133 97144 7d0121 LeaveCriticalSection __wsopen_s 97133->97144 97170 7d039a CreateFileW 97134->97170 97136 7d0927 97137 7d0931 GetLastError 97136->97137 97138 7d095d 97136->97138 97171 7bf2a3 20 API calls __dosmaperr 97137->97171 97138->97133 97140 7d093d 97172 7c5333 21 API calls 2 library calls 97140->97172 97142->97089 97143->97094 97144->97094 97146 7c522d __FrameHandler3::FrameUnwindToState 97145->97146 97173 7c2f5e EnterCriticalSection 97146->97173 97149 7c5234 97150 7c5259 97149->97150 97154 7c52c7 EnterCriticalSection 97149->97154 97157 7c527b 97149->97157 97152 7c5000 __wsopen_s 21 API calls 97150->97152 97151 7c52a4 __fread_nolock 97151->97103 97153 7c525e 97152->97153 97153->97157 97177 7c5147 EnterCriticalSection 97153->97177 97156 7c52d4 LeaveCriticalSection 97154->97156 97154->97157 97156->97149 97174 7c532a 97157->97174 97158->97115 97159->97102 97160->97133 97161->97109 97162->97102 97163->97121 97164->97102 97165->97119 97166->97125 97167->97124 97168->97126 97169->97129 97170->97136 97171->97140 97172->97138 97173->97149 97178 7c2fa6 LeaveCriticalSection 97174->97178 97176 7c5331 97176->97151 97177->97157 97178->97176 97179 7e3a41 97183 8010c0 97179->97183 97181 7e3a4c 97182 8010c0 53 API calls 97181->97182 97182->97181 97184 8010fa 97183->97184 97188 8010cd 97183->97188 97184->97181 97185 8010fc 97195 7afa11 53 API calls 97185->97195 97186 801101 97189 797510 53 API calls 97186->97189 97188->97184 97188->97185 97188->97186 97192 8010f4 97188->97192 97190 801108 97189->97190 97191 796350 22 API calls 97190->97191 97191->97184 97194 79b270 39 API calls 97192->97194 97194->97184 97195->97186

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 245 7942de-79434d call 79a961 GetVersionExW call 796b57 250 7d3617-7d362a 245->250 251 794353 245->251 253 7d362b-7d362f 250->253 252 794355-794357 251->252 254 79435d-7943bc call 7993b2 call 7937a0 252->254 255 7d3656 252->255 256 7d3631 253->256 257 7d3632-7d363e 253->257 274 7d37df-7d37e6 254->274 275 7943c2-7943c4 254->275 260 7d365d-7d3660 255->260 256->257 257->253 259 7d3640-7d3642 257->259 259->252 262 7d3648-7d364f 259->262 263 79441b-794435 GetCurrentProcess IsWow64Process 260->263 264 7d3666-7d36a8 260->264 262->250 266 7d3651 262->266 269 794494-79449a 263->269 270 794437 263->270 264->263 267 7d36ae-7d36b1 264->267 266->255 272 7d36db-7d36e5 267->272 273 7d36b3-7d36bd 267->273 271 79443d-794449 269->271 270->271 276 79444f-79445e LoadLibraryA 271->276 277 7d3824-7d3828 GetSystemInfo 271->277 281 7d36f8-7d3702 272->281 282 7d36e7-7d36f3 272->282 278 7d36bf-7d36c5 273->278 279 7d36ca-7d36d6 273->279 283 7d37e8 274->283 284 7d3806-7d3809 274->284 275->260 280 7943ca-7943dd 275->280 285 79449c-7944a6 GetSystemInfo 276->285 286 794460-79446e GetProcAddress 276->286 278->263 279->263 287 7943e3-7943e5 280->287 288 7d3726-7d372f 280->288 290 7d3715-7d3721 281->290 291 7d3704-7d3710 281->291 282->263 289 7d37ee 283->289 292 7d380b-7d381a 284->292 293 7d37f4-7d37fc 284->293 296 794476-794478 285->296 286->285 295 794470-794474 GetNativeSystemInfo 286->295 297 7d374d-7d3762 287->297 298 7943eb-7943ee 287->298 299 7d373c-7d3748 288->299 300 7d3731-7d3737 288->300 289->293 290->263 291->263 292->289 294 7d381c-7d3822 292->294 293->284 294->293 295->296 303 79447a-79447b FreeLibrary 296->303 304 794481-794493 296->304 301 7d376f-7d377b 297->301 302 7d3764-7d376a 297->302 305 7d3791-7d3794 298->305 306 7943f4-79440f 298->306 299->263 300->263 301->263 302->263 303->304 305->263 307 7d379a-7d37c1 305->307 308 794415 306->308 309 7d3780-7d378c 306->309 310 7d37ce-7d37da 307->310 311 7d37c3-7d37c9 307->311 308->263 309->263 310->263 311->263
                                                      APIs
                                                      • GetVersionExW.KERNEL32(?), ref: 0079430D
                                                        • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                      • GetCurrentProcess.KERNEL32(?,0082CB64,00000000,?,?), ref: 00794422
                                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 00794429
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00794454
                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00794466
                                                      • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00794474
                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 0079447B
                                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 007944A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                      • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                      • API String ID: 3290436268-3101561225
                                                      • Opcode ID: 2228f5b7b828b149cff7f3c8b2499314bc9c8ed214828699881e29244aa9ffe6
                                                      • Instruction ID: 935d42eda8074b7b9355b454a01aaabd4ec989fa7af42986b73f2fb7e7bcab03
                                                      • Opcode Fuzzy Hash: 2228f5b7b828b149cff7f3c8b2499314bc9c8ed214828699881e29244aa9ffe6
                                                      • Instruction Fuzzy Hash: C8A1957590A2C0DFCF11CB797E896AA7FB57B36300B1E6499D04393B23D6AC4509CB62

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 672 7942a2-7942ba CreateStreamOnHGlobal 673 7942da-7942dd 672->673 674 7942bc-7942d3 FindResourceExW 672->674 675 7942d9 674->675 676 7d35ba-7d35c9 LoadResource 674->676 675->673 676->675 677 7d35cf-7d35dd SizeofResource 676->677 677->675 678 7d35e3-7d35ee LockResource 677->678 678->675 679 7d35f4-7d3612 678->679 679->675
                                                      APIs
                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,007950AA,?,?,00000000,00000000), ref: 007942B2
                                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,007950AA,?,?,00000000,00000000), ref: 007942C9
                                                      • LoadResource.KERNEL32(?,00000000,?,?,007950AA,?,?,00000000,00000000,?,?,?,?,?,?,00794F20), ref: 007D35BE
                                                      • SizeofResource.KERNEL32(?,00000000,?,?,007950AA,?,?,00000000,00000000,?,?,?,?,?,?,00794F20), ref: 007D35D3
                                                      • LockResource.KERNEL32(007950AA,?,?,007950AA,?,?,00000000,00000000,?,?,?,?,?,?,00794F20,?), ref: 007D35E6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                      • String ID: SCRIPT
                                                      • API String ID: 3051347437-3967369404
                                                      • Opcode ID: df762fc7142339c7c8f76ed7cd9f90705af9451b7ab60a759ab47e22ca71a3d1
                                                      • Instruction ID: 10dc61bd9401ea3704bbcba36bd53c346990acf38339ccb6d1e52d825f8aea60
                                                      • Opcode Fuzzy Hash: df762fc7142339c7c8f76ed7cd9f90705af9451b7ab60a759ab47e22ca71a3d1
                                                      • Instruction Fuzzy Hash: C6113C71200701BFEB218B65EC49F6B7BB9FFC5B51F248169B412D6250DB71D8019660
                                                      APIs
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00792B6B
                                                        • Part of subcall function 00793A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00861418,?,00792E7F,?,?,?,00000000), ref: 00793A78
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                      • GetForegroundWindow.USER32(runas,?,?,?,?,?,00852224), ref: 007D2C10
                                                      • ShellExecuteW.SHELL32(00000000,?,?,00852224), ref: 007D2C17
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                      • String ID: runas
                                                      • API String ID: 448630720-4000483414
                                                      • Opcode ID: 465769d00c76b2f92b7198e9efcd29877f991db410efd7770d5d6a68e6bbb299
                                                      • Instruction ID: 9577fe96b75e3bb4f651245f3c57196b9cf4e365eafc822a574ccb1d5414e23c
                                                      • Opcode Fuzzy Hash: 465769d00c76b2f92b7198e9efcd29877f991db410efd7770d5d6a68e6bbb299
                                                      • Instruction Fuzzy Hash: FC11D271208301EACF14FF64F85AD7EBBA5ABA1341F48542DF556431A3DF2D890A8712
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,007D5222), ref: 007FDBCE
                                                      • GetFileAttributesW.KERNELBASE(?), ref: 007FDBDD
                                                      • FindFirstFileW.KERNELBASE(?,?), ref: 007FDBEE
                                                      • FindClose.KERNEL32(00000000), ref: 007FDBFA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: FileFind$AttributesCloseFirstlstrlen
                                                      • String ID:
                                                      • API String ID: 2695905019-0
                                                      • Opcode ID: 296031b08773853ac09f0e63b522701cb638e50aa2617ff01bc314b57e813bb3
                                                      • Instruction ID: 792e1cac755db5d6ba580578b15ecdaa7cace16a7210d0a25c971493f3e8700e
                                                      • Opcode Fuzzy Hash: 296031b08773853ac09f0e63b522701cb638e50aa2617ff01bc314b57e813bb3
                                                      • Instruction Fuzzy Hash: 9CF0A0308109189B82306B78AC0E8BE37ADAE01334F108702F976C22E0EBB45D56C6E5
                                                      APIs
                                                      • GetInputState.USER32 ref: 0079D807
                                                      • timeGetTime.WINMM ref: 0079DA07
                                                      • Sleep.KERNEL32(0000000A), ref: 0079DBB1
                                                      • Sleep.KERNEL32(0000000A), ref: 007E2B76
                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 007E2C11
                                                      • WaitForSingleObject.KERNEL32(?,00000000), ref: 007E2C29
                                                      • CloseHandle.KERNEL32(?), ref: 007E2C3D
                                                      • Sleep.KERNEL32(?,CCCCCCCC,00000000), ref: 007E2CA9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Sleep$CloseCodeExitHandleInputObjectProcessSingleStateTimeWaittime
                                                      • String ID:
                                                      • API String ID: 388478766-0
                                                      • Opcode ID: ff092e6ed1a88977743b0b3ad21a61cfb57954e190c9e36c3967a827459b6719
                                                      • Instruction ID: 5ba9065383869afa9532a8f43e3f433886421c8e58b578957856e4d8a77b243c
                                                      • Opcode Fuzzy Hash: ff092e6ed1a88977743b0b3ad21a61cfb57954e190c9e36c3967a827459b6719
                                                      • Instruction Fuzzy Hash: F1423370608281DFDB34DF25D848B7AB7E5FF8A310F148619E456872A2D778EC45CB92

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00792D07
                                                      • RegisterClassExW.USER32(00000030), ref: 00792D31
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00792D42
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00792D5F
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00792D6F
                                                      • LoadIconW.USER32(000000A9), ref: 00792D85
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00792D94
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-1005189915
                                                      • Opcode ID: d7a834d8f64b3c85fc428541e9d4ea17a40d9ce48508736c057a7efdf9eb092b
                                                      • Instruction ID: 80e129b6d6d74aa8acd9c5711094b239631249b26e6baf77557b16a61d606595
                                                      • Opcode Fuzzy Hash: d7a834d8f64b3c85fc428541e9d4ea17a40d9ce48508736c057a7efdf9eb092b
                                                      • Instruction Fuzzy Hash: 2121E0B1901218AFDF10DFA8E889BEDBFB4FB08701F04811AF611A62A0D7B54544CF91

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 313 7c8d45-7c8d55 314 7c8d6f-7c8d71 313->314 315 7c8d57-7c8d6a call 7bf2c6 call 7bf2d9 313->315 317 7c90d9-7c90e6 call 7bf2c6 call 7bf2d9 314->317 318 7c8d77-7c8d7d 314->318 331 7c90f1 315->331 336 7c90ec call 7c27ec 317->336 318->317 321 7c8d83-7c8dae 318->321 321->317 324 7c8db4-7c8dbd 321->324 327 7c8dbf-7c8dd2 call 7bf2c6 call 7bf2d9 324->327 328 7c8dd7-7c8dd9 324->328 327->336 329 7c8ddf-7c8de3 328->329 330 7c90d5-7c90d7 328->330 329->330 334 7c8de9-7c8ded 329->334 335 7c90f4-7c90f9 330->335 331->335 334->327 339 7c8def-7c8e06 334->339 336->331 342 7c8e08-7c8e0b 339->342 343 7c8e23-7c8e2c 339->343 344 7c8e0d-7c8e13 342->344 345 7c8e15-7c8e1e 342->345 346 7c8e2e-7c8e45 call 7bf2c6 call 7bf2d9 call 7c27ec 343->346 347 7c8e4a-7c8e54 343->347 344->345 344->346 350 7c8ebf-7c8ed9 345->350 375 7c900c 346->375 348 7c8e5b-7c8e79 call 7c3820 call 7c29c8 * 2 347->348 349 7c8e56-7c8e58 347->349 383 7c8e7b-7c8e91 call 7bf2d9 call 7bf2c6 348->383 384 7c8e96-7c8ebc call 7c9424 348->384 349->348 352 7c8fad-7c8fb6 call 7cf89b 350->352 353 7c8edf-7c8eef 350->353 366 7c8fb8-7c8fca 352->366 367 7c9029 352->367 353->352 356 7c8ef5-7c8ef7 353->356 356->352 360 7c8efd-7c8f23 356->360 360->352 364 7c8f29-7c8f3c 360->364 364->352 371 7c8f3e-7c8f40 364->371 366->367 369 7c8fcc-7c8fdb GetConsoleMode 366->369 373 7c902d-7c9045 ReadFile 367->373 369->367 374 7c8fdd-7c8fe1 369->374 371->352 376 7c8f42-7c8f6d 371->376 378 7c9047-7c904d 373->378 379 7c90a1-7c90ac GetLastError 373->379 374->373 380 7c8fe3-7c8ffd ReadConsoleW 374->380 381 7c900f-7c9019 call 7c29c8 375->381 376->352 382 7c8f6f-7c8f82 376->382 378->379 387 7c904f 378->387 385 7c90ae-7c90c0 call 7bf2d9 call 7bf2c6 379->385 386 7c90c5-7c90c8 379->386 390 7c901e-7c9027 380->390 391 7c8fff GetLastError 380->391 381->335 382->352 395 7c8f84-7c8f86 382->395 383->375 384->350 385->375 392 7c90ce-7c90d0 386->392 393 7c9005-7c900b call 7bf2a3 386->393 389 7c9052-7c9064 387->389 389->381 400 7c9066-7c906a 389->400 390->389 391->393 392->381 393->375 395->352 403 7c8f88-7c8fa8 395->403 406 7c906c-7c907c call 7c8a61 400->406 407 7c9083-7c908e 400->407 403->352 418 7c907f-7c9081 406->418 412 7c909a-7c909f call 7c88a1 407->412 413 7c9090 call 7c8bb1 407->413 419 7c9095-7c9098 412->419 413->419 418->381 419->418
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .{
                                                      • API String ID: 0-1852962426
                                                      • Opcode ID: ab936efb722ea5e9237c30e194172dd80fc5a260fb85205e446c0af0a29a7d09
                                                      • Instruction ID: 0f5b7d358a80d577511591812af26291292ecbb365acb0f1d209004dc265aaad
                                                      • Opcode Fuzzy Hash: ab936efb722ea5e9237c30e194172dd80fc5a260fb85205e446c0af0a29a7d09
                                                      • Instruction Fuzzy Hash: 96C1E47590424AEFDB51DFA8D849FEDBBB0BF09310F04409DE915AB392CB789981CB61

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 421 7d065b-7d068b call 7d042f 424 7d068d-7d0698 call 7bf2c6 421->424 425 7d06a6-7d06b2 call 7c5221 421->425 430 7d069a-7d06a1 call 7bf2d9 424->430 431 7d06cb-7d0714 call 7d039a 425->431 432 7d06b4-7d06c9 call 7bf2c6 call 7bf2d9 425->432 441 7d097d-7d0983 430->441 439 7d0716-7d071f 431->439 440 7d0781-7d078a GetFileType 431->440 432->430 443 7d0756-7d077c GetLastError call 7bf2a3 439->443 444 7d0721-7d0725 439->444 445 7d078c-7d07bd GetLastError call 7bf2a3 CloseHandle 440->445 446 7d07d3-7d07d6 440->446 443->430 444->443 450 7d0727-7d0754 call 7d039a 444->450 445->430 460 7d07c3-7d07ce call 7bf2d9 445->460 448 7d07df-7d07e5 446->448 449 7d07d8-7d07dd 446->449 453 7d07e9-7d0837 call 7c516a 448->453 454 7d07e7 448->454 449->453 450->440 450->443 464 7d0839-7d0845 call 7d05ab 453->464 465 7d0847-7d086b call 7d014d 453->465 454->453 460->430 464->465 470 7d086f-7d0879 call 7c86ae 464->470 471 7d086d 465->471 472 7d087e-7d08c1 465->472 470->441 471->470 474 7d08c3-7d08c7 472->474 475 7d08e2-7d08f0 472->475 474->475 477 7d08c9-7d08dd 474->477 478 7d097b 475->478 479 7d08f6-7d08fa 475->479 477->475 478->441 479->478 480 7d08fc-7d092f CloseHandle call 7d039a 479->480 483 7d0931-7d095d GetLastError call 7bf2a3 call 7c5333 480->483 484 7d0963-7d0977 480->484 483->484 484->478
                                                      APIs
                                                        • Part of subcall function 007D039A: CreateFileW.KERNELBASE(00000000,00000000,?,007D0704,?,?,00000000,?,007D0704,00000000,0000000C), ref: 007D03B7
                                                      • GetLastError.KERNEL32 ref: 007D076F
                                                      • __dosmaperr.LIBCMT ref: 007D0776
                                                      • GetFileType.KERNELBASE(00000000), ref: 007D0782
                                                      • GetLastError.KERNEL32 ref: 007D078C
                                                      • __dosmaperr.LIBCMT ref: 007D0795
                                                      • CloseHandle.KERNEL32(00000000), ref: 007D07B5
                                                      • CloseHandle.KERNEL32(?), ref: 007D08FF
                                                      • GetLastError.KERNEL32 ref: 007D0931
                                                      • __dosmaperr.LIBCMT ref: 007D0938
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                      • String ID: H
                                                      • API String ID: 4237864984-2852464175
                                                      • Opcode ID: 65d95e3a64dd887d27aeda33d1edca6085ba6861d52afa7e25bd68a292311cad
                                                      • Instruction ID: e41a6e7cdb754b49df84f6c576ad8e7cce330381d4aac5ee217ae32bc909bc39
                                                      • Opcode Fuzzy Hash: 65d95e3a64dd887d27aeda33d1edca6085ba6861d52afa7e25bd68a292311cad
                                                      • Instruction Fuzzy Hash: 51A10232A001089FDF19EF68DC55BAE7BB0AB46320F14515EF8159F3D1DB799812CB91

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00793A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00861418,?,00792E7F,?,?,?,00000000), ref: 00793A78
                                                        • Part of subcall function 00793357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00793379
                                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0079356A
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 007D318D
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 007D31CE
                                                      • RegCloseKey.ADVAPI32(?), ref: 007D3210
                                                      • _wcslen.LIBCMT ref: 007D3277
                                                      • _wcslen.LIBCMT ref: 007D3286
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                      • API String ID: 98802146-2727554177
                                                      • Opcode ID: d62bb3127b58dec58d975d90d18ad6bd2ab21115bfc2ad24c3999ac395383a54
                                                      • Instruction ID: d5fa5aa0d6b791d432f35919a0b0239c36dec11d36a9d2d3caac563c402812ee
                                                      • Opcode Fuzzy Hash: d62bb3127b58dec58d975d90d18ad6bd2ab21115bfc2ad24c3999ac395383a54
                                                      • Instruction Fuzzy Hash: 6971AB714047019EC714EF69ED859ABBBE8FF85340F41182EF185833B0EB789A48CB62

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00792B8E
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00792B9D
                                                      • LoadIconW.USER32(00000063), ref: 00792BB3
                                                      • LoadIconW.USER32(000000A4), ref: 00792BC5
                                                      • LoadIconW.USER32(000000A2), ref: 00792BD7
                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00792BEF
                                                      • RegisterClassExW.USER32(?), ref: 00792C40
                                                        • Part of subcall function 00792CD4: GetSysColorBrush.USER32(0000000F), ref: 00792D07
                                                        • Part of subcall function 00792CD4: RegisterClassExW.USER32(00000030), ref: 00792D31
                                                        • Part of subcall function 00792CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00792D42
                                                        • Part of subcall function 00792CD4: InitCommonControlsEx.COMCTL32(?), ref: 00792D5F
                                                        • Part of subcall function 00792CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00792D6F
                                                        • Part of subcall function 00792CD4: LoadIconW.USER32(000000A9), ref: 00792D85
                                                        • Part of subcall function 00792CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00792D94
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                      • String ID: #$0$AutoIt v3
                                                      • API String ID: 423443420-4155596026
                                                      • Opcode ID: 8b5a332919a86c8be80270d368716aeca54c43b3f662a562aba5404b9c292e24
                                                      • Instruction ID: d398288a8b67f5b24e8047e9290b19c75eedd2a1bc62831b76022c300fefb2a6
                                                      • Opcode Fuzzy Hash: 8b5a332919a86c8be80270d368716aeca54c43b3f662a562aba5404b9c292e24
                                                      • Instruction Fuzzy Hash: F4213970E10318AFDF119FA9EE49AAD7FB4FB08B50F09502AE501A67A1D7F90540DF90

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 562 793170-793185 563 7931e5-7931e7 562->563 564 793187-79318a 562->564 563->564 567 7931e9 563->567 565 7931eb 564->565 566 79318c-793193 564->566 571 7d2dfb-7d2e23 call 7918e2 call 7ae499 565->571 572 7931f1-7931f6 565->572 568 793199-79319e 566->568 569 793265-79326d PostQuitMessage 566->569 570 7931d0-7931d8 DefWindowProcW 567->570 574 7d2e7c-7d2e90 call 7fbf30 568->574 575 7931a4-7931a8 568->575 577 793219-79321b 569->577 576 7931de-7931e4 570->576 607 7d2e28-7d2e2f 571->607 578 7931f8-7931fb 572->578 579 79321d-793244 SetTimer RegisterWindowMessageW 572->579 574->577 600 7d2e96 574->600 581 7d2e68-7d2e72 call 7fc161 575->581 582 7931ae-7931b3 575->582 577->576 585 7d2d9c-7d2d9f 578->585 586 793201-793214 KillTimer call 7930f2 call 793c50 578->586 579->577 583 793246-793251 CreatePopupMenu 579->583 596 7d2e77 581->596 590 7d2e4d-7d2e54 582->590 591 7931b9-7931be 582->591 583->577 593 7d2dd7-7d2df6 MoveWindow 585->593 594 7d2da1-7d2da5 585->594 586->577 590->570 603 7d2e5a-7d2e63 call 7f0ad7 590->603 598 793253-793263 call 79326f 591->598 599 7931c4-7931ca 591->599 593->577 601 7d2da7-7d2daa 594->601 602 7d2dc6-7d2dd2 SetFocus 594->602 596->577 598->577 599->570 599->607 600->570 601->599 608 7d2db0-7d2dc1 call 7918e2 601->608 602->577 603->570 607->570 611 7d2e35-7d2e48 call 7930f2 call 793837 607->611 608->577 611->570
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0079316A,?,?), ref: 007931D8
                                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,0079316A,?,?), ref: 00793204
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00793227
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0079316A,?,?), ref: 00793232
                                                      • CreatePopupMenu.USER32 ref: 00793246
                                                      • PostQuitMessage.USER32(00000000), ref: 00793267
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                      • String ID: TaskbarCreated
                                                      • API String ID: 129472671-2362178303
                                                      • Opcode ID: 8f5fa65054e9bd9c705e8232267590b5085ef3835745df2516cb92f2fb5dd8de
                                                      • Instruction ID: b88ead795fda486ace0de007072902b9d5d3a1b483f53d4068bbec3cff35ffe2
                                                      • Opcode Fuzzy Hash: 8f5fa65054e9bd9c705e8232267590b5085ef3835745df2516cb92f2fb5dd8de
                                                      • Instruction Fuzzy Hash: CC41EA31244608ABDF245BB8BD4DB7D3A5AF705340F094126F512C63B3C7AD9A42D7A1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 618 fc2f30-fc2fde call fc0920 621 fc2fe5-fc300b call fc3e40 CreateFileW 618->621 624 fc300d 621->624 625 fc3012-fc3022 621->625 626 fc315d-fc3161 624->626 633 fc3029-fc3043 VirtualAlloc 625->633 634 fc3024 625->634 627 fc31a3-fc31a6 626->627 628 fc3163-fc3167 626->628 630 fc31a9-fc31b0 627->630 631 fc3169-fc316c 628->631 632 fc3173-fc3177 628->632 637 fc3205-fc321a 630->637 638 fc31b2-fc31bd 630->638 631->632 639 fc3179-fc3183 632->639 640 fc3187-fc318b 632->640 635 fc304a-fc3061 ReadFile 633->635 636 fc3045 633->636 634->626 641 fc3068-fc30a8 VirtualAlloc 635->641 642 fc3063 635->642 636->626 645 fc321c-fc3227 VirtualFree 637->645 646 fc322a-fc3232 637->646 643 fc31bf 638->643 644 fc31c1-fc31cd 638->644 639->640 647 fc318d-fc3197 640->647 648 fc319b 640->648 649 fc30af-fc30ca call fc4090 641->649 650 fc30aa 641->650 642->626 643->637 651 fc31cf-fc31df 644->651 652 fc31e1-fc31ed 644->652 645->646 647->648 648->627 658 fc30d5-fc30df 649->658 650->626 654 fc3203 651->654 655 fc31ef-fc31f8 652->655 656 fc31fa-fc3200 652->656 654->630 655->654 656->654 659 fc30e1-fc3110 call fc4090 658->659 660 fc3112-fc3126 call fc3ea0 658->660 659->658 665 fc3128 660->665 666 fc312a-fc312e 660->666 665->626 668 fc313a-fc313e 666->668 669 fc3130-fc3134 CloseHandle 666->669 670 fc314e-fc3157 668->670 671 fc3140-fc314b VirtualFree 668->671 669->668 670->621 670->626 671->670
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00FC3001
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00FC3227
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725960722.0000000000FC0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_fc0000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CreateFileFreeVirtual
                                                      • String ID:
                                                      • API String ID: 204039940-0
                                                      • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                      • Instruction ID: 876eafe1ba234d337f9766aa601827b20a66d3bd8bf0b8fbc036638aedc4bdba
                                                      • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                      • Instruction Fuzzy Hash: 6BA11671E0020AEFDB14CFA4C995FEEBBB5BF48314F248159E211AB280C7759A45DB54

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 682 792c63-792cd3 CreateWindowExW * 2 ShowWindow * 2
                                                      APIs
                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00792C91
                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00792CB2
                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00791CAD,?), ref: 00792CC6
                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00791CAD,?), ref: 00792CCF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateShow
                                                      • String ID: AutoIt v3$edit
                                                      • API String ID: 1584632944-3779509399
                                                      • Opcode ID: 00493fde55ffb1af6400b394ba6a67bef2637cb5254a8929ed13d0807753ef19
                                                      • Instruction ID: 85e585367615bd840bfe22b5ca990b4eff3bd5d3110f68de9ec868e68df2204f
                                                      • Opcode Fuzzy Hash: 00493fde55ffb1af6400b394ba6a67bef2637cb5254a8929ed13d0807753ef19
                                                      • Instruction Fuzzy Hash: ECF03A755402907AEB310717AC0CE7B2EBDF7CAF50B06501AF901A63A1C2A90881EAB0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 797 fc2cd0-fc2e31 call fc0920 call fc2bc0 CreateFileW 804 fc2e38-fc2e48 797->804 805 fc2e33 797->805 808 fc2e4f-fc2e69 VirtualAlloc 804->808 809 fc2e4a 804->809 806 fc2ee8-fc2eed 805->806 810 fc2e6d-fc2e84 ReadFile 808->810 811 fc2e6b 808->811 809->806 812 fc2e88-fc2ec2 call fc2c00 call fc1bc0 810->812 813 fc2e86 810->813 811->806 818 fc2ede-fc2ee6 ExitProcess 812->818 819 fc2ec4-fc2ed9 call fc2c50 812->819 813->806 818->806 819->818
                                                      APIs
                                                        • Part of subcall function 00FC2BC0: Sleep.KERNELBASE(000001F4), ref: 00FC2BD1
                                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00FC2E27
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725960722.0000000000FC0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_fc0000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CreateFileSleep
                                                      • String ID: LAOCB271JH4BDV264NZM1UPC1
                                                      • API String ID: 2694422964-4082128896
                                                      • Opcode ID: 48c13e41f7d9a5c3b0f080edaa38f684bb8d5e16bde9068e491a14f0b2c641a3
                                                      • Instruction ID: 8e0166d8ea1bd55ebfa1401fd1677792c3358c7804fc8bf3f7886094edb31ee4
                                                      • Opcode Fuzzy Hash: 48c13e41f7d9a5c3b0f080edaa38f684bb8d5e16bde9068e491a14f0b2c641a3
                                                      • Instruction Fuzzy Hash: EF61A231D04289DAEF11DBB4C845BEEBB79AF19304F04419DE248BB2C1D7B91B49CB65

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00791BF4
                                                        • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00791BFC
                                                        • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00791C07
                                                        • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00791C12
                                                        • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00791C1A
                                                        • Part of subcall function 00791BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00791C22
                                                        • Part of subcall function 00791B4A: RegisterWindowMessageW.USER32(00000004,?,007912C4), ref: 00791BA2
                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0079136A
                                                      • OleInitialize.OLE32 ref: 00791388
                                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 007D24AB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                      • String ID: 8$`p
                                                      • API String ID: 1986988660-1854714094
                                                      • Opcode ID: 26b710dcb7c6dbcc100c2c69d4f86dbe573aa0300342dd89a3340e7b97fd4c13
                                                      • Instruction ID: 738ae330082690405791bbdc6ff39a4a900652620ebc1d55467ed0fde97f0abe
                                                      • Opcode Fuzzy Hash: 26b710dcb7c6dbcc100c2c69d4f86dbe573aa0300342dd89a3340e7b97fd4c13
                                                      • Instruction Fuzzy Hash: 9B71BFB49112018ECF84DFBAB94D659BAE1FB8834475EA23AD10BC7363EBB44445CF85
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %$Variable must be of type 'Object'.
                                                      • API String ID: 0-4024622777
                                                      • Opcode ID: 242943e694a9c78c7720f61926a9c82194c926338d2b22d0430d2f98489d0b0b
                                                      • Instruction ID: f833ce9e765e84eb40039d17c34a7977bd2bc8f63a917503fce91a2eb7780029
                                                      • Opcode Fuzzy Hash: 242943e694a9c78c7720f61926a9c82194c926338d2b22d0430d2f98489d0b0b
                                                      • Instruction Fuzzy Hash: DDC29D71A00604CFCF24CF98D884AADB7B1FF19314F248569E956AB3A1D379ED81CB91

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1374 802947-8029b9 call 7d1f50 call 8025d6 call 7afe0b call 795722 call 80274e call 79511f call 7b5232 1389 802a6c-802a73 call 802e66 1374->1389 1390 8029bf-8029c6 call 802e66 1374->1390 1395 802a75-802a77 1389->1395 1396 802a7c 1389->1396 1390->1395 1397 8029cc-802a6a call 7bd583 call 7b4983 call 7b9038 call 7bd583 call 7b9038 * 2 1390->1397 1398 802cb6-802cb7 1395->1398 1400 802a7f-802b3a call 7950f5 * 8 call 803017 call 7be5eb 1396->1400 1397->1400 1401 802cd5-802cdb 1398->1401 1439 802b43-802b5e call 802792 1400->1439 1440 802b3c-802b3e 1400->1440 1404 802cf0-802cf6 1401->1404 1405 802cdd-802ced call 7afdcd call 7afe14 1401->1405 1405->1404 1443 802bf0-802bfc call 7be678 1439->1443 1444 802b64-802b6c 1439->1444 1440->1398 1451 802c12-802c16 1443->1451 1452 802bfe-802c0d DeleteFileW 1443->1452 1445 802b74 1444->1445 1446 802b6e-802b72 1444->1446 1448 802b79-802b97 call 7950f5 1445->1448 1446->1448 1458 802bc1-802bd7 call 80211d call 7bdbb3 1448->1458 1459 802b99-802b9e 1448->1459 1454 802c91-802ca5 CopyFileW 1451->1454 1455 802c18-802c7e call 8025d6 call 7bd2eb * 2 call 8022ce 1451->1455 1452->1398 1456 802ca7-802cb4 DeleteFileW 1454->1456 1457 802cb9-802ccf DeleteFileW call 802fd8 1454->1457 1455->1457 1479 802c80-802c8f DeleteFileW 1455->1479 1456->1398 1465 802cd4 1457->1465 1474 802bdc-802be7 1458->1474 1462 802ba1-802bb4 call 8028d2 1459->1462 1472 802bb6-802bbf 1462->1472 1465->1401 1472->1458 1474->1444 1475 802bed 1474->1475 1475->1443 1479->1398
                                                      APIs
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00802C05
                                                      • DeleteFileW.KERNEL32(?), ref: 00802C87
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00802C9D
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00802CAE
                                                      • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00802CC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: File$Delete$Copy
                                                      • String ID:
                                                      • API String ID: 3226157194-0
                                                      • Opcode ID: 62e34a461fd93f183c5550f78af75cffa0675516c64736315525bc2d8163b33f
                                                      • Instruction ID: eb4f17b09afc4d5350cf74a1c9c61dff4f77ad6c54530ffce62ae28616c55fc5
                                                      • Opcode Fuzzy Hash: 62e34a461fd93f183c5550f78af75cffa0675516c64736315525bc2d8163b33f
                                                      • Instruction Fuzzy Hash: 32B16071D00129EBDF61DBA4CC89EDEB77DFF48350F1040A6FA09E6191EA749A448F61

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1480 7c5aa9-7c5ace 1481 7c5ad7-7c5ad9 1480->1481 1482 7c5ad0-7c5ad2 1480->1482 1484 7c5afa-7c5b1f 1481->1484 1485 7c5adb-7c5af5 call 7bf2c6 call 7bf2d9 call 7c27ec 1481->1485 1483 7c5ca5-7c5cb4 call 7b0a8c 1482->1483 1488 7c5b26-7c5b2c 1484->1488 1489 7c5b21-7c5b24 1484->1489 1485->1483 1490 7c5b2e-7c5b46 call 7bf2c6 call 7bf2d9 call 7c27ec 1488->1490 1491 7c5b4b 1488->1491 1489->1488 1494 7c5b4e-7c5b53 1489->1494 1529 7c5c9c-7c5c9f 1490->1529 1491->1494 1497 7c5b64-7c5b6d call 7c564e 1494->1497 1498 7c5b55-7c5b61 call 7c9424 1494->1498 1509 7c5b6f-7c5b71 1497->1509 1510 7c5ba8-7c5bba 1497->1510 1498->1497 1511 7c5b95-7c5b9e call 7c542e 1509->1511 1512 7c5b73-7c5b78 1509->1512 1514 7c5bbc-7c5bc2 1510->1514 1515 7c5c02-7c5c23 WriteFile 1510->1515 1528 7c5ba3-7c5ba6 1511->1528 1516 7c5c6c-7c5c7e 1512->1516 1517 7c5b7e-7c5b8b call 7c55e1 1512->1517 1522 7c5bc4-7c5bc7 1514->1522 1523 7c5bf2-7c5c00 call 7c56c4 1514->1523 1520 7c5c2e 1515->1520 1521 7c5c25-7c5c2b GetLastError 1515->1521 1526 7c5c89-7c5c99 call 7bf2d9 call 7bf2c6 1516->1526 1527 7c5c80-7c5c83 1516->1527 1538 7c5b8e-7c5b90 1517->1538 1530 7c5c31-7c5c3c 1520->1530 1521->1520 1531 7c5bc9-7c5bcc 1522->1531 1532 7c5be2-7c5bf0 call 7c5891 1522->1532 1523->1528 1526->1529 1527->1526 1536 7c5c85-7c5c87 1527->1536 1528->1538 1542 7c5ca4 1529->1542 1539 7c5c3e-7c5c43 1530->1539 1540 7c5ca1 1530->1540 1531->1516 1541 7c5bd2-7c5be0 call 7c57a3 1531->1541 1532->1528 1536->1542 1538->1530 1545 7c5c69 1539->1545 1546 7c5c45-7c5c4a 1539->1546 1540->1542 1541->1528 1542->1483 1545->1516 1549 7c5c4c-7c5c5e call 7bf2d9 call 7bf2c6 1546->1549 1550 7c5c60-7c5c67 call 7bf2a3 1546->1550 1549->1529 1550->1529
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: JOy
                                                      • API String ID: 0-3698608982
                                                      • Opcode ID: 0972b9cafb84f2ad0ddb761f7eaba0a4751c35cf2d8699f6cdaf8e02d1a5578a
                                                      • Instruction ID: 2ab4f409f9433661c07d3e64e2b649d512ba2028e6a8a0258fab52e664a56e56
                                                      • Opcode Fuzzy Hash: 0972b9cafb84f2ad0ddb761f7eaba0a4751c35cf2d8699f6cdaf8e02d1a5578a
                                                      • Instruction Fuzzy Hash: 785190B590060AEFCB219FA4CD49FEE7FB4EF05310F14015EF405A7292D67AA9818B61
                                                      APIs
                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 007D33A2
                                                        • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00793A04
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: IconLoadNotifyShell_String_wcslen
                                                      • String ID: Line: $pl
                                                      • API String ID: 2289894680-1235087846
                                                      • Opcode ID: 5cbac7bc1120a5b3a65e1ed2548aa66c4556569fb8a4b24baceae0c6b5ae1cd6
                                                      • Instruction ID: 2fdb00029ab7ed4d7db430bf05aacc577d295dbbb240c7a3af1a915a491b316a
                                                      • Opcode Fuzzy Hash: 5cbac7bc1120a5b3a65e1ed2548aa66c4556569fb8a4b24baceae0c6b5ae1cd6
                                                      • Instruction Fuzzy Hash: 7F31B871408300AADB25EB10EC49FEFB7E8BB44714F14451EF59993292DB7CA649C7C2
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00793B0F,SwapMouseButtons,00000004,?), ref: 00793B40
                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00793B0F,SwapMouseButtons,00000004,?), ref: 00793B61
                                                      • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00793B0F,SwapMouseButtons,00000004,?), ref: 00793B83
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: Control Panel\Mouse
                                                      • API String ID: 3677997916-824357125
                                                      • Opcode ID: 249429c760726edc3870b2f86ba118e131a9672e9b2d1e0bf4046d90c28a6e4d
                                                      • Instruction ID: d5c9a689b2db10edfac13b2b75b3d4d61fdd74f3280ff45a762a947ee92bd976
                                                      • Opcode Fuzzy Hash: 249429c760726edc3870b2f86ba118e131a9672e9b2d1e0bf4046d90c28a6e4d
                                                      • Instruction Fuzzy Hash: 8E1127B5610208FFDF208FA5EC84EAEBBB8EF04744B10846AA805D7210E2759E419BA0
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 00FC23ED
                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00FC2411
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00FC2433
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725960722.0000000000FC0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_fc0000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                      • String ID:
                                                      • API String ID: 2438371351-0
                                                      • Opcode ID: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                                                      • Instruction ID: 229edb1d0179d4028836527cec964d32f4ba9da71fdbbfca9dbe07ebe8fd80fd
                                                      • Opcode Fuzzy Hash: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                                                      • Instruction Fuzzy Hash: 2F620B30A14259DBEB24CFA4C951BDEB372EF58300F1091A9D10DEB390E77A9E81DB59
                                                      APIs
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 007B0668
                                                        • Part of subcall function 007B32A4: RaiseException.KERNEL32(?,?,?,007B068A,?,00861444,?,?,?,?,?,?,007B068A,00791129,00858738,00791129), ref: 007B3304
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 007B0685
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                      • String ID: Unknown exception
                                                      • API String ID: 3476068407-410509341
                                                      • Opcode ID: a37aa8c7e60c0ad228c994d5be88854ac8b24b2a5b9ec1549f6a863cb4280baa
                                                      • Instruction ID: 3626fd04f278ba540db8005f23b9ba1035353744a8bb6961e8f182ee64b1ecff
                                                      • Opcode Fuzzy Hash: a37aa8c7e60c0ad228c994d5be88854ac8b24b2a5b9ec1549f6a863cb4280baa
                                                      • Instruction Fuzzy Hash: 61F0C23490020DF78F14B6A4D85AEDF776CAE40354B608131F924D6592EF79DA69C6C0
                                                      APIs
                                                      • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0080302F
                                                      • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00803044
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Temp$FileNamePath
                                                      • String ID: aut
                                                      • API String ID: 3285503233-3010740371
                                                      • Opcode ID: bc7e20b08accb3c677a1653666d00bccb1597611aa0965d274a725b6a4fbdccc
                                                      • Instruction ID: 1112bb476bc0119a6db6099ebff125cb221dd4474c45e91966fe3c56f41f8ca9
                                                      • Opcode Fuzzy Hash: bc7e20b08accb3c677a1653666d00bccb1597611aa0965d274a725b6a4fbdccc
                                                      • Instruction Fuzzy Hash: 7BD05E72500328A7DA30A7A4AC0EFDB3B6CEB04751F4002A1BA55E2091EEB49985CAD0
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 008182F5
                                                      • TerminateProcess.KERNEL32(00000000), ref: 008182FC
                                                      • FreeLibrary.KERNEL32(?,?,?,?), ref: 008184DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentFreeLibraryTerminate
                                                      • String ID:
                                                      • API String ID: 146820519-0
                                                      • Opcode ID: 48c5b7dd1ace648608b8299219a74a5f222d0795db3aacea06ad7732aaa16d8b
                                                      • Instruction ID: 048c4ad68498f3226c521d04070e0055b3b2f7d1cc2dedcfd34e450fd0e5d469
                                                      • Opcode Fuzzy Hash: 48c5b7dd1ace648608b8299219a74a5f222d0795db3aacea06ad7732aaa16d8b
                                                      • Instruction Fuzzy Hash: 6F127B71A08301DFC714DF28C485B6ABBE5FF89318F04895DE899CB252DB35E985CB92
                                                      APIs
                                                        • Part of subcall function 00793923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00793A04
                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 007FC259
                                                      • KillTimer.USER32(?,00000001,?,?), ref: 007FC261
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007FC270
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_Timer$Kill
                                                      • String ID:
                                                      • API String ID: 3500052701-0
                                                      • Opcode ID: fc89c4ad70b6a98d259dfb4ce3f2a30ed1be3f8ac97029db5285c854c85fae5e
                                                      • Instruction ID: d035f678e4b71a02f4b62a5f63034036940ec6b55a205a9173914a0ce1d2a3eb
                                                      • Opcode Fuzzy Hash: fc89c4ad70b6a98d259dfb4ce3f2a30ed1be3f8ac97029db5285c854c85fae5e
                                                      • Instruction Fuzzy Hash: AA31647090434CAFEB339B648955BFBBBECAF06304F04449AD79A97341C7785A85CB51
                                                      APIs
                                                      • CloseHandle.KERNELBASE(00000000,00000000,?,?,007C85CC,?,00858CC8,0000000C), ref: 007C8704
                                                      • GetLastError.KERNEL32(?,007C85CC,?,00858CC8,0000000C), ref: 007C870E
                                                      • __dosmaperr.LIBCMT ref: 007C8739
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLast__dosmaperr
                                                      • String ID:
                                                      • API String ID: 2583163307-0
                                                      • Opcode ID: 348e4b55f818ce13211189e69421eb253f990cfd02c929ba47121f57de5b561d
                                                      • Instruction ID: 038aedd8378d93648f40ed4e035e14a38a920da34e65a84ba1646d2e9795eb76
                                                      • Opcode Fuzzy Hash: 348e4b55f818ce13211189e69421eb253f990cfd02c929ba47121f57de5b561d
                                                      • Instruction Fuzzy Hash: 75018E3260526066C3B06334684DF7F67494B8177CF39021DF804AB1D3DEADECC18192
                                                      APIs
                                                      • TranslateMessage.USER32(?), ref: 0079DB7B
                                                      • DispatchMessageW.USER32(?), ref: 0079DB89
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0079DB9F
                                                      • Sleep.KERNEL32(0000000A), ref: 0079DBB1
                                                      • TranslateAcceleratorW.USER32(?,?,?), ref: 007E1CC9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                      • String ID:
                                                      • API String ID: 3288985973-0
                                                      • Opcode ID: 94ee07bf90e4766d926a0e5dd3892789b8e91932b996e4683b307bbc4704acda
                                                      • Instruction ID: 463e02b8307d0bc9fba0aed3d030c9946e1304ed8edb04472ce21d1071fe0772
                                                      • Opcode Fuzzy Hash: 94ee07bf90e4766d926a0e5dd3892789b8e91932b996e4683b307bbc4704acda
                                                      • Instruction Fuzzy Hash: 61F054306043409BEB30C7A19C49FAA73A8FB45310F504A29E61AC30D0DB3894499B25
                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00802CD4,?,?,?,00000004,00000001), ref: 00802FF2
                                                      • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00802CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00803006
                                                      • CloseHandle.KERNEL32(00000000,?,00802CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0080300D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleTime
                                                      • String ID:
                                                      • API String ID: 3397143404-0
                                                      • Opcode ID: bbb47617435e7f896c922a038c564f1651a5da9bac5e8b00cdc16ac93266f8e3
                                                      • Instruction ID: 653c450cafa0b36829885e0c1c6d6d40e61ca768d6ad3d1cdff51500f596e22a
                                                      • Opcode Fuzzy Hash: bbb47617435e7f896c922a038c564f1651a5da9bac5e8b00cdc16ac93266f8e3
                                                      • Instruction Fuzzy Hash: B6E0863628171077D2311755BC0EF9F3A1CE786B71F108210F719B51D046A0151242A8
                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 007A17F6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Init_thread_footer
                                                      • String ID: CALL
                                                      • API String ID: 1385522511-4196123274
                                                      • Opcode ID: 70d24321f5e2bf7f8695b2de0aa93fb31947edb2ed85915cfa8dc30bfe7b7189
                                                      • Instruction ID: 386abfe4fa2cc6255c56fa3ff80ec4ef6cd7231a6847f22c8e390bce480d29e5
                                                      • Opcode Fuzzy Hash: 70d24321f5e2bf7f8695b2de0aa93fb31947edb2ed85915cfa8dc30bfe7b7189
                                                      • Instruction Fuzzy Hash: E2229B70608241DFE714CF14C894A2ABBF1BFDA354F548A6DF4968B3A1D739E851CB82
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 00806F6B
                                                        • Part of subcall function 00794ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EFD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad_wcslen
                                                      • String ID: >>>AUTOIT SCRIPT<<<
                                                      • API String ID: 3312870042-2806939583
                                                      • Opcode ID: ad76c1ce0f8f7a29fc2e8764f0591a70afacf40d3ca47db18eb4e53b54a81189
                                                      • Instruction ID: 73ef86022f0429e779f922c9c78e55d887b98845e195330897316a9be0e01c11
                                                      • Opcode Fuzzy Hash: ad76c1ce0f8f7a29fc2e8764f0591a70afacf40d3ca47db18eb4e53b54a81189
                                                      • Instruction Fuzzy Hash: 4EB19A31508601DFCB54EF24D8959AEB7E5FF94310F04892CF896972A2EB34ED49CB92
                                                      APIs
                                                      • GetOpenFileNameW.COMDLG32(?), ref: 007D2C8C
                                                        • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                        • Part of subcall function 00792DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00792DC4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Name$Path$FileFullLongOpen
                                                      • String ID: X
                                                      • API String ID: 779396738-3081909835
                                                      • Opcode ID: b0892f50dab0fdb90e979a0c08abf6ee6e34749eb112054469749e03c6d2799d
                                                      • Instruction ID: 6695ef9d248abe62d98f549ebebb0cddeb006256bb336571e705132d4875a4cb
                                                      • Opcode Fuzzy Hash: b0892f50dab0fdb90e979a0c08abf6ee6e34749eb112054469749e03c6d2799d
                                                      • Instruction Fuzzy Hash: FA219971A102589FDF41EF94D849BDE7BF8AF48305F404059E505E7341EBB8594E8F61
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock
                                                      • String ID: EA06
                                                      • API String ID: 2638373210-3962188686
                                                      • Opcode ID: e85f6b22b34f8bbfe4647cf711d311fb6fca1a70c63ed36020f9aff05f3e58ca
                                                      • Instruction ID: f08544bb1f871fa193240aa4f051652196035da8bb3bb170d4f300a2628b2938
                                                      • Opcode Fuzzy Hash: e85f6b22b34f8bbfe4647cf711d311fb6fca1a70c63ed36020f9aff05f3e58ca
                                                      • Instruction Fuzzy Hash: 6401B572904258BEDF58C7A8CC5AFEEBBF8DB05305F00455AE552D22C1E5B8E6088B60
                                                      APIs
                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00793908
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_
                                                      • String ID:
                                                      • API String ID: 1144537725-0
                                                      • Opcode ID: c8d43d58b3346000870bc61e56436d4c6fa0346ddd3438c1d8fad8fe72094e3b
                                                      • Instruction ID: 2f3ebd533947ee924f3b2a3686ff50593c3ea215e7337e3bdf96b13b0f1c93eb
                                                      • Opcode Fuzzy Hash: c8d43d58b3346000870bc61e56436d4c6fa0346ddd3438c1d8fad8fe72094e3b
                                                      • Instruction Fuzzy Hash: 71318070504301DFDB20DF24E989B97BBE4FB49718F04092EF59A87341E7B9AA44CB92
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 00FC23ED
                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00FC2411
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00FC2433
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725960722.0000000000FC0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_fc0000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                      • String ID:
                                                      • API String ID: 2438371351-0
                                                      • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                      • Instruction ID: 091a12b8e23cbf875d84a71334b80a8c09400473fc2c4885d50c130d994294fc
                                                      • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                      • Instruction Fuzzy Hash: 6312CD24E24658C6EB24DF64D8507DEB232EF68300F1090ED910DEB7A5E77A4E85CF5A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID:
                                                      • API String ID: 544645111-0
                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction ID: a0e56ab057df127e88f8f1b5ef18c41643a732641313617e8f10c560bca5e279
                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction Fuzzy Hash: 9F311474A00109DBC719DF9AD490969FBA2FF8A310B2487A5E809CF652D739EDC1CBD0
                                                      APIs
                                                        • Part of subcall function 00794E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E9C
                                                        • Part of subcall function 00794E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00794EAE
                                                        • Part of subcall function 00794E90: FreeLibrary.KERNEL32(00000000,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EC0
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EFD
                                                        • Part of subcall function 00794E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E62
                                                        • Part of subcall function 00794E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00794E74
                                                        • Part of subcall function 00794E59: FreeLibrary.KERNEL32(00000000,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E87
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Library$Load$AddressFreeProc
                                                      • String ID:
                                                      • API String ID: 2632591731-0
                                                      • Opcode ID: a0cf7b9f1326db497b801a95b6955eae58b9d7115cf9807421d2d3c3e6d46e28
                                                      • Instruction ID: 4608e6460e2bfca4f21fd3460a3852ce9c5619733259aed49a218a51784e7ec1
                                                      • Opcode Fuzzy Hash: a0cf7b9f1326db497b801a95b6955eae58b9d7115cf9807421d2d3c3e6d46e28
                                                      • Instruction Fuzzy Hash: 72110632610216EACF24FF74EC0AFAD77A6AF40750F10842EF542B62D1EE789E469750
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: __wsopen_s
                                                      • String ID:
                                                      • API String ID: 3347428461-0
                                                      • Opcode ID: 0e3e01f478f0258b616d666f9a9170da5369c23d459bd0903d20ef8a05105f49
                                                      • Instruction ID: 7bb2b5691baea7f0c2c3c6a4ae491c475b1ed32b7a06d529656d13672050ff95
                                                      • Opcode Fuzzy Hash: 0e3e01f478f0258b616d666f9a9170da5369c23d459bd0903d20ef8a05105f49
                                                      • Instruction Fuzzy Hash: FC11187590410AAFCB09DF58E945E9A7BF5EF48314F154069FC08AB312DA31EA11CBA5
                                                      APIs
                                                        • Part of subcall function 007C4C7D: RtlAllocateHeap.NTDLL(00000008,00791129,00000000,?,007C2E29,00000001,00000364,?,?,?,007BF2DE,007C3863,00861444,?,007AFDF5,?), ref: 007C4CBE
                                                      • _free.LIBCMT ref: 007C506C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap_free
                                                      • String ID:
                                                      • API String ID: 614378929-0
                                                      • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                      • Instruction ID: d9d0e5e3afa42ce4db3d10139cc1e9fc1b7ebc66b8715dfc31a7a3a1df2d5087
                                                      • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                      • Instruction Fuzzy Hash: E8012672204704ABE3318E659885F5AFBE8FB89370F25061DE58493280EB35B985C6B4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                      • Instruction ID: 7bb0f0430eb54cbbb47a9fce119b1fbec87699e6dee5000cb9f6e4fa74dbe20c
                                                      • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                      • Instruction Fuzzy Hash: C1F0C832511A14EAD7313A699C0DFDA37989F52339F10072DF925D33D2DB7CE80286A6
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000008,00791129,00000000,?,007C2E29,00000001,00000364,?,?,?,007BF2DE,007C3863,00861444,?,007AFDF5,?), ref: 007C4CBE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 603bfa1663ef76a8e636a0d006441a314a66a56ea11af834b7f5ba55995f1765
                                                      • Instruction ID: 1e56f27f81995b2835c4ea6ee6b002c5f655a843a2325393c4a17ecaecaf2c39
                                                      • Opcode Fuzzy Hash: 603bfa1663ef76a8e636a0d006441a314a66a56ea11af834b7f5ba55995f1765
                                                      • Instruction Fuzzy Hash: BFF0E932602224A7DB315F629C19F9A3788BF417B1B19411DFC15E72A1CB7CD80146F0
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 8bfe129dfaa8ca46d198a6b2e6fc050d4d607ed43eb5b0f1de04e6591ac01abc
                                                      • Instruction ID: 07332740cedc7133cc962f4ceeded3eb6984d74b6c6f6981516ee786fe0059a7
                                                      • Opcode Fuzzy Hash: 8bfe129dfaa8ca46d198a6b2e6fc050d4d607ed43eb5b0f1de04e6591ac01abc
                                                      • Instruction Fuzzy Hash: 03E0E532104624AAF6312A669C09FEA37D8AB42BB0F09802EFC0592581CB1CDD0185F0
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794F6D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: d860a66cd2434f1b7910f5d36f60f1fbf661ccdbe04340e4fddfff0ddec2c018
                                                      • Instruction ID: 0e67bf06989733bd46296256f6149fd0240226587a8bc39da44dcc509a31d4be
                                                      • Opcode Fuzzy Hash: d860a66cd2434f1b7910f5d36f60f1fbf661ccdbe04340e4fddfff0ddec2c018
                                                      • Instruction Fuzzy Hash: F0F03971105752CFDF349F64E494C66BBE6FF143293288A7EE1EA82621C7399845DF10
                                                      APIs
                                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00792DC4
                                                        • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: LongNamePath_wcslen
                                                      • String ID:
                                                      • API String ID: 541455249-0
                                                      • Opcode ID: 997c9b6fc8f19d5a5c771d19df4cb0670038ed7d52bb793577be507ebf3cf128
                                                      • Instruction ID: a2e3175cc91fe7520817b2dfa6f963f0b0fba8e271ecbdcf22382962eb9483d2
                                                      • Opcode Fuzzy Hash: 997c9b6fc8f19d5a5c771d19df4cb0670038ed7d52bb793577be507ebf3cf128
                                                      • Instruction Fuzzy Hash: 85E0CD726001249BCB209398DC09FEA77EDDFC8790F044171FD09D724CDA64AD848550
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock
                                                      • String ID:
                                                      • API String ID: 2638373210-0
                                                      • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                      • Instruction ID: 49d6fe61d507deec792c3faccbcc9f8afb798ce0d2d07758b22555b2839c236f
                                                      • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                      • Instruction Fuzzy Hash: 05E01AB0609B009BDF395A28AC557F677E8EF49300F10086EF6ABC2352E5A268458A49
                                                      APIs
                                                        • Part of subcall function 00793837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00793908
                                                        • Part of subcall function 0079D730: GetInputState.USER32 ref: 0079D807
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00792B6B
                                                        • Part of subcall function 007930F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0079314E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                      • String ID:
                                                      • API String ID: 3667716007-0
                                                      • Opcode ID: cb43eb5990c4e579aa4d4a7e916bd2f6e0166cc832c951a852b73e75e76aad49
                                                      • Instruction ID: c9c7c91cda7b62c87ad5b59d47a01f173c7cb81440686caa6b04665ce1df4674
                                                      • Opcode Fuzzy Hash: cb43eb5990c4e579aa4d4a7e916bd2f6e0166cc832c951a852b73e75e76aad49
                                                      • Instruction Fuzzy Hash: C3E0262130020486CE08BBB5B85E87DA38AABD1351F40143EF242831A3DE2C494A4252
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,00000000,?,007D0704,?,?,00000000,?,007D0704,00000000,0000000C), ref: 007D03B7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 004e4a2504058e6188035501fcd7b60f631c654d2630587c800ad25ee0b3f8f0
                                                      • Instruction ID: 50dd765e8125d2160cd10d6c859b739a08b8a276e089b88899d424796b31df96
                                                      • Opcode Fuzzy Hash: 004e4a2504058e6188035501fcd7b60f631c654d2630587c800ad25ee0b3f8f0
                                                      • Instruction Fuzzy Hash: 4FD06C3204010DBBDF128F84DD06EDA3BAAFB48714F018000BE1856020C732E832AB90
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00791CBC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: InfoParametersSystem
                                                      • String ID:
                                                      • API String ID: 3098949447-0
                                                      • Opcode ID: f981dc6f2a027177d5094b34aa241f08e2033c2447979bae6667f8eb4135b8e4
                                                      • Instruction ID: 666b9bc7056fadd4f3b1fa689200c29b2859419a5c5e8daec44f423b0fe6eb51
                                                      • Opcode Fuzzy Hash: f981dc6f2a027177d5094b34aa241f08e2033c2447979bae6667f8eb4135b8e4
                                                      • Instruction Fuzzy Hash: 2DC09236280304AFF6258B80BE4EF247764B758B00F099001F60AA96E3C3E26820EA90
                                                      APIs
                                                      • Sleep.KERNELBASE(000001F4), ref: 00FC2BD1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725960722.0000000000FC0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_fc0000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                      • Instruction ID: 4fc02ff5312636beba7eac41ab18a064db1b78885c0d6a805f9a4e6f97eea851
                                                      • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                      • Instruction Fuzzy Hash: 6BE0BF7494420EEFDB00EFA4DA49ADE7BB4EF04301F1005A5FD05D7680DB309E549A62
                                                      APIs
                                                      • Sleep.KERNELBASE(000001F4), ref: 00FC2BD1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725960722.0000000000FC0000.00000040.00000020.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_fc0000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                      • Instruction ID: 82bf3a50ad181f9d0863df9fce17cfd749694ebce16ade65274904c6f6021ff9
                                                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                      • Instruction Fuzzy Hash: 47E0E67494420EDFDB00EFB4DA49A9E7FB4EF04301F100165FD01D2280D6309D509A62
                                                      APIs
                                                        • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0082961A
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0082965B
                                                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0082969F
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008296C9
                                                      • SendMessageW.USER32 ref: 008296F2
                                                      • GetKeyState.USER32(00000011), ref: 0082978B
                                                      • GetKeyState.USER32(00000009), ref: 00829798
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008297AE
                                                      • GetKeyState.USER32(00000010), ref: 008297B8
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008297E9
                                                      • SendMessageW.USER32 ref: 00829810
                                                      • SendMessageW.USER32(?,00001030,?,00827E95), ref: 00829918
                                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0082992E
                                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00829941
                                                      • SetCapture.USER32(?), ref: 0082994A
                                                      • ClientToScreen.USER32(?,?), ref: 008299AF
                                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 008299BC
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008299D6
                                                      • ReleaseCapture.USER32 ref: 008299E1
                                                      • GetCursorPos.USER32(?), ref: 00829A19
                                                      • ScreenToClient.USER32(?,?), ref: 00829A26
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00829A80
                                                      • SendMessageW.USER32 ref: 00829AAE
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00829AEB
                                                      • SendMessageW.USER32 ref: 00829B1A
                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00829B3B
                                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00829B4A
                                                      • GetCursorPos.USER32(?), ref: 00829B68
                                                      • ScreenToClient.USER32(?,?), ref: 00829B75
                                                      • GetParent.USER32(?), ref: 00829B93
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00829BFA
                                                      • SendMessageW.USER32 ref: 00829C2B
                                                      • ClientToScreen.USER32(?,?), ref: 00829C84
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00829CB4
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00829CDE
                                                      • SendMessageW.USER32 ref: 00829D01
                                                      • ClientToScreen.USER32(?,?), ref: 00829D4E
                                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00829D82
                                                        • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00829E05
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                      • String ID: @GUI_DRAGID$F$hW
                                                      • API String ID: 3429851547-2463656204
                                                      • Opcode ID: 8e1c27fa4a237ca7aef404305f49132a18adfe0583d54bc3fbc9a5ccdadbba82
                                                      • Instruction ID: 4a1f28d18568b38dfdee9ff48bffe747953bd6a735ddb6c99f88c26092201aa4
                                                      • Opcode Fuzzy Hash: 8e1c27fa4a237ca7aef404305f49132a18adfe0583d54bc3fbc9a5ccdadbba82
                                                      • Instruction Fuzzy Hash: 72429B34204210AFDB20CF68DC48AAABBE5FF99310F15461DF699C72A1E771E8A1CF51
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 008248F3
                                                      • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00824908
                                                      • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00824927
                                                      • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0082494B
                                                      • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0082495C
                                                      • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0082497B
                                                      • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 008249AE
                                                      • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 008249D4
                                                      • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00824A0F
                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00824A56
                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00824A7E
                                                      • IsMenu.USER32(?), ref: 00824A97
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00824AF2
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00824B20
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00824B94
                                                      • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00824BE3
                                                      • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00824C82
                                                      • wsprintfW.USER32 ref: 00824CAE
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00824CC9
                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 00824CF1
                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00824D13
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00824D33
                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 00824D5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                      • String ID: %d/%02d/%02d$hW
                                                      • API String ID: 4054740463-651974755
                                                      • Opcode ID: 3d8af94db1cf346e8a5f257712483d9a5b609105aed7e019340918b99eb88523
                                                      • Instruction ID: aa01ab2cd42fd019fba34516a20200475caa48fe33463ee4adb058d5fc8d755c
                                                      • Opcode Fuzzy Hash: 3d8af94db1cf346e8a5f257712483d9a5b609105aed7e019340918b99eb88523
                                                      • Instruction Fuzzy Hash: 3212D071500228ABEB248F28ED49FBE7BF8FF85714F105129F516DA2E1DB749981CB60
                                                      APIs
                                                      • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 007AF998
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007EF474
                                                      • IsIconic.USER32(00000000), ref: 007EF47D
                                                      • ShowWindow.USER32(00000000,00000009), ref: 007EF48A
                                                      • SetForegroundWindow.USER32(00000000), ref: 007EF494
                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007EF4AA
                                                      • GetCurrentThreadId.KERNEL32 ref: 007EF4B1
                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 007EF4BD
                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 007EF4CE
                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 007EF4D6
                                                      • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 007EF4DE
                                                      • SetForegroundWindow.USER32(00000000), ref: 007EF4E1
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF4F6
                                                      • keybd_event.USER32(00000012,00000000), ref: 007EF501
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF50B
                                                      • keybd_event.USER32(00000012,00000000), ref: 007EF510
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF519
                                                      • keybd_event.USER32(00000012,00000000), ref: 007EF51E
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 007EF528
                                                      • keybd_event.USER32(00000012,00000000), ref: 007EF52D
                                                      • SetForegroundWindow.USER32(00000000), ref: 007EF530
                                                      • AttachThreadInput.USER32(?,000000FF,00000000), ref: 007EF557
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 4125248594-2988720461
                                                      • Opcode ID: 6b7f21e4564a87992630fafc7180233029efae4f20c4479336457e120cb54a07
                                                      • Instruction ID: 2d3897dfa6400a26ca3d656342a7f540263c416d755d12ca45cc08510e494c5c
                                                      • Opcode Fuzzy Hash: 6b7f21e4564a87992630fafc7180233029efae4f20c4479336457e120cb54a07
                                                      • Instruction Fuzzy Hash: DD317471A40258BFEB316FB65C4AFBF7E6CFB48B50F104065FA01E61D1C6B49D11AAA0
                                                      APIs
                                                        • Part of subcall function 007F16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F170D
                                                        • Part of subcall function 007F16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F173A
                                                        • Part of subcall function 007F16C3: GetLastError.KERNEL32 ref: 007F174A
                                                      • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 007F1286
                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 007F12A8
                                                      • CloseHandle.KERNEL32(?), ref: 007F12B9
                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007F12D1
                                                      • GetProcessWindowStation.USER32 ref: 007F12EA
                                                      • SetProcessWindowStation.USER32(00000000), ref: 007F12F4
                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 007F1310
                                                        • Part of subcall function 007F10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007F11FC), ref: 007F10D4
                                                        • Part of subcall function 007F10BF: CloseHandle.KERNEL32(?,?,007F11FC), ref: 007F10E9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                      • String ID: $default$winsta0
                                                      • API String ID: 22674027-1027155976
                                                      • Opcode ID: 47dd70a0608fffd44f9738e8f2f64d82c04dcc2f3621e83d0aa46e839c913c27
                                                      • Instruction ID: 3387e1024a864a21c27968c27e2409fcd3b485cac4c2bc1541e1bb20b1e3d2a2
                                                      • Opcode Fuzzy Hash: 47dd70a0608fffd44f9738e8f2f64d82c04dcc2f3621e83d0aa46e839c913c27
                                                      • Instruction Fuzzy Hash: EA817871900249EFDF259FA8DC49BFE7BB9FF44704F148129FA11A62A0D7398945CB60
                                                      APIs
                                                        • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F1114
                                                        • Part of subcall function 007F10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1120
                                                        • Part of subcall function 007F10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F112F
                                                        • Part of subcall function 007F10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1136
                                                        • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F114D
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007F0BCC
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007F0C00
                                                      • GetLengthSid.ADVAPI32(?), ref: 007F0C17
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 007F0C51
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007F0C6D
                                                      • GetLengthSid.ADVAPI32(?), ref: 007F0C84
                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 007F0C8C
                                                      • HeapAlloc.KERNEL32(00000000), ref: 007F0C93
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007F0CB4
                                                      • CopySid.ADVAPI32(00000000), ref: 007F0CBB
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007F0CEA
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007F0D0C
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007F0D1E
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0D45
                                                      • HeapFree.KERNEL32(00000000), ref: 007F0D4C
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0D55
                                                      • HeapFree.KERNEL32(00000000), ref: 007F0D5C
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0D65
                                                      • HeapFree.KERNEL32(00000000), ref: 007F0D6C
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 007F0D78
                                                      • HeapFree.KERNEL32(00000000), ref: 007F0D7F
                                                        • Part of subcall function 007F1193: GetProcessHeap.KERNEL32(00000008,007F0BB1,?,00000000,?,007F0BB1,?), ref: 007F11A1
                                                        • Part of subcall function 007F1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,007F0BB1,?), ref: 007F11A8
                                                        • Part of subcall function 007F1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,007F0BB1,?), ref: 007F11B7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                      • String ID:
                                                      • API String ID: 4175595110-0
                                                      • Opcode ID: 0a216c6cba73808e4c9555374052ff55d141981cebfedf49c65bf6dfda41a37c
                                                      • Instruction ID: 87e917a45c0ed873d60f689c491700a57f99fa2e7f34f4774ee8ded026841f66
                                                      • Opcode Fuzzy Hash: 0a216c6cba73808e4c9555374052ff55d141981cebfedf49c65bf6dfda41a37c
                                                      • Instruction Fuzzy Hash: 00715C75A0020EABDF20DFA4DC45FFEBBB9BF04300F148515EA14A6392D775A906CBA0
                                                      APIs
                                                      • OpenClipboard.USER32(0082CC08), ref: 0080EB29
                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0080EB37
                                                      • GetClipboardData.USER32(0000000D), ref: 0080EB43
                                                      • CloseClipboard.USER32 ref: 0080EB4F
                                                      • GlobalLock.KERNEL32(00000000), ref: 0080EB87
                                                      • CloseClipboard.USER32 ref: 0080EB91
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0080EBBC
                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 0080EBC9
                                                      • GetClipboardData.USER32(00000001), ref: 0080EBD1
                                                      • GlobalLock.KERNEL32(00000000), ref: 0080EBE2
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0080EC22
                                                      • IsClipboardFormatAvailable.USER32(0000000F), ref: 0080EC38
                                                      • GetClipboardData.USER32(0000000F), ref: 0080EC44
                                                      • GlobalLock.KERNEL32(00000000), ref: 0080EC55
                                                      • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0080EC77
                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0080EC94
                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0080ECD2
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0080ECF3
                                                      • CountClipboardFormats.USER32 ref: 0080ED14
                                                      • CloseClipboard.USER32 ref: 0080ED59
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                      • String ID:
                                                      • API String ID: 420908878-0
                                                      • Opcode ID: 5ae28e4d00a9c437e9ae791fc4b421f5cbb13a56e76bc9762b5e9ec11935ed50
                                                      • Instruction ID: 08ccb7095ff6cdc30b60d8fc6a226bf15b8074d5f3d69deb092d368a5544fbae
                                                      • Opcode Fuzzy Hash: 5ae28e4d00a9c437e9ae791fc4b421f5cbb13a56e76bc9762b5e9ec11935ed50
                                                      • Instruction Fuzzy Hash: E7619935204205AFD710EF28DC99E3AB7A4FF84714F04891DF856D72A2CB35E906CBA2
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 008069BE
                                                      • FindClose.KERNEL32(00000000), ref: 00806A12
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00806A4E
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00806A75
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00806AB2
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00806ADF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                      • API String ID: 3830820486-3289030164
                                                      • Opcode ID: 0d2922aba8d92f04852ee4b13451533b2b49aca18caf987190f0ca434c6d5c2d
                                                      • Instruction ID: a313c4aabc67a2b279c05082c132daf825af2ba28705b16824fafbaa467cbd9f
                                                      • Opcode Fuzzy Hash: 0d2922aba8d92f04852ee4b13451533b2b49aca18caf987190f0ca434c6d5c2d
                                                      • Instruction Fuzzy Hash: 37D15DB2508340EEC714EBA4DC85EABB7E8FF89704F44491DF585D6191EB38DA18CB62
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00809663
                                                      • GetFileAttributesW.KERNEL32(?), ref: 008096A1
                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 008096BB
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 008096D3
                                                      • FindClose.KERNEL32(00000000), ref: 008096DE
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 008096FA
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0080974A
                                                      • SetCurrentDirectoryW.KERNEL32(00856B7C), ref: 00809768
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00809772
                                                      • FindClose.KERNEL32(00000000), ref: 0080977F
                                                      • FindClose.KERNEL32(00000000), ref: 0080978F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                      • String ID: *.*
                                                      • API String ID: 1409584000-438819550
                                                      • Opcode ID: 8550aa92e28889332113344556a5514fc490aa553ebbc1b9a30c2dabb81bcc6c
                                                      • Instruction ID: 65070dd117a2c54228a01f108d7f41920a9ec575a44ff318598d138c8820a665
                                                      • Opcode Fuzzy Hash: 8550aa92e28889332113344556a5514fc490aa553ebbc1b9a30c2dabb81bcc6c
                                                      • Instruction Fuzzy Hash: 1031F172541219AECB20EFB4EC09AEE77ACFF09320F108155F8A5E31E1EB35DE458A50
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 008097BE
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00809819
                                                      • FindClose.KERNEL32(00000000), ref: 00809824
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00809840
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00809890
                                                      • SetCurrentDirectoryW.KERNEL32(00856B7C), ref: 008098AE
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 008098B8
                                                      • FindClose.KERNEL32(00000000), ref: 008098C5
                                                      • FindClose.KERNEL32(00000000), ref: 008098D5
                                                        • Part of subcall function 007FDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007FDB00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                      • String ID: *.*
                                                      • API String ID: 2640511053-438819550
                                                      • Opcode ID: 84ece0104f62e23f9625e7732de773188bf5ca4b8466d2b086356c7fdfcde44b
                                                      • Instruction ID: 0b29b097577971a94591eb8085efcce5d01ab285b588696a001104242ea885fc
                                                      • Opcode Fuzzy Hash: 84ece0104f62e23f9625e7732de773188bf5ca4b8466d2b086356c7fdfcde44b
                                                      • Instruction Fuzzy Hash: 0431C571501619AEDB20EFB4EC48AEE77ACFF06320F108165E950E22D1DB35DD498A60
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?), ref: 00808257
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00808267
                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00808273
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00808310
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00808324
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00808356
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0080838C
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00808395
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectoryTime$File$Local$System
                                                      • String ID: *.*
                                                      • API String ID: 1464919966-438819550
                                                      • Opcode ID: 32df0a72be52f69511aaaaceba6651a46850aa2783d903c11f00402401511753
                                                      • Instruction ID: b0d016f65493d0c55fbcc146c4f6b2bc6410b579ce76592a819203a6967cd945
                                                      • Opcode Fuzzy Hash: 32df0a72be52f69511aaaaceba6651a46850aa2783d903c11f00402401511753
                                                      • Instruction Fuzzy Hash: CE615972508705DFCB10EF64D8449AEB3E8FF89314F04892AF999C7291EB35E945CB92
                                                      APIs
                                                        • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                        • Part of subcall function 007FE199: GetFileAttributesW.KERNEL32(?,007FCF95), ref: 007FE19A
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 007FD122
                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 007FD1DD
                                                      • MoveFileW.KERNEL32(?,?), ref: 007FD1F0
                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 007FD20D
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 007FD237
                                                        • Part of subcall function 007FD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,007FD21C,?,?), ref: 007FD2B2
                                                      • FindClose.KERNEL32(00000000,?,?,?), ref: 007FD253
                                                      • FindClose.KERNEL32(00000000), ref: 007FD264
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 1946585618-1173974218
                                                      • Opcode ID: 4355749ea0b52c0a03570888bf9364d96bbafd46e2bed81c67a983507517ecc3
                                                      • Instruction ID: 04191d91f9bf6f52465efc0b8b95500bf80acb6f9107eb32e1f83c98e7282544
                                                      • Opcode Fuzzy Hash: 4355749ea0b52c0a03570888bf9364d96bbafd46e2bed81c67a983507517ecc3
                                                      • Instruction Fuzzy Hash: 6F617C3180110DEACF15EBE4DA969FDB7B6BF15300F208169E50177291EB396F09CBA1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                      • String ID:
                                                      • API String ID: 1737998785-0
                                                      • Opcode ID: bc61fa30c478d5a84f4bcd1d00fed7fb2bbd9dfe08766cfc104d6bf549784e87
                                                      • Instruction ID: bb1eecc316680dd2c4aec7f9a0ed8a77d646f7ab90a8dda14c185d0832c2ce75
                                                      • Opcode Fuzzy Hash: bc61fa30c478d5a84f4bcd1d00fed7fb2bbd9dfe08766cfc104d6bf549784e87
                                                      • Instruction Fuzzy Hash: 8C417E35204611DFE760DF15D848B2ABBA5FF44318F58C499E819CB6A2C775EC42CB90
                                                      APIs
                                                        • Part of subcall function 007F16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F170D
                                                        • Part of subcall function 007F16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F173A
                                                        • Part of subcall function 007F16C3: GetLastError.KERNEL32 ref: 007F174A
                                                      • ExitWindowsEx.USER32(?,00000000), ref: 007FE932
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                      • String ID: $ $@$SeShutdownPrivilege
                                                      • API String ID: 2234035333-3163812486
                                                      • Opcode ID: cbca14323ac431514cfdfab91b27f15428a74acb46d8b259b3216f3807c9c733
                                                      • Instruction ID: 44afdb9294037cbc9a906ebf56e6d56622e1916894a42899d225520d93447870
                                                      • Opcode Fuzzy Hash: cbca14323ac431514cfdfab91b27f15428a74acb46d8b259b3216f3807c9c733
                                                      • Instruction Fuzzy Hash: A201DB72610219EBEB64A7749C89FBF729CAB14751F154521FE12E23E1D9E86C4081B1
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000001,00000006), ref: 00811276
                                                      • WSAGetLastError.WSOCK32 ref: 00811283
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 008112BA
                                                      • WSAGetLastError.WSOCK32 ref: 008112C5
                                                      • closesocket.WSOCK32(00000000), ref: 008112F4
                                                      • listen.WSOCK32(00000000,00000005), ref: 00811303
                                                      • WSAGetLastError.WSOCK32 ref: 0081130D
                                                      • closesocket.WSOCK32(00000000), ref: 0081133C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$closesocket$bindlistensocket
                                                      • String ID:
                                                      • API String ID: 540024437-0
                                                      • Opcode ID: bebaa16c9be4a17a5c868d2b6a6b1432acfdc221606e342b04ff5708daa9747a
                                                      • Instruction ID: ec508aa8479262f5f4677ec24c773585f7a1b135f74fdd559990848d93d8cff5
                                                      • Opcode Fuzzy Hash: bebaa16c9be4a17a5c868d2b6a6b1432acfdc221606e342b04ff5708daa9747a
                                                      • Instruction Fuzzy Hash: DB417D316001409FDB20DF24D488B69BBEAFF46318F18C198E9569F296C775EC82CBA1
                                                      APIs
                                                        • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                        • Part of subcall function 007FE199: GetFileAttributesW.KERNEL32(?,007FCF95), ref: 007FE19A
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 007FD420
                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 007FD470
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 007FD481
                                                      • FindClose.KERNEL32(00000000), ref: 007FD498
                                                      • FindClose.KERNEL32(00000000), ref: 007FD4A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 2649000838-1173974218
                                                      • Opcode ID: 9ca138976130e2ad15f8641dc8433bd7918dff28dd709986c1cbeb5996fbabfe
                                                      • Instruction ID: 1c9008397c8bd582ac5b724000111ff6edef299f1866e6f7b06a465acd0feab2
                                                      • Opcode Fuzzy Hash: 9ca138976130e2ad15f8641dc8433bd7918dff28dd709986c1cbeb5996fbabfe
                                                      • Instruction Fuzzy Hash: B3319031008385EBC710EF64D8558BFB7E9BE91314F408A1DF9D593291EB28AE09D763
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: __floor_pentium4
                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                      • API String ID: 4168288129-2761157908
                                                      • Opcode ID: 040a8d22a5d9694257d84049090ac90afc9f993267212bf8d046ac6ac37b54c7
                                                      • Instruction ID: e5beb4df6eaee2b1ac73ac987d046b2329fc44e2ec0222b5e6bd4f1170046017
                                                      • Opcode Fuzzy Hash: 040a8d22a5d9694257d84049090ac90afc9f993267212bf8d046ac6ac37b54c7
                                                      • Instruction Fuzzy Hash: FBC21B72E046288FDB25CE28DD45BEAB7B6EB48305F1541EED44DE7241E778AE818F40
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 008064DC
                                                      • CoInitialize.OLE32(00000000), ref: 00806639
                                                      • CoCreateInstance.OLE32(0082FCF8,00000000,00000001,0082FB68,?), ref: 00806650
                                                      • CoUninitialize.OLE32 ref: 008068D4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                      • String ID: .lnk
                                                      • API String ID: 886957087-24824748
                                                      • Opcode ID: b605831bc5631adc4cd5d4d1ee6cfe9ca56e840d3c380a2227d88499d22125dd
                                                      • Instruction ID: beb57eb1727d87fd2c3c3f3300dd572f8244e3ba3f83329b05d8510d25f6ca2b
                                                      • Opcode Fuzzy Hash: b605831bc5631adc4cd5d4d1ee6cfe9ca56e840d3c380a2227d88499d22125dd
                                                      • Instruction Fuzzy Hash: F7D16771508201AFD714EF24D885E6BB7E9FF98704F00492DF595CB2A1EB30E919CBA2
                                                      APIs
                                                      • GetForegroundWindow.USER32(?,?,00000000), ref: 008122E8
                                                        • Part of subcall function 0080E4EC: GetWindowRect.USER32(?,?), ref: 0080E504
                                                      • GetDesktopWindow.USER32 ref: 00812312
                                                      • GetWindowRect.USER32(00000000), ref: 00812319
                                                      • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00812355
                                                      • GetCursorPos.USER32(?), ref: 00812381
                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 008123DF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                      • String ID:
                                                      • API String ID: 2387181109-0
                                                      • Opcode ID: 7c9e5c82ff1c150a47180dbac0b27e0e5661c3a9ccc10e68fbffe9b4e46f558a
                                                      • Instruction ID: a0ddd38641ed2b6b1a5b319bf4f7ad8d41003acb4e425e3e97b7a2aa16909f1e
                                                      • Opcode Fuzzy Hash: 7c9e5c82ff1c150a47180dbac0b27e0e5661c3a9ccc10e68fbffe9b4e46f558a
                                                      • Instruction Fuzzy Hash: 3231FC72104305AFC720DF14C848BABBBADFF88314F000A19F994D72A1DB34EA59CB92
                                                      APIs
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                      • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00809B78
                                                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00809C8B
                                                        • Part of subcall function 00803874: GetInputState.USER32 ref: 008038CB
                                                        • Part of subcall function 00803874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00803966
                                                      • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00809BA8
                                                      • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00809C75
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                      • String ID: *.*
                                                      • API String ID: 1972594611-438819550
                                                      • Opcode ID: f0c218b7ce49d364968849ab756b7f5bea74864ec069f06cbcc37ad9369d9368
                                                      • Instruction ID: 550ddd6c60c5b4e53ac3df685cfc47eba43177a81d3869b04e318d8a7dab7795
                                                      • Opcode Fuzzy Hash: f0c218b7ce49d364968849ab756b7f5bea74864ec069f06cbcc37ad9369d9368
                                                      • Instruction Fuzzy Hash: C3415D7190020AAFDF54DF64DC49AEEBBB8FF05310F248156E855E2192EB349E84CB61
                                                      APIs
                                                        • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 007A9A4E
                                                      • GetSysColor.USER32(0000000F), ref: 007A9B23
                                                      • SetBkColor.GDI32(?,00000000), ref: 007A9B36
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Color$LongProcWindow
                                                      • String ID:
                                                      • API String ID: 3131106179-0
                                                      • Opcode ID: 036f94cbefc01d2c5606c28b173e987d4b8a19b98a5e29c31a194aba90634a71
                                                      • Instruction ID: b70c9863afa87f6ccf1faf51e98147ac3fd007f0a3af4b3cf04d8856e6dfc925
                                                      • Opcode Fuzzy Hash: 036f94cbefc01d2c5606c28b173e987d4b8a19b98a5e29c31a194aba90634a71
                                                      • Instruction Fuzzy Hash: 77A12B7010A454BEE72C9A3D9C4DE7B3A9DFBC7344F15830AF602C6692CA2D9D61D272
                                                      APIs
                                                        • Part of subcall function 0081304E: inet_addr.WSOCK32(?), ref: 0081307A
                                                        • Part of subcall function 0081304E: _wcslen.LIBCMT ref: 0081309B
                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 0081185D
                                                      • WSAGetLastError.WSOCK32 ref: 00811884
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 008118DB
                                                      • WSAGetLastError.WSOCK32 ref: 008118E6
                                                      • closesocket.WSOCK32(00000000), ref: 00811915
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 1601658205-0
                                                      • Opcode ID: 3308bc399637b6b9ebfd79aae8713a9d7c012759f3e03209a9adc9cd533cb877
                                                      • Instruction ID: f63b7758ce9b8d65172c948cf763552459ad3228474c2798a17fdccd5dfe83ab
                                                      • Opcode Fuzzy Hash: 3308bc399637b6b9ebfd79aae8713a9d7c012759f3e03209a9adc9cd533cb877
                                                      • Instruction Fuzzy Hash: 7351C271A002009FDB10AF24D88AF6A77E5EF49718F48C558F9059F3C3D775AD418BA1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                      • String ID:
                                                      • API String ID: 292994002-0
                                                      • Opcode ID: 7016e73022356559ed53bb44ee01d44294adf87be963d826bb247f4f1b3afe37
                                                      • Instruction ID: e7a45d9df50a8f6afc4c8049a6f61efacfb05bd5c490f97fba0936bd961baa57
                                                      • Opcode Fuzzy Hash: 7016e73022356559ed53bb44ee01d44294adf87be963d826bb247f4f1b3afe37
                                                      • Instruction Fuzzy Hash: C221F9357402209FDB218F1AE848B2A7BE5FFA5314F69806CE846CB351C775EC82CB90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                      • API String ID: 0-1546025612
                                                      • Opcode ID: 051add98d6b3c9d7ae63df98d26b7f7a0fb879394e2b73a67e34d138380520ec
                                                      • Instruction ID: 974301e3b955ccde248a0c0b1c79022884b9df21816303eb6f9641f88a0bfc86
                                                      • Opcode Fuzzy Hash: 051add98d6b3c9d7ae63df98d26b7f7a0fb879394e2b73a67e34d138380520ec
                                                      • Instruction Fuzzy Hash: F3A29271E0061ACBDF64CF58D8407AEB7B1BF55310F2481AAE815AB385EB789D81CF91
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 0081A6AC
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0081A6BA
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 0081A79C
                                                      • CloseHandle.KERNEL32(00000000), ref: 0081A7AB
                                                        • Part of subcall function 007ACE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,007D3303,?), ref: 007ACE8A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                      • String ID:
                                                      • API String ID: 1991900642-0
                                                      • Opcode ID: 1e2c51bfd17a2379a4f90082143a47ae315ff353a05dd241c7c826d8bcdd58a9
                                                      • Instruction ID: 66db602c2fdbe8bc149b84d02d23b0c22b4f552c3895cc73c5ab1fc4c0d7aaef
                                                      • Opcode Fuzzy Hash: 1e2c51bfd17a2379a4f90082143a47ae315ff353a05dd241c7c826d8bcdd58a9
                                                      • Instruction Fuzzy Hash: BF513B71508300AFD714EF24D88AA6BBBE8FF89754F40892DF585D7291EB34D904CB92
                                                      APIs
                                                      • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 007FAAAC
                                                      • SetKeyboardState.USER32(00000080), ref: 007FAAC8
                                                      • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 007FAB36
                                                      • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 007FAB88
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: de20f5250952d737e07ac6df9216d8410b755cb179ec3e2ee8e76389e1deb8fa
                                                      • Instruction ID: 1f00a8ae82c701095f22f29554fd7c022c8e3aea95d727f8a43e854d9f88cf4a
                                                      • Opcode Fuzzy Hash: de20f5250952d737e07ac6df9216d8410b755cb179ec3e2ee8e76389e1deb8fa
                                                      • Instruction Fuzzy Hash: 2431E7F0A4024CBEFF358A64CC05BFA7BA6BB44320F04821AE689567D1D37D8985D762
                                                      APIs
                                                      • _free.LIBCMT ref: 007CBB7F
                                                        • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                        • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                      • GetTimeZoneInformation.KERNEL32 ref: 007CBB91
                                                      • WideCharToMultiByte.KERNEL32(00000000,?,0086121C,000000FF,?,0000003F,?,?), ref: 007CBC09
                                                      • WideCharToMultiByte.KERNEL32(00000000,?,00861270,000000FF,?,0000003F,?,?,?,0086121C,000000FF,?,0000003F,?,?), ref: 007CBC36
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                      • String ID:
                                                      • API String ID: 806657224-0
                                                      • Opcode ID: 2c26283257a8025157f5f49fbbbe4cc5edda50aaefc72924d9df5fd3ceb296ab
                                                      • Instruction ID: 47004cefb1f2200ca695c988d096407a2f49798dd7aa2e02e2c3a2a883f2d7c5
                                                      • Opcode Fuzzy Hash: 2c26283257a8025157f5f49fbbbe4cc5edda50aaefc72924d9df5fd3ceb296ab
                                                      • Instruction Fuzzy Hash: 34319C70904245DFCB21DF698C96A29BBB8FF45710B19826EF120D73A2D7749D01DB60
                                                      APIs
                                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 0080CE89
                                                      • GetLastError.KERNEL32(?,00000000), ref: 0080CEEA
                                                      • SetEvent.KERNEL32(?,?,00000000), ref: 0080CEFE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorEventFileInternetLastRead
                                                      • String ID:
                                                      • API String ID: 234945975-0
                                                      • Opcode ID: e0b1e079a6408c1b61d5241baad2c566c63764df55f153bb3688f6cd6f4d8e96
                                                      • Instruction ID: d1d93d45a02faf7428e7540e0cafd90b1009604fe8d440e13d7199934aa59bf5
                                                      • Opcode Fuzzy Hash: e0b1e079a6408c1b61d5241baad2c566c63764df55f153bb3688f6cd6f4d8e96
                                                      • Instruction Fuzzy Hash: D7217AB1500605DBD7709F65CD48BAA77F8FB40358F20862AE646D2191EB74AA058B64
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007F82AA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID: ($|
                                                      • API String ID: 1659193697-1631851259
                                                      • Opcode ID: d20ac3060c19658340e2defc5bad79f32c890c69d1d9656358c44f8ccbc64417
                                                      • Instruction ID: f3f586babdcf63c422f9b535bde0ecd80988facaba6187fdb36a02a3e08385b2
                                                      • Opcode Fuzzy Hash: d20ac3060c19658340e2defc5bad79f32c890c69d1d9656358c44f8ccbc64417
                                                      • Instruction Fuzzy Hash: 20325574A00609DFCB68CF59C081A6AB7F0FF48710B11C56EE59ADB3A1EB74E981CB41
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00805CC1
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00805D17
                                                      • FindClose.KERNEL32(?), ref: 00805D5F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstNext
                                                      • String ID:
                                                      • API String ID: 3541575487-0
                                                      • Opcode ID: f59679abb8dd50f988c97685b7f54282772166f3d570ec279c393996468aff06
                                                      • Instruction ID: 1b584282d0d0c11570c916a7912afcbcbdf790f4cc136098794888e3fe6cd250
                                                      • Opcode Fuzzy Hash: f59679abb8dd50f988c97685b7f54282772166f3d570ec279c393996468aff06
                                                      • Instruction Fuzzy Hash: B9518675604A01DFC714CF28D898A9AB7E4FF49324F14856EE95A8B3A1DB34E904CFA1
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32 ref: 007C271A
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 007C2724
                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 007C2731
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                      • String ID:
                                                      • API String ID: 3906539128-0
                                                      • Opcode ID: 4a7e32e5f07ae824d0e7368e204ca651bda278b7e892be04feac4c950d4fa74b
                                                      • Instruction ID: 780563e998dfa7772f88585cf3f37d0919f7075f99a8be88ac9f6dc6cd9ab461
                                                      • Opcode Fuzzy Hash: 4a7e32e5f07ae824d0e7368e204ca651bda278b7e892be04feac4c950d4fa74b
                                                      • Instruction Fuzzy Hash: A231B4749112189BCB21DF64DC89BDDB7B8BF08310F5085EAE41CA7261E7749F818F45
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 008051DA
                                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00805238
                                                      • SetErrorMode.KERNEL32(00000000), ref: 008052A1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DiskFreeSpace
                                                      • String ID:
                                                      • API String ID: 1682464887-0
                                                      • Opcode ID: fd0e58ccfd64a58ea1dfdc47e4942650a3ebb4c1ea7da8d16976e2dba34e51d9
                                                      • Instruction ID: 890025b381fc7699ee46f775be1d96a3fa3ba8f6cc3f18d4cd79616bd6c6c4d4
                                                      • Opcode Fuzzy Hash: fd0e58ccfd64a58ea1dfdc47e4942650a3ebb4c1ea7da8d16976e2dba34e51d9
                                                      • Instruction Fuzzy Hash: DD316175A00518DFDB00DF54D889EAEBBB5FF49314F088099E805AB3A2DB35EC56CB60
                                                      APIs
                                                        • Part of subcall function 007AFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007B0668
                                                        • Part of subcall function 007AFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007B0685
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007F170D
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007F173A
                                                      • GetLastError.KERNEL32 ref: 007F174A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                      • String ID:
                                                      • API String ID: 577356006-0
                                                      • Opcode ID: 68bf4b9264ee86f1aace78bdc150c6a3598ec2188dc861175f25699a0e09ed20
                                                      • Instruction ID: ef6196f6097aa1db0fd88c95e6ca1b2591b41ae3d9721b91fb176a5806414b14
                                                      • Opcode Fuzzy Hash: 68bf4b9264ee86f1aace78bdc150c6a3598ec2188dc861175f25699a0e09ed20
                                                      • Instruction Fuzzy Hash: 0A1191B2504308EFE728AF54DC8AD7AB7B9FB44714B20852EE05657241EB74BC428A60
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007FD608
                                                      • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 007FD645
                                                      • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007FD650
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CloseControlCreateDeviceFileHandle
                                                      • String ID:
                                                      • API String ID: 33631002-0
                                                      • Opcode ID: d7a1dd615730675d6d5e6a610dfa4485c7c90ca19978b5d668789ef948444176
                                                      • Instruction ID: ceda65a3643ee56a87b00c06d9ac2d41906b3d8ea8a9085e41cf698d49147944
                                                      • Opcode Fuzzy Hash: d7a1dd615730675d6d5e6a610dfa4485c7c90ca19978b5d668789ef948444176
                                                      • Instruction Fuzzy Hash: 57115E75E05228BFDB208F95DC45FAFBBBCEB45B60F108115F904E7290D6704E058BA1
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 007F168C
                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007F16A1
                                                      • FreeSid.ADVAPI32(?), ref: 007F16B1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                      • String ID:
                                                      • API String ID: 3429775523-0
                                                      • Opcode ID: d0a9ad561a2830413aa48fe6f6edc19e37552e72bb4f9d8af9b3ae48ee94f896
                                                      • Instruction ID: c75f1e9fb1eb370896fca2c36a82ce850ef8f056b3d8528975d299b4ddba53a5
                                                      • Opcode Fuzzy Hash: d0a9ad561a2830413aa48fe6f6edc19e37552e72bb4f9d8af9b3ae48ee94f896
                                                      • Instruction Fuzzy Hash: 64F0F47195030DFBDB00DFE49C89EAEBBBCFB08644F508565E501E2181E774AA448A54
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(007C28E9,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002,00000000,?,007C28E9), ref: 007B4D09
                                                      • TerminateProcess.KERNEL32(00000000,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002,00000000,?,007C28E9), ref: 007B4D10
                                                      • ExitProcess.KERNEL32 ref: 007B4D22
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID:
                                                      • API String ID: 1703294689-0
                                                      • Opcode ID: ddbbdcd63b95460933b6b6a44a87526f81cc0f187cb2093658d1e3e09be0ce39
                                                      • Instruction ID: 2dceb215dccfcaab69cfa35605a1c5dcf440cc4098ecdd23db729d6cd84d813e
                                                      • Opcode Fuzzy Hash: ddbbdcd63b95460933b6b6a44a87526f81cc0f187cb2093658d1e3e09be0ce39
                                                      • Instruction Fuzzy Hash: F7E0B631100548ABCF21AF64DD0EBA83B69FB41795B108418FD059A223CB39DD52DB84
                                                      APIs
                                                      • GetUserNameW.ADVAPI32(?,?), ref: 007ED28C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: NameUser
                                                      • String ID: X64
                                                      • API String ID: 2645101109-893830106
                                                      • Opcode ID: 2fcb3a19c7681df6c7b204ce926db805514b581c842818ef31c1b02933d86dc6
                                                      • Instruction ID: c38ff2dd1a63394ed9207fa7c204da530f5b596025507abcc9c54323b8bdd79a
                                                      • Opcode Fuzzy Hash: 2fcb3a19c7681df6c7b204ce926db805514b581c842818ef31c1b02933d86dc6
                                                      • Instruction Fuzzy Hash: 88D0C9B480111DEACBA4CB90DC88DDEB37CBB14305F104251F106A2000D77499498F10
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                      • Instruction ID: e0cbd1430cf070e8dfb52b5acbaaa1763c9e92cae761eed0445aa402b99277fe
                                                      • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                      • Instruction Fuzzy Hash: 5E021C72E001199FDF15CFA9C8807EEBBF1EF48314F25816AE919EB380D735A9418B94
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00806918
                                                      • FindClose.KERNEL32(00000000), ref: 00806961
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID:
                                                      • API String ID: 2295610775-0
                                                      • Opcode ID: d6abdc19e7abf7807af4cf8dd5c7619729af767d37a509e0477d25a498e29685
                                                      • Instruction ID: 4f3ed29d8fe1fb562be3b48a4a3c94ea199503b043321a3eea4d22f664cdf527
                                                      • Opcode Fuzzy Hash: d6abdc19e7abf7807af4cf8dd5c7619729af767d37a509e0477d25a498e29685
                                                      • Instruction Fuzzy Hash: BB119332614201DFCB10DF29D888A16BBE5FF85328F14C699F4698F6A2DB34EC15CB91
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00814891,?,?,00000035,?), ref: 008037E4
                                                      • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00814891,?,?,00000035,?), ref: 008037F4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorFormatLastMessage
                                                      • String ID:
                                                      • API String ID: 3479602957-0
                                                      • Opcode ID: 188b1051aec37c2cee09fc0871b787c98e8ef30854857812c55f46482ee7e116
                                                      • Instruction ID: 3889dacd2ad7a5fafc9f8679eae46027775b29a632907978cc72eb95dce59253
                                                      • Opcode Fuzzy Hash: 188b1051aec37c2cee09fc0871b787c98e8ef30854857812c55f46482ee7e116
                                                      • Instruction Fuzzy Hash: F3F0E5B06052286AEB6057B69C4DFEB3AAEFFC9761F000275F509D22C1D9609904C6B0
                                                      APIs
                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 007FB25D
                                                      • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 007FB270
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: InputSendkeybd_event
                                                      • String ID:
                                                      • API String ID: 3536248340-0
                                                      • Opcode ID: 7fe0650316488195a7fc32019b2272c822e06ddc6d94b264344fef12992ac37c
                                                      • Instruction ID: c890560050e39cb5da56cec97c4e80f032d5998e1d0e280e7561d9cf75e16b3a
                                                      • Opcode Fuzzy Hash: 7fe0650316488195a7fc32019b2272c822e06ddc6d94b264344fef12992ac37c
                                                      • Instruction Fuzzy Hash: A1F01D7180424DABDF159FA4C805BBE7BB4FF08305F108009F955A5191C37DC6119F94
                                                      APIs
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007F11FC), ref: 007F10D4
                                                      • CloseHandle.KERNEL32(?,?,007F11FC), ref: 007F10E9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                      • String ID:
                                                      • API String ID: 81990902-0
                                                      • Opcode ID: f06d2884853e582f512926913a58f1c1eeca550d95193049fe085ea7281caa9f
                                                      • Instruction ID: 43d6fbc30e1f94a128e218c52d6d5e078cd3779ee0c2f0cf7dd09f5a5f6ea8c1
                                                      • Opcode Fuzzy Hash: f06d2884853e582f512926913a58f1c1eeca550d95193049fe085ea7281caa9f
                                                      • Instruction Fuzzy Hash: 0FE04F32008600EEE7352B61FC09E7777E9FB04320F20C92DF5A5804B1DB626CA1DB54
                                                      Strings
                                                      • Variable is not of type 'Object'., xrefs: 007E0C40
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Variable is not of type 'Object'.
                                                      • API String ID: 0-1840281001
                                                      • Opcode ID: 44769376e134d947e9675e8e088f3134ae13e26ecc480dd9db6e5e4b55643e73
                                                      • Instruction ID: 507e7acc3c452a09c9c0fc598bffc05bd2948282b38a2d22031383c958972cb0
                                                      • Opcode Fuzzy Hash: 44769376e134d947e9675e8e088f3134ae13e26ecc480dd9db6e5e4b55643e73
                                                      • Instruction Fuzzy Hash: DA32B071A00218DFCF15DF94E985AEDB7B5FF09304F244069E806AB292D77DAE45CBA0
                                                      APIs
                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,007C6766,?,?,00000008,?,?,007CFEFE,00000000), ref: 007C6998
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ExceptionRaise
                                                      • String ID:
                                                      • API String ID: 3997070919-0
                                                      • Opcode ID: 7b736a1ccc8499ea28f7003dde5faa1d8b0e5c8489394a21404660dc3c9aa918
                                                      • Instruction ID: 6b35f7d625804dd395cd3bf9883673a4bb02331b3f18c55017d697f8069cdddc
                                                      • Opcode Fuzzy Hash: 7b736a1ccc8499ea28f7003dde5faa1d8b0e5c8489394a21404660dc3c9aa918
                                                      • Instruction Fuzzy Hash: 4BB107716106099FDB15CF28C4CAB697BE0FF45364F25865CE89ACF2A2C739E991CB40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: 4e01ffd66aa36933cd08493481b97d94988c031fc088e80b661f51aed07c6675
                                                      • Instruction ID: 6412c816050d989cc5dbc7c8e72aa33196b09ee8131d5c21f221eaea0b2b5c78
                                                      • Opcode Fuzzy Hash: 4e01ffd66aa36933cd08493481b97d94988c031fc088e80b661f51aed07c6675
                                                      • Instruction Fuzzy Hash: 60126F71900269DFCB54CF59C8806EEB7B5FF49310F14819AE849EB256EB389E81CF91
                                                      APIs
                                                      • BlockInput.USER32(00000001), ref: 0080EABD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: BlockInput
                                                      • String ID:
                                                      • API String ID: 3456056419-0
                                                      • Opcode ID: 09e48e417e2591a64ef18b34ddaf1837d8fbfcce689932befd7aa253da765fab
                                                      • Instruction ID: 98c47bc4ab179aef1765087e19e3ac59249e204c95f8fceb7449949a83d97e0d
                                                      • Opcode Fuzzy Hash: 09e48e417e2591a64ef18b34ddaf1837d8fbfcce689932befd7aa253da765fab
                                                      • Instruction Fuzzy Hash: 0BE012322002149FCB10DF59E804D5AB7D9FF68760F008416FC49C7291D674A8418B90
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,007B03EE), ref: 007B09DA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 49b1095928e32ec75f4a990dd89f606cb14c53f72592c42b25949635472b9435
                                                      • Instruction ID: af1bc35d23e2399a57af8c80792b50b17d8556278b317bb58204e7ba9afe0d3b
                                                      • Opcode Fuzzy Hash: 49b1095928e32ec75f4a990dd89f606cb14c53f72592c42b25949635472b9435
                                                      • Instruction Fuzzy Hash:
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                      • Instruction ID: 0947600d16f4d78c414a9cbbe09c27318584e10632c7905776673dbe026ad83c
                                                      • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                      • Instruction Fuzzy Hash: 7351797160C7459BDF3C8978889EBFE67999BD2340F180909E882DB282CA1DFE41D356
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4d40947ff133f29ebf7e240fe3130261925376357d5435024e5d79e1941fb9a6
                                                      • Instruction ID: 85f66951ecf42f89dd533548d2212f61aea9f79617c4cc87209f7d6fd2982288
                                                      • Opcode Fuzzy Hash: 4d40947ff133f29ebf7e240fe3130261925376357d5435024e5d79e1941fb9a6
                                                      • Instruction Fuzzy Hash: EE322032D29F414DD7279634D822335A789AFB73D5F14DB2BE81AB59A6EF29C4838100
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b0528c00a0ea134341c0f7129c3503537aac65a79db9f4ada00f9886ab377383
                                                      • Instruction ID: 75338121a62093a7d4497d064214123989f63b6e272ad52ed86cbdcba671e2b5
                                                      • Opcode Fuzzy Hash: b0528c00a0ea134341c0f7129c3503537aac65a79db9f4ada00f9886ab377383
                                                      • Instruction Fuzzy Hash: BC326C35A052859FDF2BCF2AC49067D77A1EB8E310F28866AD449CB291D63CDD83DB11
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 98d06e0cdfe2cc0cfc533edadbccaa32a816a0acf951bf6c68e4505db6d6f175
                                                      • Instruction ID: e4474a663191a78b494dd3bac9cbd92e27d1316545f0dfafaffed3733b68b348
                                                      • Opcode Fuzzy Hash: 98d06e0cdfe2cc0cfc533edadbccaa32a816a0acf951bf6c68e4505db6d6f175
                                                      • Instruction Fuzzy Hash: 392291B0A04609DFDF14DFA8D885AAEB7B5FF44300F14462AE816A7391EB39ED15CB50
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2ba3b1b939e7b7c47dce4fc3fbc7e9e26e019cb9aec84d0440edf058f2646538
                                                      • Instruction ID: 210afb9fe1647cd6d29311d207cb8bf91705a387fdff33469fcb0ae1766e5990
                                                      • Opcode Fuzzy Hash: 2ba3b1b939e7b7c47dce4fc3fbc7e9e26e019cb9aec84d0440edf058f2646538
                                                      • Instruction Fuzzy Hash: 5E02A8B1E00205EBDF05EF64D885AADB7B1FF44300F11816AE9169B391EB39EE51CB91
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fe9e0a549b0a17cb889c6c51d82349f0ed81e6a4dc3097177b813c58be7ac577
                                                      • Instruction ID: d50a71d2ab997734502fa7184cb3b6cf1a394dff8fc74e8a311b8fcbe152bc39
                                                      • Opcode Fuzzy Hash: fe9e0a549b0a17cb889c6c51d82349f0ed81e6a4dc3097177b813c58be7ac577
                                                      • Instruction Fuzzy Hash: 63B1DF20D2AF414DD62396399831336B65CBFFB6D5F91DB1BFC1674E22EB2686834140
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                      • Instruction ID: b6c65f68496dda2495bb1f60ab21c3b12370484ba0811112d50b7dc273c86e36
                                                      • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                      • Instruction Fuzzy Hash: EF918A722090E34EDB29463D85742BEFFE15A523A23DA079DD4F2CB1C5FE18D554D620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                      • Instruction ID: c77933ce8837816d6e62b04d9da987beeba9cce0451de227ad0e909aeebd0472
                                                      • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                      • Instruction Fuzzy Hash: A191C7722090E34EDB2D427A84782BEFFE15A923A13DA479ED4F2CA1C5FE18D554D620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 12b8504087a163d646630f09cf2a35f81b020ecc2536e77996d1d30addf6ac54
                                                      • Instruction ID: 16c4990eaf2a9a89a6afe561cc9cba91634638a96ce7b68e5c2ea0361c09ff1d
                                                      • Opcode Fuzzy Hash: 12b8504087a163d646630f09cf2a35f81b020ecc2536e77996d1d30addf6ac54
                                                      • Instruction Fuzzy Hash: 6F6158B1208709A6DE7C9A2C8C99BFF2398DFC1700F14491DF942DB2C1DA1D9E42CB66
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 89a6b251be4824c88ac4787686f845362f13458f8295febdba4076e57b2f6a6e
                                                      • Instruction ID: 7a8325083ccde233944252fb85974602253e76dee0ee42e630ffc4a263ba0a50
                                                      • Opcode Fuzzy Hash: 89a6b251be4824c88ac4787686f845362f13458f8295febdba4076e57b2f6a6e
                                                      • Instruction Fuzzy Hash: 5E616B7170870996DE3C5A2888AABFF2398DFC2784F140959E943DF681DA1EED42C356
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                      • Instruction ID: 5476f6c61ce6310007842f3624b7063137bca70e0b115320b0732fc79c2f3415
                                                      • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                      • Instruction Fuzzy Hash: FC8186336090E349DB2D423A85346BEFFE16A923B13DA079DD4F2CB1C1EE28D554D620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4e5afb15ee16d1dff8589335a9f855b007da7de51d2b1d997130f622bee49108
                                                      • Instruction ID: 2de44db092f6c16f8ef519faeb430bbc6009c0fa534deaaf62e2f36868b44145
                                                      • Opcode Fuzzy Hash: 4e5afb15ee16d1dff8589335a9f855b007da7de51d2b1d997130f622bee49108
                                                      • Instruction Fuzzy Hash: 3E21A8326206118BD728CE79C81667A73E5F764310F15866EE4A7C37D0DE75A904CB40
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 00812B30
                                                      • DeleteObject.GDI32(00000000), ref: 00812B43
                                                      • DestroyWindow.USER32 ref: 00812B52
                                                      • GetDesktopWindow.USER32 ref: 00812B6D
                                                      • GetWindowRect.USER32(00000000), ref: 00812B74
                                                      • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00812CA3
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00812CB1
                                                      • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812CF8
                                                      • GetClientRect.USER32(00000000,?), ref: 00812D04
                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00812D40
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D62
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D75
                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D80
                                                      • GlobalLock.KERNEL32(00000000), ref: 00812D89
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812D98
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00812DA1
                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812DA8
                                                      • GlobalFree.KERNEL32(00000000), ref: 00812DB3
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812DC5
                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,0082FC38,00000000), ref: 00812DDB
                                                      • GlobalFree.KERNEL32(00000000), ref: 00812DEB
                                                      • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00812E11
                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00812E30
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00812E52
                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0081303F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                      • String ID: $AutoIt v3$DISPLAY$static
                                                      • API String ID: 2211948467-2373415609
                                                      • Opcode ID: 5cd08b1563c148fd53f4d0e7b7a8c5211d132cddc9e3fa82e970d7ecf8881b6b
                                                      • Instruction ID: 40726c38ef8819e61b32013846eb22f583c60654fabf7037ca03d33f8eea346c
                                                      • Opcode Fuzzy Hash: 5cd08b1563c148fd53f4d0e7b7a8c5211d132cddc9e3fa82e970d7ecf8881b6b
                                                      • Instruction Fuzzy Hash: F1025871900218EFDB24DF64DD89EAE7BB9FF48710F048158F915AB2A1CB74AD51CB60
                                                      APIs
                                                      • SetTextColor.GDI32(?,00000000), ref: 0082712F
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00827160
                                                      • GetSysColor.USER32(0000000F), ref: 0082716C
                                                      • SetBkColor.GDI32(?,000000FF), ref: 00827186
                                                      • SelectObject.GDI32(?,?), ref: 00827195
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 008271C0
                                                      • GetSysColor.USER32(00000010), ref: 008271C8
                                                      • CreateSolidBrush.GDI32(00000000), ref: 008271CF
                                                      • FrameRect.USER32(?,?,00000000), ref: 008271DE
                                                      • DeleteObject.GDI32(00000000), ref: 008271E5
                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 00827230
                                                      • FillRect.USER32(?,?,?), ref: 00827262
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00827284
                                                        • Part of subcall function 008273E8: GetSysColor.USER32(00000012), ref: 00827421
                                                        • Part of subcall function 008273E8: SetTextColor.GDI32(?,?), ref: 00827425
                                                        • Part of subcall function 008273E8: GetSysColorBrush.USER32(0000000F), ref: 0082743B
                                                        • Part of subcall function 008273E8: GetSysColor.USER32(0000000F), ref: 00827446
                                                        • Part of subcall function 008273E8: GetSysColor.USER32(00000011), ref: 00827463
                                                        • Part of subcall function 008273E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00827471
                                                        • Part of subcall function 008273E8: SelectObject.GDI32(?,00000000), ref: 00827482
                                                        • Part of subcall function 008273E8: SetBkColor.GDI32(?,00000000), ref: 0082748B
                                                        • Part of subcall function 008273E8: SelectObject.GDI32(?,?), ref: 00827498
                                                        • Part of subcall function 008273E8: InflateRect.USER32(?,000000FF,000000FF), ref: 008274B7
                                                        • Part of subcall function 008273E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008274CE
                                                        • Part of subcall function 008273E8: GetWindowLongW.USER32(00000000,000000F0), ref: 008274DB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                      • String ID:
                                                      • API String ID: 4124339563-0
                                                      • Opcode ID: 451f0395775fca198fb9012504325d3170e9b504a160b0a02a3e8a1ca3c4afb0
                                                      • Instruction ID: efc8f9389f1a49955b8a1d58b8d6ba25f651557c7fed1fbb0c7e3d619a124442
                                                      • Opcode Fuzzy Hash: 451f0395775fca198fb9012504325d3170e9b504a160b0a02a3e8a1ca3c4afb0
                                                      • Instruction Fuzzy Hash: F3A1AE72008311EFDB209F61DC49A6F7BA9FF89320F104A19F962D61E1D774E945CB92
                                                      APIs
                                                      • DestroyWindow.USER32(?,?), ref: 007A8E14
                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 007E6AC5
                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 007E6AFE
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 007E6F43
                                                        • Part of subcall function 007A8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007A8BE8,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007A8FC5
                                                      • SendMessageW.USER32(?,00001053), ref: 007E6F7F
                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 007E6F96
                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 007E6FAC
                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 007E6FB7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                      • String ID: 0$hW
                                                      • API String ID: 2760611726-580508736
                                                      • Opcode ID: edf38948b86b4f7f40d69c979cb0a296acf907cd8f36ee3461a3d0ccb9849b7a
                                                      • Instruction ID: a7d8e33c8a9b13272e37dfb0be76833e3326fcec1774a8ba315659746f3d6a94
                                                      • Opcode Fuzzy Hash: edf38948b86b4f7f40d69c979cb0a296acf907cd8f36ee3461a3d0ccb9849b7a
                                                      • Instruction Fuzzy Hash: E312B030206241DFDB65CF25C848BA9BBE1FB69340F588569F545CB262CB39EC52CF52
                                                      APIs
                                                      • DestroyWindow.USER32(00000000), ref: 0081273E
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0081286A
                                                      • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 008128A9
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 008128B9
                                                      • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00812900
                                                      • GetClientRect.USER32(00000000,?), ref: 0081290C
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00812955
                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00812964
                                                      • GetStockObject.GDI32(00000011), ref: 00812974
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00812978
                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00812988
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00812991
                                                      • DeleteDC.GDI32(00000000), ref: 0081299A
                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 008129C6
                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 008129DD
                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00812A1D
                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00812A31
                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 00812A42
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00812A77
                                                      • GetStockObject.GDI32(00000011), ref: 00812A82
                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00812A8D
                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00812A97
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                      • API String ID: 2910397461-517079104
                                                      • Opcode ID: b4b4ec2d1717230e08b2bd61559cc710dd88aa6d21a7fa04b022c5e175b477e4
                                                      • Instruction ID: d91a4a98165dd2f279b074ef8f86646d399dda04647d875c6fa4b757e0875dfe
                                                      • Opcode Fuzzy Hash: b4b4ec2d1717230e08b2bd61559cc710dd88aa6d21a7fa04b022c5e175b477e4
                                                      • Instruction Fuzzy Hash: 3EB17B71A00219AFEB24DF68DD4AEAE7BA9FF08710F008114FA15E7291D774ED50CB94
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00804AED
                                                      • GetDriveTypeW.KERNEL32(?,0082CB68,?,\\.\,0082CC08), ref: 00804BCA
                                                      • SetErrorMode.KERNEL32(00000000,0082CB68,?,\\.\,0082CC08), ref: 00804D36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DriveType
                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                      • API String ID: 2907320926-4222207086
                                                      • Opcode ID: 901edd6e1c77ca6f7c441145acd21a0132088f666190522856575dd5b3f24d3d
                                                      • Instruction ID: 8c98d2d3bacbf36325ea7e370d7aaedc803c0ac8a650b0d23aae8c353e054fbd
                                                      • Opcode Fuzzy Hash: 901edd6e1c77ca6f7c441145acd21a0132088f666190522856575dd5b3f24d3d
                                                      • Instruction Fuzzy Hash: B561EEB028110AEBDBA4DB24CE8297877B0FB04305B649415FE06EB2D1EB3AED55DB41
                                                      APIs
                                                      • GetSysColor.USER32(00000012), ref: 00827421
                                                      • SetTextColor.GDI32(?,?), ref: 00827425
                                                      • GetSysColorBrush.USER32(0000000F), ref: 0082743B
                                                      • GetSysColor.USER32(0000000F), ref: 00827446
                                                      • CreateSolidBrush.GDI32(?), ref: 0082744B
                                                      • GetSysColor.USER32(00000011), ref: 00827463
                                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00827471
                                                      • SelectObject.GDI32(?,00000000), ref: 00827482
                                                      • SetBkColor.GDI32(?,00000000), ref: 0082748B
                                                      • SelectObject.GDI32(?,?), ref: 00827498
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 008274B7
                                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008274CE
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 008274DB
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0082752A
                                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00827554
                                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 00827572
                                                      • DrawFocusRect.USER32(?,?), ref: 0082757D
                                                      • GetSysColor.USER32(00000011), ref: 0082758E
                                                      • SetTextColor.GDI32(?,00000000), ref: 00827596
                                                      • DrawTextW.USER32(?,008270F5,000000FF,?,00000000), ref: 008275A8
                                                      • SelectObject.GDI32(?,?), ref: 008275BF
                                                      • DeleteObject.GDI32(?), ref: 008275CA
                                                      • SelectObject.GDI32(?,?), ref: 008275D0
                                                      • DeleteObject.GDI32(?), ref: 008275D5
                                                      • SetTextColor.GDI32(?,?), ref: 008275DB
                                                      • SetBkColor.GDI32(?,?), ref: 008275E5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                      • String ID:
                                                      • API String ID: 1996641542-0
                                                      • Opcode ID: 7a40624fc4808cb0c66d1f82ba8af6612a2d5614d20316f3090c1dc93c1c0ad5
                                                      • Instruction ID: bd3bfc4ce18ef433bbebce3adce7eea7005a960ea5226d0d9b2bb93a945ef838
                                                      • Opcode Fuzzy Hash: 7a40624fc4808cb0c66d1f82ba8af6612a2d5614d20316f3090c1dc93c1c0ad5
                                                      • Instruction Fuzzy Hash: 7C616F72904218AFDF119FA4DC49EAEBFB9FF08320F118115F915AB2A1D7749941DF90
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 00821128
                                                      • GetDesktopWindow.USER32 ref: 0082113D
                                                      • GetWindowRect.USER32(00000000), ref: 00821144
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00821199
                                                      • DestroyWindow.USER32(?), ref: 008211B9
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 008211ED
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0082120B
                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0082121D
                                                      • SendMessageW.USER32(00000000,00000421,?,?), ref: 00821232
                                                      • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00821245
                                                      • IsWindowVisible.USER32(00000000), ref: 008212A1
                                                      • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 008212BC
                                                      • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 008212D0
                                                      • GetWindowRect.USER32(00000000,?), ref: 008212E8
                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 0082130E
                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 00821328
                                                      • CopyRect.USER32(?,?), ref: 0082133F
                                                      • SendMessageW.USER32(00000000,00000412,00000000), ref: 008213AA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                      • String ID: ($0$tooltips_class32
                                                      • API String ID: 698492251-4156429822
                                                      • Opcode ID: b22ba427496e1bd879ede881a6cb08744a73f6c723e3576042821b93cbf6fa67
                                                      • Instruction ID: ec3674ef39f87b4ca5fde797a60ab518ea3f2b2751faa928fc285c1c9e63e8eb
                                                      • Opcode Fuzzy Hash: b22ba427496e1bd879ede881a6cb08744a73f6c723e3576042821b93cbf6fa67
                                                      • Instruction Fuzzy Hash: AAB18971604350EFDB10DF64E888A6ABBE5FF98340F10891CF999DB261C735E885CB92
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007A8968
                                                      • GetSystemMetrics.USER32(00000007), ref: 007A8970
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007A899B
                                                      • GetSystemMetrics.USER32(00000008), ref: 007A89A3
                                                      • GetSystemMetrics.USER32(00000004), ref: 007A89C8
                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 007A89E5
                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 007A89F5
                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 007A8A28
                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 007A8A3C
                                                      • GetClientRect.USER32(00000000,000000FF), ref: 007A8A5A
                                                      • GetStockObject.GDI32(00000011), ref: 007A8A76
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 007A8A81
                                                        • Part of subcall function 007A912D: GetCursorPos.USER32(?), ref: 007A9141
                                                        • Part of subcall function 007A912D: ScreenToClient.USER32(00000000,?), ref: 007A915E
                                                        • Part of subcall function 007A912D: GetAsyncKeyState.USER32(00000001), ref: 007A9183
                                                        • Part of subcall function 007A912D: GetAsyncKeyState.USER32(00000002), ref: 007A919D
                                                      • SetTimer.USER32(00000000,00000000,00000028,007A90FC), ref: 007A8AA8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                      • String ID: AutoIt v3 GUI
                                                      • API String ID: 1458621304-248962490
                                                      • Opcode ID: 3221b45258677e39feebc739576f271668ec0beef2dca036a921eaca3a186008
                                                      • Instruction ID: 5733f870c1ea37d9d53139212c2df07dc91ebd632b0752fe4b737fd73936a9f0
                                                      • Opcode Fuzzy Hash: 3221b45258677e39feebc739576f271668ec0beef2dca036a921eaca3a186008
                                                      • Instruction Fuzzy Hash: 1EB16771A002099FDF24DFA8CD49BAE7BA5FB48314F158229FA15E7290DB78E841CB51
                                                      APIs
                                                        • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F1114
                                                        • Part of subcall function 007F10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1120
                                                        • Part of subcall function 007F10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F112F
                                                        • Part of subcall function 007F10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1136
                                                        • Part of subcall function 007F10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F114D
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007F0DF5
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007F0E29
                                                      • GetLengthSid.ADVAPI32(?), ref: 007F0E40
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 007F0E7A
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007F0E96
                                                      • GetLengthSid.ADVAPI32(?), ref: 007F0EAD
                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 007F0EB5
                                                      • HeapAlloc.KERNEL32(00000000), ref: 007F0EBC
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007F0EDD
                                                      • CopySid.ADVAPI32(00000000), ref: 007F0EE4
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007F0F13
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007F0F35
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007F0F47
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0F6E
                                                      • HeapFree.KERNEL32(00000000), ref: 007F0F75
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0F7E
                                                      • HeapFree.KERNEL32(00000000), ref: 007F0F85
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F0F8E
                                                      • HeapFree.KERNEL32(00000000), ref: 007F0F95
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 007F0FA1
                                                      • HeapFree.KERNEL32(00000000), ref: 007F0FA8
                                                        • Part of subcall function 007F1193: GetProcessHeap.KERNEL32(00000008,007F0BB1,?,00000000,?,007F0BB1,?), ref: 007F11A1
                                                        • Part of subcall function 007F1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,007F0BB1,?), ref: 007F11A8
                                                        • Part of subcall function 007F1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,007F0BB1,?), ref: 007F11B7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                      • String ID:
                                                      • API String ID: 4175595110-0
                                                      • Opcode ID: 4d1129d58bf368e9f150b5d42ba1676fa61206064db65cc44db675672a49fe68
                                                      • Instruction ID: deba33db624cda877c14a548fcc09d6170fe1452e487c8f6d2956bff394a85f2
                                                      • Opcode Fuzzy Hash: 4d1129d58bf368e9f150b5d42ba1676fa61206064db65cc44db675672a49fe68
                                                      • Instruction Fuzzy Hash: 5F714F7190020AEBDF209FA4DC49FBEBBB8BF04310F148115FA19A6352D7759A15CBA0
                                                      APIs
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081C4BD
                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,0082CC08,00000000,?,00000000,?,?), ref: 0081C544
                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0081C5A4
                                                      • _wcslen.LIBCMT ref: 0081C5F4
                                                      • _wcslen.LIBCMT ref: 0081C66F
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0081C6B2
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0081C7C1
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0081C84D
                                                      • RegCloseKey.ADVAPI32(?), ref: 0081C881
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0081C88E
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0081C960
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                      • API String ID: 9721498-966354055
                                                      • Opcode ID: 8d189ca70be4d61d78f16583a8c6dcd0b61f082b6fd8950812676ede6328e2df
                                                      • Instruction ID: 434f3b16bdd54d061d7bac9036be9f70de0476387fc9a51ecedbe5c16e552ad2
                                                      • Opcode Fuzzy Hash: 8d189ca70be4d61d78f16583a8c6dcd0b61f082b6fd8950812676ede6328e2df
                                                      • Instruction Fuzzy Hash: 69126835608201DFDB14DF24D885A6AB7E9FF88714F05885CF89A9B3A2DB35ED41CB81
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 008209C6
                                                      • _wcslen.LIBCMT ref: 00820A01
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00820A54
                                                      • _wcslen.LIBCMT ref: 00820A8A
                                                      • _wcslen.LIBCMT ref: 00820B06
                                                      • _wcslen.LIBCMT ref: 00820B81
                                                        • Part of subcall function 007AF9F2: _wcslen.LIBCMT ref: 007AF9FD
                                                        • Part of subcall function 007F2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007F2BFA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                      • API String ID: 1103490817-4258414348
                                                      • Opcode ID: 44074d0768ee94944391d0e822600157d67f17d044958be0b05176f02a8e8642
                                                      • Instruction ID: 8ae43ea0a0d4ebaea5cdd553971ac29ddaf9d9f2415634221645e46a8a80ac16
                                                      • Opcode Fuzzy Hash: 44074d0768ee94944391d0e822600157d67f17d044958be0b05176f02a8e8642
                                                      • Instruction Fuzzy Hash: D2E16A32208321DFCB14DF24D45092AB7E2FF98318B558A5DF8969B362D735ED89CB81
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharUpper
                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                      • API String ID: 1256254125-909552448
                                                      • Opcode ID: 035cb5e3dc602fc3053c9bed6b86772e56c0eba4f39a7cfa8eb6b1a21133bdb6
                                                      • Instruction ID: 594931b0f206e970918ddfe47936ab2763dc716a22efd50d71aedfb8ceb2145a
                                                      • Opcode Fuzzy Hash: 035cb5e3dc602fc3053c9bed6b86772e56c0eba4f39a7cfa8eb6b1a21133bdb6
                                                      • Instruction Fuzzy Hash: 9C71F37268412A8BCB20DE6CD9416FF3399FFA1764B254128FC66D7284E635DDC8C3A0
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 0082835A
                                                      • _wcslen.LIBCMT ref: 0082836E
                                                      • _wcslen.LIBCMT ref: 00828391
                                                      • _wcslen.LIBCMT ref: 008283B4
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 008283F2
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,0082361A,?), ref: 0082844E
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00828487
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 008284CA
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00828501
                                                      • FreeLibrary.KERNEL32(?), ref: 0082850D
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0082851D
                                                      • DestroyIcon.USER32(?), ref: 0082852C
                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00828549
                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00828555
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                      • String ID: .dll$.exe$.icl
                                                      • API String ID: 799131459-1154884017
                                                      • Opcode ID: 6112bb6e4ed6673744854affc4da53c04343ce0d2ccb841e3dae94ec91ffee4e
                                                      • Instruction ID: 439021fd78480377417c5ff7736219d6ad8338b6d08477ccdbc59b5bb3b9081c
                                                      • Opcode Fuzzy Hash: 6112bb6e4ed6673744854affc4da53c04343ce0d2ccb841e3dae94ec91ffee4e
                                                      • Instruction Fuzzy Hash: 05619E71500629FAEF24DF64EC45BBE77A8FF08B11F108509F815E61D1DB74AA91CBA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                      • API String ID: 0-1645009161
                                                      • Opcode ID: 64ac7a5a8f7c8202fa37bcd6cf57341a8cebae21ce77a345a71a095869ad7cb1
                                                      • Instruction ID: 00a2e6790f4a8dfe976cb40be8217dabb66bdb072d0e8ef1b0b63ce68f17261b
                                                      • Opcode Fuzzy Hash: 64ac7a5a8f7c8202fa37bcd6cf57341a8cebae21ce77a345a71a095869ad7cb1
                                                      • Instruction Fuzzy Hash: 1B81FF71614605FBDF28AFA0EC46FAE37B9BF15300F044025F914AA292EB7DDA51C6A1
                                                      APIs
                                                      • LoadIconW.USER32(00000063), ref: 007F5A2E
                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 007F5A40
                                                      • SetWindowTextW.USER32(?,?), ref: 007F5A57
                                                      • GetDlgItem.USER32(?,000003EA), ref: 007F5A6C
                                                      • SetWindowTextW.USER32(00000000,?), ref: 007F5A72
                                                      • GetDlgItem.USER32(?,000003E9), ref: 007F5A82
                                                      • SetWindowTextW.USER32(00000000,?), ref: 007F5A88
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 007F5AA9
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 007F5AC3
                                                      • GetWindowRect.USER32(?,?), ref: 007F5ACC
                                                      • _wcslen.LIBCMT ref: 007F5B33
                                                      • SetWindowTextW.USER32(?,?), ref: 007F5B6F
                                                      • GetDesktopWindow.USER32 ref: 007F5B75
                                                      • GetWindowRect.USER32(00000000), ref: 007F5B7C
                                                      • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 007F5BD3
                                                      • GetClientRect.USER32(?,?), ref: 007F5BE0
                                                      • PostMessageW.USER32(?,00000005,00000000,?), ref: 007F5C05
                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 007F5C2F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                      • String ID:
                                                      • API String ID: 895679908-0
                                                      • Opcode ID: f2fa7f91ea938f3ef23e02f076d6ccde0dc1c505dcc06249df2d944e16b1dc4c
                                                      • Instruction ID: 5dde087c220daeefb9297f2d7072f33f2578c03c59e01f9456e85cfadf558bf0
                                                      • Opcode Fuzzy Hash: f2fa7f91ea938f3ef23e02f076d6ccde0dc1c505dcc06249df2d944e16b1dc4c
                                                      • Instruction Fuzzy Hash: C6715E71900B09EFDB20DFA8CE89A7EBBF5FF48704F104519E642A26A0D779E945CB50
                                                      APIs
                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 0080FE27
                                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 0080FE32
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0080FE3D
                                                      • LoadCursorW.USER32(00000000,00007F03), ref: 0080FE48
                                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 0080FE53
                                                      • LoadCursorW.USER32(00000000,00007F01), ref: 0080FE5E
                                                      • LoadCursorW.USER32(00000000,00007F81), ref: 0080FE69
                                                      • LoadCursorW.USER32(00000000,00007F88), ref: 0080FE74
                                                      • LoadCursorW.USER32(00000000,00007F80), ref: 0080FE7F
                                                      • LoadCursorW.USER32(00000000,00007F86), ref: 0080FE8A
                                                      • LoadCursorW.USER32(00000000,00007F83), ref: 0080FE95
                                                      • LoadCursorW.USER32(00000000,00007F85), ref: 0080FEA0
                                                      • LoadCursorW.USER32(00000000,00007F82), ref: 0080FEAB
                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 0080FEB6
                                                      • LoadCursorW.USER32(00000000,00007F04), ref: 0080FEC1
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 0080FECC
                                                      • GetCursorInfo.USER32(?), ref: 0080FEDC
                                                      • GetLastError.KERNEL32 ref: 0080FF1E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Cursor$Load$ErrorInfoLast
                                                      • String ID:
                                                      • API String ID: 3215588206-0
                                                      • Opcode ID: 691ae4a0dc4f3d5fdd67b843ab26d01416e802d1befbc1945c68ccb4824d4572
                                                      • Instruction ID: 198e6bc944b30feb5f9f54974b6ef8ce37ad2ca9feb30931b62cbe9db2de02ac
                                                      • Opcode Fuzzy Hash: 691ae4a0dc4f3d5fdd67b843ab26d01416e802d1befbc1945c68ccb4824d4572
                                                      • Instruction Fuzzy Hash: 064168B0D043196ADB60DF768C8985EBFE8FF04754B50852AF11DE7681DB789901CF91
                                                      APIs
                                                      • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 007B00C6
                                                        • Part of subcall function 007B00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0086070C,00000FA0,2D1BA5F0,?,?,?,?,007D23B3,000000FF), ref: 007B011C
                                                        • Part of subcall function 007B00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,007D23B3,000000FF), ref: 007B0127
                                                        • Part of subcall function 007B00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,007D23B3,000000FF), ref: 007B0138
                                                        • Part of subcall function 007B00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 007B014E
                                                        • Part of subcall function 007B00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 007B015C
                                                        • Part of subcall function 007B00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 007B016A
                                                        • Part of subcall function 007B00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007B0195
                                                        • Part of subcall function 007B00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007B01A0
                                                      • ___scrt_fastfail.LIBCMT ref: 007B00E7
                                                        • Part of subcall function 007B00A3: __onexit.LIBCMT ref: 007B00A9
                                                      Strings
                                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 007B0122
                                                      • SleepConditionVariableCS, xrefs: 007B0154
                                                      • WakeAllConditionVariable, xrefs: 007B0162
                                                      • InitializeConditionVariable, xrefs: 007B0148
                                                      • kernel32.dll, xrefs: 007B0133
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                      • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                      • API String ID: 66158676-1714406822
                                                      • Opcode ID: fe55e69d94d879e1dd7c2809332f00eb16d899d1b034b8385daaf438fcaea31f
                                                      • Instruction ID: bc20af31da7cb3a645cf387c5314d5bc3eb69a6d135ab3dc9ccc3b9687990ff8
                                                      • Opcode Fuzzy Hash: fe55e69d94d879e1dd7c2809332f00eb16d899d1b034b8385daaf438fcaea31f
                                                      • Instruction Fuzzy Hash: FF21FC72644718ABD7245BA4AC0ABAF77E4FB45B51F014535F911E3391DB7C9800CAD4
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                      • API String ID: 176396367-1603158881
                                                      • Opcode ID: 39f72a4e4e654409762d9b3aeccd903f236c19a783df96074ce73f44bd7236be
                                                      • Instruction ID: d7a4b4c4c2fbf84cf07147c49b4fb430c72213f925291a7680713aca9de86738
                                                      • Opcode Fuzzy Hash: 39f72a4e4e654409762d9b3aeccd903f236c19a783df96074ce73f44bd7236be
                                                      • Instruction Fuzzy Hash: B5E1C532A0051AEBCB14DFB8C455BFDBBB0BF54710F548219EA56E7340DB38AE899790
                                                      APIs
                                                      • CharLowerBuffW.USER32(00000000,00000000,0082CC08), ref: 00804527
                                                      • _wcslen.LIBCMT ref: 0080453B
                                                      • _wcslen.LIBCMT ref: 00804599
                                                      • _wcslen.LIBCMT ref: 008045F4
                                                      • _wcslen.LIBCMT ref: 0080463F
                                                      • _wcslen.LIBCMT ref: 008046A7
                                                        • Part of subcall function 007AF9F2: _wcslen.LIBCMT ref: 007AF9FD
                                                      • GetDriveTypeW.KERNEL32(?,00856BF0,00000061), ref: 00804743
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharDriveLowerType
                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                      • API String ID: 2055661098-1000479233
                                                      • Opcode ID: 10519a2ae1df1ba5563e0bde46823c535456909802b9491bae2aace880bcc178
                                                      • Instruction ID: 97ffdc9563e65ad492af33957a03e6995ae3670c335bf489c7db3d938a99c182
                                                      • Opcode Fuzzy Hash: 10519a2ae1df1ba5563e0bde46823c535456909802b9491bae2aace880bcc178
                                                      • Instruction Fuzzy Hash: 4BB11FB16483029FC750DF28DC90A6AB7E5FFA5720F505A1CF6A6C32D1E734D844CA92
                                                      APIs
                                                      • DestroyWindow.USER32(?,?), ref: 00826DEB
                                                        • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00826E5F
                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00826E81
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00826E94
                                                      • DestroyWindow.USER32(?), ref: 00826EB5
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00790000,00000000), ref: 00826EE4
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00826EFD
                                                      • GetDesktopWindow.USER32 ref: 00826F16
                                                      • GetWindowRect.USER32(00000000), ref: 00826F1D
                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00826F35
                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00826F4D
                                                        • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                      • String ID: 0$hW$tooltips_class32
                                                      • API String ID: 2429346358-888615403
                                                      • Opcode ID: 8c9ca771c2e680eb46f10629532bb9a982182a74179e8665eaafc9c3abe3b899
                                                      • Instruction ID: f281788b7991f7896b8b3265c647370b20b6a04bebae8b1cd665f1f0450cf583
                                                      • Opcode Fuzzy Hash: 8c9ca771c2e680eb46f10629532bb9a982182a74179e8665eaafc9c3abe3b899
                                                      • Instruction Fuzzy Hash: 7D718774104244AFDB21CF18EC48FBABBE9FB88304F54441DF999D7261EB70A956CB11
                                                      APIs
                                                        • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                      • DragQueryPoint.SHELL32(?,?), ref: 00829147
                                                        • Part of subcall function 00827674: ClientToScreen.USER32(?,?), ref: 0082769A
                                                        • Part of subcall function 00827674: GetWindowRect.USER32(?,?), ref: 00827710
                                                        • Part of subcall function 00827674: PtInRect.USER32(?,?,00828B89), ref: 00827720
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 008291B0
                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 008291BB
                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 008291DE
                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00829225
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 0082923E
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00829255
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00829277
                                                      • DragFinish.SHELL32(?), ref: 0082927E
                                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00829371
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$hW
                                                      • API String ID: 221274066-3169463327
                                                      • Opcode ID: 7a857c3821a67aaf099c75ac3cb4996007577ea8356c81012a276f0a9d529e64
                                                      • Instruction ID: 1e9fb36b658e1efe701474a6e69a5557ce8f71ba6fc23f76b3c8387de6d2f690
                                                      • Opcode Fuzzy Hash: 7a857c3821a67aaf099c75ac3cb4996007577ea8356c81012a276f0a9d529e64
                                                      • Instruction Fuzzy Hash: 7C617C71108301AFD701DF64EC89DAFBBE8FF99350F40491DF695922A1DB349A49CBA2
                                                      APIs
                                                      • ___free_lconv_mon.LIBCMT ref: 007CDAA1
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD659
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD66B
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD67D
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD68F
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6A1
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6B3
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6C5
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6D7
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6E9
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD6FB
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD70D
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD71F
                                                        • Part of subcall function 007CD63C: _free.LIBCMT ref: 007CD731
                                                      • _free.LIBCMT ref: 007CDA96
                                                        • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                        • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                      • _free.LIBCMT ref: 007CDAB8
                                                      • _free.LIBCMT ref: 007CDACD
                                                      • _free.LIBCMT ref: 007CDAD8
                                                      • _free.LIBCMT ref: 007CDAFA
                                                      • _free.LIBCMT ref: 007CDB0D
                                                      • _free.LIBCMT ref: 007CDB1B
                                                      • _free.LIBCMT ref: 007CDB26
                                                      • _free.LIBCMT ref: 007CDB5E
                                                      • _free.LIBCMT ref: 007CDB65
                                                      • _free.LIBCMT ref: 007CDB82
                                                      • _free.LIBCMT ref: 007CDB9A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                      • String ID: `p
                                                      • API String ID: 161543041-1075628567
                                                      • Opcode ID: ed16e98a3343bd41f2e1faaf89de1d676a594af2da8f4e9e841264b53afa2046
                                                      • Instruction ID: 58c84757230f259096f9c1d5ea32653a62fa4655864c432f7d64943a74928fb4
                                                      • Opcode Fuzzy Hash: ed16e98a3343bd41f2e1faaf89de1d676a594af2da8f4e9e841264b53afa2046
                                                      • Instruction Fuzzy Hash: 1D313771604705DFEB31AA79E849F5AB7E9FF00311F15842DE449E71A2DA39BC81CB20
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 0081B198
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0081B1B0
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0081B1D4
                                                      • _wcslen.LIBCMT ref: 0081B200
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0081B214
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0081B236
                                                      • _wcslen.LIBCMT ref: 0081B332
                                                        • Part of subcall function 008005A7: GetStdHandle.KERNEL32(000000F6), ref: 008005C6
                                                      • _wcslen.LIBCMT ref: 0081B34B
                                                      • _wcslen.LIBCMT ref: 0081B366
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0081B3B6
                                                      • GetLastError.KERNEL32(00000000), ref: 0081B407
                                                      • CloseHandle.KERNEL32(?), ref: 0081B439
                                                      • CloseHandle.KERNEL32(00000000), ref: 0081B44A
                                                      • CloseHandle.KERNEL32(00000000), ref: 0081B45C
                                                      • CloseHandle.KERNEL32(00000000), ref: 0081B46E
                                                      • CloseHandle.KERNEL32(?), ref: 0081B4E3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 2178637699-0
                                                      • Opcode ID: d92a496b72c73511b3ae5eec96cb0eb64bb986005d50d69454b14a5492a50535
                                                      • Instruction ID: 203d3f5f10fc92cf8c479dd990ce0a53f1582e222c9d83a057180ef5787548ea
                                                      • Opcode Fuzzy Hash: d92a496b72c73511b3ae5eec96cb0eb64bb986005d50d69454b14a5492a50535
                                                      • Instruction Fuzzy Hash: 40F17931508240DFCB24EF24D885BAABBE5FF85314F14855DF8999B2A2DB35EC84CB52
                                                      APIs
                                                      • GetMenuItemCount.USER32(00861990), ref: 007D2F8D
                                                      • GetMenuItemCount.USER32(00861990), ref: 007D303D
                                                      • GetCursorPos.USER32(?), ref: 007D3081
                                                      • SetForegroundWindow.USER32(00000000), ref: 007D308A
                                                      • TrackPopupMenuEx.USER32(00861990,00000000,?,00000000,00000000,00000000), ref: 007D309D
                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007D30A9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                      • String ID: 0
                                                      • API String ID: 36266755-4108050209
                                                      • Opcode ID: 1a53c54bdf5946853897738594fe9bba358da2d5b856df5134239b895e437820
                                                      • Instruction ID: 02c70986d88c7a395dbf2a68e260d3065e9c7be3eac87e15c556e9f4a0ab87ca
                                                      • Opcode Fuzzy Hash: 1a53c54bdf5946853897738594fe9bba358da2d5b856df5134239b895e437820
                                                      • Instruction Fuzzy Hash: F8713831644205BEEB218F24DD49FAEBF75FF05324F204207F524AA2E1C7B9A912CB90
                                                      APIs
                                                        • Part of subcall function 007A8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007A8BE8,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007A8FC5
                                                      • DestroyWindow.USER32(?), ref: 007A8C81
                                                      • KillTimer.USER32(00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007A8D1B
                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 007E6973
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007E69A1
                                                      • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,007A8BBA,00000000,?), ref: 007E69B8
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,007A8BBA,00000000), ref: 007E69D4
                                                      • DeleteObject.GDI32(00000000), ref: 007E69E6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                      • String ID: hW
                                                      • API String ID: 641708696-1300829777
                                                      • Opcode ID: f38b22da0be23c3bf483515e7d2479b86d1525d24a91c7760745d200095bf0d9
                                                      • Instruction ID: 5593044dc355e06bed2a3a1c0baa2acda0dc3567fe9ce8c07ac6217d61912cb6
                                                      • Opcode Fuzzy Hash: f38b22da0be23c3bf483515e7d2479b86d1525d24a91c7760745d200095bf0d9
                                                      • Instruction Fuzzy Hash: 5E61CF30502640DFCB759F15C948B39BBF1FB95322F14966CE04297661CB79AC91CF62
                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0080C4B0
                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0080C4C3
                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0080C4D7
                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0080C4F0
                                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0080C533
                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0080C549
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0080C554
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0080C584
                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0080C5DC
                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0080C5F0
                                                      • InternetCloseHandle.WININET(00000000), ref: 0080C5FB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                      • String ID:
                                                      • API String ID: 3800310941-3916222277
                                                      • Opcode ID: e9add2049420b3297af69510c994b5bf485ccde8ed4cb4709062745779efa488
                                                      • Instruction ID: df2e09b39e59a3e6cf63d3726b01f7d08b11ef9278705539f2ccf1ee09a8402a
                                                      • Opcode Fuzzy Hash: e9add2049420b3297af69510c994b5bf485ccde8ed4cb4709062745779efa488
                                                      • Instruction Fuzzy Hash: 6B514AB5500608BFDB718F64CD88ABB7BBCFF08754F108619F945D6290DB34E9459BA0
                                                      APIs
                                                        • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                      • GetSysColor.USER32(0000000F), ref: 007A9862
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ColorLongWindow
                                                      • String ID: hW
                                                      • API String ID: 259745315-1300829777
                                                      • Opcode ID: e2d7e473d23b226b1e29d22d2f801807a2d54e2a323ad903b838bf3d7374955b
                                                      • Instruction ID: 0a54125820bb350b53c13f0be5c1a7767eece7db74611fd66ed35570c21e2458
                                                      • Opcode Fuzzy Hash: e2d7e473d23b226b1e29d22d2f801807a2d54e2a323ad903b838bf3d7374955b
                                                      • Instruction Fuzzy Hash: FF418F31105640AFDB305F389C89BB93B65BB87321F148715FAA2871E1D77D9C62DB10
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00828592
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 008285A2
                                                      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 008285AD
                                                      • CloseHandle.KERNEL32(00000000), ref: 008285BA
                                                      • GlobalLock.KERNEL32(00000000), ref: 008285C8
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 008285D7
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 008285E0
                                                      • CloseHandle.KERNEL32(00000000), ref: 008285E7
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 008285F8
                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,0082FC38,?), ref: 00828611
                                                      • GlobalFree.KERNEL32(00000000), ref: 00828621
                                                      • GetObjectW.GDI32(?,00000018,000000FF), ref: 00828641
                                                      • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00828671
                                                      • DeleteObject.GDI32(00000000), ref: 00828699
                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 008286AF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                      • String ID:
                                                      • API String ID: 3840717409-0
                                                      • Opcode ID: 44adb319900364b315d367530b2954d5cfcefb65322a5ba2246966c776d98239
                                                      • Instruction ID: 671b0dff41a313f157185d31d543efb55114d433fda2bcec0732fe6ac3c8cf95
                                                      • Opcode Fuzzy Hash: 44adb319900364b315d367530b2954d5cfcefb65322a5ba2246966c776d98239
                                                      • Instruction Fuzzy Hash: 9E411975601218EFDB21DFA5DD48EAE7BB8FF99715F108058F909E7260DB30A942CB60
                                                      APIs
                                                      • VariantInit.OLEAUT32(00000000), ref: 00801502
                                                      • VariantCopy.OLEAUT32(?,?), ref: 0080150B
                                                      • VariantClear.OLEAUT32(?), ref: 00801517
                                                      • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 008015FB
                                                      • VarR8FromDec.OLEAUT32(?,?), ref: 00801657
                                                      • VariantInit.OLEAUT32(?), ref: 00801708
                                                      • SysFreeString.OLEAUT32(?), ref: 0080178C
                                                      • VariantClear.OLEAUT32(?), ref: 008017D8
                                                      • VariantClear.OLEAUT32(?), ref: 008017E7
                                                      • VariantInit.OLEAUT32(00000000), ref: 00801823
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                      • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                      • API String ID: 1234038744-3931177956
                                                      • Opcode ID: 58bd0985ae82f51803397c50034d9d7cd1e345c9ecb03ca10017bb9a293edc83
                                                      • Instruction ID: ad7f24d5db209d6dbf1397f3307f74bda0af65c137ed21b54fc2bdcedeb27412
                                                      • Opcode Fuzzy Hash: 58bd0985ae82f51803397c50034d9d7cd1e345c9ecb03ca10017bb9a293edc83
                                                      • Instruction Fuzzy Hash: 71D1DD32A00619EBDF50AF64EC8EA7DB7B5FF45724F14815AE406EB1C0DB34A841DBA1
                                                      APIs
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                        • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                        • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                        • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                        • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081B6F4
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0081B772
                                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 0081B80A
                                                      • RegCloseKey.ADVAPI32(?), ref: 0081B87E
                                                      • RegCloseKey.ADVAPI32(?), ref: 0081B89C
                                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0081B8F2
                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0081B904
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 0081B922
                                                      • FreeLibrary.KERNEL32(00000000), ref: 0081B983
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0081B994
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                      • API String ID: 146587525-4033151799
                                                      • Opcode ID: 2349a5b3e9b81fa236edfecc979666ecd314f8fa6e0f4790c7694654d0c0f4a7
                                                      • Instruction ID: 737e3100edc9977c6fdeebce40ae307fb3036e297e4d5c8a7d3d36e53518ddf0
                                                      • Opcode Fuzzy Hash: 2349a5b3e9b81fa236edfecc979666ecd314f8fa6e0f4790c7694654d0c0f4a7
                                                      • Instruction Fuzzy Hash: 2AC17D31204201EFDB14DF14C495F6ABBE5FF84318F14855CE55A8B2A2DB75EC86CB91
                                                      APIs
                                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00825504
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00825515
                                                      • CharNextW.USER32(00000158), ref: 00825544
                                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00825585
                                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0082559B
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008255AC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CharNext
                                                      • String ID: hW
                                                      • API String ID: 1350042424-1300829777
                                                      • Opcode ID: c76ff527d8d52dbb2ad7bf51640ae0bf2e188265a03b10bd8bfa4d00bae525d1
                                                      • Instruction ID: 5e75e1a2c6de396cd158ffea071bc64cb6f0c8887c40947f6cfbbfb9226d3ed3
                                                      • Opcode Fuzzy Hash: c76ff527d8d52dbb2ad7bf51640ae0bf2e188265a03b10bd8bfa4d00bae525d1
                                                      • Instruction Fuzzy Hash: 3A617C70940628EBDF209F94EC84AFE7BB9FF09724F108149F925E6290D7748AC1DB61
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 008125D8
                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 008125E8
                                                      • CreateCompatibleDC.GDI32(?), ref: 008125F4
                                                      • SelectObject.GDI32(00000000,?), ref: 00812601
                                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0081266D
                                                      • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 008126AC
                                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 008126D0
                                                      • SelectObject.GDI32(?,?), ref: 008126D8
                                                      • DeleteObject.GDI32(?), ref: 008126E1
                                                      • DeleteDC.GDI32(?), ref: 008126E8
                                                      • ReleaseDC.USER32(00000000,?), ref: 008126F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                      • String ID: (
                                                      • API String ID: 2598888154-3887548279
                                                      • Opcode ID: de76ced39fc724e098db698aaa54836ede0d08fde07167afc1a644da3f4b3f82
                                                      • Instruction ID: ed4a05cfda1c9a04da96c477f4b3848e8cd7d302140903ba04ac77bbd232a1b8
                                                      • Opcode Fuzzy Hash: de76ced39fc724e098db698aaa54836ede0d08fde07167afc1a644da3f4b3f82
                                                      • Instruction Fuzzy Hash: 1061D275D00219EFCF14CFA8D885AAEBBB9FF48310F208529E955A7250D770A951CF94
                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 007F369C
                                                      • _wcslen.LIBCMT ref: 007F36A7
                                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 007F3797
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 007F380C
                                                      • GetDlgCtrlID.USER32(?), ref: 007F385D
                                                      • GetWindowRect.USER32(?,?), ref: 007F3882
                                                      • GetParent.USER32(?), ref: 007F38A0
                                                      • ScreenToClient.USER32(00000000), ref: 007F38A7
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 007F3921
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 007F395D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                      • String ID: %s%u
                                                      • API String ID: 4010501982-679674701
                                                      • Opcode ID: 1eee2eee9bb3e1b92dbb4562761ccb3afd04a0a869b3cbda0b521afcab51ca1f
                                                      • Instruction ID: 10279f71db097cdafafe08ced29f4aca3fb29342dc931eb2f89b9abbbd199510
                                                      • Opcode Fuzzy Hash: 1eee2eee9bb3e1b92dbb4562761ccb3afd04a0a869b3cbda0b521afcab51ca1f
                                                      • Instruction Fuzzy Hash: 7491B57120460AEFD715DF24C885BFAF7A8FF44354F008619FA99D2250DB78EA45CBA1
                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 007F4994
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 007F49DA
                                                      • _wcslen.LIBCMT ref: 007F49EB
                                                      • CharUpperBuffW.USER32(?,00000000), ref: 007F49F7
                                                      • _wcsstr.LIBVCRUNTIME ref: 007F4A2C
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 007F4A64
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 007F4A9D
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 007F4AE6
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 007F4B20
                                                      • GetWindowRect.USER32(?,?), ref: 007F4B8B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                      • String ID: ThumbnailClass
                                                      • API String ID: 1311036022-1241985126
                                                      • Opcode ID: 5edcaa97f8b538c3fa8d3e40c5eae3c193d6b90c54e0cf62440b4c99ca33a81e
                                                      • Instruction ID: adfb6fcb2845df5fa02704e860ce794b7864579af8e5bb80d2b46187105553d4
                                                      • Opcode Fuzzy Hash: 5edcaa97f8b538c3fa8d3e40c5eae3c193d6b90c54e0cf62440b4c99ca33a81e
                                                      • Instruction Fuzzy Hash: 39918C711042099FDB14DF14C985BBB77E8FF84314F048469FE859A296EB38ED45CBA1
                                                      APIs
                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00823A9D
                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00823AA0
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00823AC7
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00823AEA
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00823B62
                                                      • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00823BAC
                                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00823BC7
                                                      • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00823BE2
                                                      • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00823BF6
                                                      • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00823C13
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$LongWindow
                                                      • String ID: hW
                                                      • API String ID: 312131281-1300829777
                                                      • Opcode ID: 729bd1cf4577f71f730b3fc3fdf9970d51f36b8be2aba0834ab5acf70eb197c7
                                                      • Instruction ID: 31d72e4892d9737bd7c13783d3a73ad11d6c49e45c2995278cbaa2abb2e4d40e
                                                      • Opcode Fuzzy Hash: 729bd1cf4577f71f730b3fc3fdf9970d51f36b8be2aba0834ab5acf70eb197c7
                                                      • Instruction Fuzzy Hash: 15618975900218AFDB10DFA8DC95EEE77B8FB09710F14009AFA15E72A2C774AE81DB50
                                                      APIs
                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0081CC64
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0081CC8D
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0081CD48
                                                        • Part of subcall function 0081CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0081CCAA
                                                        • Part of subcall function 0081CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0081CCBD
                                                        • Part of subcall function 0081CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0081CCCF
                                                        • Part of subcall function 0081CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0081CD05
                                                        • Part of subcall function 0081CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0081CD28
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 0081CCF3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                      • API String ID: 2734957052-4033151799
                                                      • Opcode ID: 8ebcb6e245dbf5d4b73d0579d0403ae895eaa6c30c010a01030b6633563d9f42
                                                      • Instruction ID: d6388a366479813e1de374e0a6d620a47c2895ef81f932771f28ce3d12a0d4f1
                                                      • Opcode Fuzzy Hash: 8ebcb6e245dbf5d4b73d0579d0403ae895eaa6c30c010a01030b6633563d9f42
                                                      • Instruction Fuzzy Hash: CC316C71941129BBDB308B55EC88EFFBB7CFF55750F004165A906E2240DA749E86DAE0
                                                      APIs
                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00803D40
                                                      • _wcslen.LIBCMT ref: 00803D6D
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00803D9D
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00803DBE
                                                      • RemoveDirectoryW.KERNEL32(?), ref: 00803DCE
                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00803E55
                                                      • CloseHandle.KERNEL32(00000000), ref: 00803E60
                                                      • CloseHandle.KERNEL32(00000000), ref: 00803E6B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                      • String ID: :$\$\??\%s
                                                      • API String ID: 1149970189-3457252023
                                                      • Opcode ID: 88140d5037a744302ecee1a98181644c391bf612ba6c6e2cd85524041f69b167
                                                      • Instruction ID: 596c0f9f68e50f9ce3af321ccccbe38eebfdca983929f62f1cc03331426297dc
                                                      • Opcode Fuzzy Hash: 88140d5037a744302ecee1a98181644c391bf612ba6c6e2cd85524041f69b167
                                                      • Instruction Fuzzy Hash: 6E318171900209ABDB219BA0DC49FEF77BCFF89740F1041A6F915D61A0EB7497458B24
                                                      APIs
                                                      • timeGetTime.WINMM ref: 007FE6B4
                                                        • Part of subcall function 007AE551: timeGetTime.WINMM(?,?,007FE6D4), ref: 007AE555
                                                      • Sleep.KERNEL32(0000000A), ref: 007FE6E1
                                                      • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 007FE705
                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 007FE727
                                                      • SetActiveWindow.USER32 ref: 007FE746
                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007FE754
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 007FE773
                                                      • Sleep.KERNEL32(000000FA), ref: 007FE77E
                                                      • IsWindow.USER32 ref: 007FE78A
                                                      • EndDialog.USER32(00000000), ref: 007FE79B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                      • String ID: BUTTON
                                                      • API String ID: 1194449130-3405671355
                                                      • Opcode ID: 125f5571201b93628f400f48c5e1167a2f9fa06cc8c3ef04ff57c986300cc855
                                                      • Instruction ID: a1d0c44a567786e306272527ba064686cd3bd01d76c9b405a361067d2099f0a2
                                                      • Opcode Fuzzy Hash: 125f5571201b93628f400f48c5e1167a2f9fa06cc8c3ef04ff57c986300cc855
                                                      • Instruction Fuzzy Hash: 7D21A8B0200608EFEB10AFA4ED8DA393B69F764749F115425F612C13B1DBB99C119B24
                                                      APIs
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007FEA5D
                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007FEA73
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007FEA84
                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 007FEA96
                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 007FEAA7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: SendString$_wcslen
                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                      • API String ID: 2420728520-1007645807
                                                      • Opcode ID: 546af0eec14588e5aa794bea84868d233c41d3246522fe3e88d64ab4ee879191
                                                      • Instruction ID: 2b5d675d2e38caf526063573cb4abb6f41d140578bca63fac57e00315dd97a4b
                                                      • Opcode Fuzzy Hash: 546af0eec14588e5aa794bea84868d233c41d3246522fe3e88d64ab4ee879191
                                                      • Instruction Fuzzy Hash: E8119131A90219B9EB20A7A5EC4ADFF6A7CFBD1F00F4044297911E31E0FE781919C5B0
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000001), ref: 007F5CE2
                                                      • GetWindowRect.USER32(00000000,?), ref: 007F5CFB
                                                      • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 007F5D59
                                                      • GetDlgItem.USER32(?,00000002), ref: 007F5D69
                                                      • GetWindowRect.USER32(00000000,?), ref: 007F5D7B
                                                      • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 007F5DCF
                                                      • GetDlgItem.USER32(?,000003E9), ref: 007F5DDD
                                                      • GetWindowRect.USER32(00000000,?), ref: 007F5DEF
                                                      • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 007F5E31
                                                      • GetDlgItem.USER32(?,000003EA), ref: 007F5E44
                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 007F5E5A
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 007F5E67
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                      • String ID:
                                                      • API String ID: 3096461208-0
                                                      • Opcode ID: 2700a6749d6b2ec81c25c0883a0fcd9e52bde4bc46a57a3631ba9a5ff09a6582
                                                      • Instruction ID: df086a5b86fa7af2e91444132192f0b30a68963cbb4924b11cab7cd7a4ec1313
                                                      • Opcode Fuzzy Hash: 2700a6749d6b2ec81c25c0883a0fcd9e52bde4bc46a57a3631ba9a5ff09a6582
                                                      • Instruction Fuzzy Hash: 7D51FD71B00609AFDB18CF68DD89ABEBBB5FB58310F148229FA15E6290D7749E05CB50
                                                      APIs
                                                      • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00825186
                                                      • ShowWindow.USER32(?,00000000), ref: 008251C7
                                                      • ShowWindow.USER32(?,00000005,?,00000000), ref: 008251CD
                                                      • SetFocus.USER32(?,?,00000005,?,00000000), ref: 008251D1
                                                        • Part of subcall function 00826FBA: DeleteObject.GDI32(00000000), ref: 00826FE6
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0082520D
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0082521A
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0082524D
                                                      • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00825287
                                                      • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00825296
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                      • String ID: hW
                                                      • API String ID: 3210457359-1300829777
                                                      • Opcode ID: 1d8a445f3bcff81d62c7a963d48c8511267afe32a0f34d800f3d1926434ba885
                                                      • Instruction ID: 1db447e0024506dc08a3e4c6d4f48196a29fb52ae5f13eb33e4142e007a1ffaa
                                                      • Opcode Fuzzy Hash: 1d8a445f3bcff81d62c7a963d48c8511267afe32a0f34d800f3d1926434ba885
                                                      • Instruction Fuzzy Hash: 8A519130AD0A28FEEF309F24EC4ABA83B65FB05325F148112F615D62E1C775A9E4DB41
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,007DF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 007F9717
                                                      • LoadStringW.USER32(00000000,?,007DF7F8,00000001), ref: 007F9720
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,007DF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 007F9742
                                                      • LoadStringW.USER32(00000000,?,007DF7F8,00000001), ref: 007F9745
                                                      • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 007F9866
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message_wcslen
                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                      • API String ID: 747408836-2268648507
                                                      • Opcode ID: bcdced5dbbca4b0ad9c91b0a27de67bdb2154b0c8bd833f23531514f190bdddf
                                                      • Instruction ID: f6eb78a52f2fec9f9f380ec997ebacaf34fa59e09d6a7693c5145c06b94597f7
                                                      • Opcode Fuzzy Hash: bcdced5dbbca4b0ad9c91b0a27de67bdb2154b0c8bd833f23531514f190bdddf
                                                      • Instruction Fuzzy Hash: 97413D72800209EADF04EBE4ED4AEFEB778AF55340F504169F60572192EB696F48CA61
                                                      APIs
                                                        • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 007F07A2
                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 007F07BE
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 007F07DA
                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 007F0804
                                                      • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 007F082C
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007F0837
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007F083C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                      • API String ID: 323675364-22481851
                                                      • Opcode ID: 55582e8bd808971a172f4ead96cb4219263966135e2ae5624b9bea2d644d8619
                                                      • Instruction ID: 531053bbef292b8ded272602192bf614a72580e5d910a45e3f9f25e51f20fcdd
                                                      • Opcode Fuzzy Hash: 55582e8bd808971a172f4ead96cb4219263966135e2ae5624b9bea2d644d8619
                                                      • Instruction Fuzzy Hash: 9F410872C10629EBDF21EBA4EC99CFDB778FF04350B044169E911A3261EB385E04CBA0
                                                      APIs
                                                      • CreateMenu.USER32 ref: 00823C79
                                                      • SetMenu.USER32(?,00000000), ref: 00823C88
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00823D10
                                                      • IsMenu.USER32(?), ref: 00823D24
                                                      • CreatePopupMenu.USER32 ref: 00823D2E
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00823D5B
                                                      • DrawMenuBar.USER32 ref: 00823D63
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                      • String ID: 0$F$hW
                                                      • API String ID: 161812096-2236178175
                                                      • Opcode ID: 5aa7310370f29755c13b6edc58abb37fa908a36320c4b4b32617ccfe9beca193
                                                      • Instruction ID: f46cce4179c02593c26075cc4e2c54491e81e37fc18c7aea29aa4522baf759ea
                                                      • Opcode Fuzzy Hash: 5aa7310370f29755c13b6edc58abb37fa908a36320c4b4b32617ccfe9beca193
                                                      • Instruction Fuzzy Hash: 61418874A01219EFDF24CF64E854AAABBB5FF49300F144028E946E7360D774EA11CF90
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00813C5C
                                                      • CoInitialize.OLE32(00000000), ref: 00813C8A
                                                      • CoUninitialize.OLE32 ref: 00813C94
                                                      • _wcslen.LIBCMT ref: 00813D2D
                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00813DB1
                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00813ED5
                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00813F0E
                                                      • CoGetObject.OLE32(?,00000000,0082FB98,?), ref: 00813F2D
                                                      • SetErrorMode.KERNEL32(00000000), ref: 00813F40
                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00813FC4
                                                      • VariantClear.OLEAUT32(?), ref: 00813FD8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                      • String ID:
                                                      • API String ID: 429561992-0
                                                      • Opcode ID: 6ef835e32a2f964f7983b78631968f7156b07ab8f33a76d3ac3182c4fba8dcab
                                                      • Instruction ID: 541115aa48435784aa4853d0c681f16df4c966d0b95a910e028d850578efee17
                                                      • Opcode Fuzzy Hash: 6ef835e32a2f964f7983b78631968f7156b07ab8f33a76d3ac3182c4fba8dcab
                                                      • Instruction Fuzzy Hash: B3C12371608205AFD700DF68C88496AB7E9FF89748F00492DF98ADB251DB31EE46CB52
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00807AF3
                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00807B8F
                                                      • SHGetDesktopFolder.SHELL32(?), ref: 00807BA3
                                                      • CoCreateInstance.OLE32(0082FD08,00000000,00000001,00856E6C,?), ref: 00807BEF
                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00807C74
                                                      • CoTaskMemFree.OLE32(?,?), ref: 00807CCC
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00807D57
                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00807D7A
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00807D81
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00807DD6
                                                      • CoUninitialize.OLE32 ref: 00807DDC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                      • String ID:
                                                      • API String ID: 2762341140-0
                                                      • Opcode ID: 6d03d8eae759e0de2b0da165bac6ca1f9d7b0d2ee7e424f6de00f317850457a2
                                                      • Instruction ID: fbb10deb4dfb5e4246c5a2144d5005d6e94ff6779856af4c5939ec012184fd21
                                                      • Opcode Fuzzy Hash: 6d03d8eae759e0de2b0da165bac6ca1f9d7b0d2ee7e424f6de00f317850457a2
                                                      • Instruction Fuzzy Hash: 09C13975A04109EFDB54DFA4C888DAEBBF9FF48314B1484A8E919DB261D730EE41CB90
                                                      APIs
                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 007EFAAF
                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 007EFB08
                                                      • VariantInit.OLEAUT32(?), ref: 007EFB1A
                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 007EFB3A
                                                      • VariantCopy.OLEAUT32(?,?), ref: 007EFB8D
                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 007EFBA1
                                                      • VariantClear.OLEAUT32(?), ref: 007EFBB6
                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 007EFBC3
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007EFBCC
                                                      • VariantClear.OLEAUT32(?), ref: 007EFBDE
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007EFBE9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                      • String ID:
                                                      • API String ID: 2706829360-0
                                                      • Opcode ID: 21512aece9a5b3f2b966d163c3002e08e90b7cb1bf33bf66547c90aa1cfe3320
                                                      • Instruction ID: 2721d3d119432ea16e04cb341c575aed42fa8a17a7b5d72834efee4078f06508
                                                      • Opcode Fuzzy Hash: 21512aece9a5b3f2b966d163c3002e08e90b7cb1bf33bf66547c90aa1cfe3320
                                                      • Instruction Fuzzy Hash: 61415075A01219EFCF10EF69DC589AEBBB9FF48354F00C065E905E7261D734A946CBA0
                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 007F9CA1
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 007F9D22
                                                      • GetKeyState.USER32(000000A0), ref: 007F9D3D
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 007F9D57
                                                      • GetKeyState.USER32(000000A1), ref: 007F9D6C
                                                      • GetAsyncKeyState.USER32(00000011), ref: 007F9D84
                                                      • GetKeyState.USER32(00000011), ref: 007F9D96
                                                      • GetAsyncKeyState.USER32(00000012), ref: 007F9DAE
                                                      • GetKeyState.USER32(00000012), ref: 007F9DC0
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 007F9DD8
                                                      • GetKeyState.USER32(0000005B), ref: 007F9DEA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: c834f1a0316d950828491d83ac282040aac3b32cae39caed9ae681dbd7734b39
                                                      • Instruction ID: 78922f8a3367252372c8cc54dea07330373eb24b006fa21392ae9a61194609aa
                                                      • Opcode Fuzzy Hash: c834f1a0316d950828491d83ac282040aac3b32cae39caed9ae681dbd7734b39
                                                      • Instruction Fuzzy Hash: BB41A634604BCD69FF71967488043B5BEA07F12344F14805ADBC6567C2EBAD99C8C7A2
                                                      APIs
                                                      • WSAStartup.WSOCK32(00000101,?), ref: 008105BC
                                                      • inet_addr.WSOCK32(?), ref: 0081061C
                                                      • gethostbyname.WSOCK32(?), ref: 00810628
                                                      • IcmpCreateFile.IPHLPAPI ref: 00810636
                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 008106C6
                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 008106E5
                                                      • IcmpCloseHandle.IPHLPAPI(?), ref: 008107B9
                                                      • WSACleanup.WSOCK32 ref: 008107BF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                      • String ID: Ping
                                                      • API String ID: 1028309954-2246546115
                                                      • Opcode ID: 1df8d127091d32a7892cd731aa131606c7eabfc349ce36fdc05096fe0934fa9e
                                                      • Instruction ID: 8abc471a38a3be8604506699b2237290abefd9527675d6d1393bc547f8cb0d48
                                                      • Opcode Fuzzy Hash: 1df8d127091d32a7892cd731aa131606c7eabfc349ce36fdc05096fe0934fa9e
                                                      • Instruction Fuzzy Hash: CF919A356042019FD720CF15D889F5ABBE4FF88318F0489A9E469DB6A2C7B5EC81CF81
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharLower
                                                      • String ID: cdecl$none$stdcall$winapi
                                                      • API String ID: 707087890-567219261
                                                      • Opcode ID: e24074c3d5e0422cb1c52b586c08c5ab025654dcf12fefa94547acf1418b39a5
                                                      • Instruction ID: 6cd65a74900288445db4e0cb3772bd824107d20056aaf63a13504e54bc13bd4a
                                                      • Opcode Fuzzy Hash: e24074c3d5e0422cb1c52b586c08c5ab025654dcf12fefa94547acf1418b39a5
                                                      • Instruction Fuzzy Hash: 28518F31A00116DBCF14DF68D9429FEB7AAFF65324B204229E926E72C4DB34DD84C790
                                                      APIs
                                                      • CoInitialize.OLE32 ref: 00813774
                                                      • CoUninitialize.OLE32 ref: 0081377F
                                                      • CoCreateInstance.OLE32(?,00000000,00000017,0082FB78,?), ref: 008137D9
                                                      • IIDFromString.OLE32(?,?), ref: 0081384C
                                                      • VariantInit.OLEAUT32(?), ref: 008138E4
                                                      • VariantClear.OLEAUT32(?), ref: 00813936
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                      • API String ID: 636576611-1287834457
                                                      • Opcode ID: ed2ca149a3740a4667a02e82923d70c2a6515334d3b8cbe241f74946c9c478fb
                                                      • Instruction ID: c119614c6a9bcc543041f41f2e555e9f1116a78a199376e76aff44b660973c7c
                                                      • Opcode Fuzzy Hash: ed2ca149a3740a4667a02e82923d70c2a6515334d3b8cbe241f74946c9c478fb
                                                      • Instruction Fuzzy Hash: 39618C70608301AFD710DF54D888BAABBE8FF49714F104829F985DB291C774EE88CB92
                                                      APIs
                                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 008033CF
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                      • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 008033F0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: LoadString$_wcslen
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 4099089115-3080491070
                                                      • Opcode ID: 0549a522119ba899ec7ea06ac7b9219ef978537891ddbcc237d47a84a679dfb5
                                                      • Instruction ID: 9597cd344a7c57b94f554dc2a933413750e5efec0afe6fd1b48eb3e9f072476b
                                                      • Opcode Fuzzy Hash: 0549a522119ba899ec7ea06ac7b9219ef978537891ddbcc237d47a84a679dfb5
                                                      • Instruction Fuzzy Hash: 93519C72800209EADF15EBA0DD4AEEEB778FF14340F144165F515B22A2EB792F58DB60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharUpper
                                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                      • API String ID: 1256254125-769500911
                                                      • Opcode ID: dc2a8ee3aef82256c3f2e95fd7800583718f24f660b8506ac050ddb3b256d5c6
                                                      • Instruction ID: 2f48cf10c2362fca83cd80ada2b53440e388edeceb2fc0f45a10f05b8aaf9aae
                                                      • Opcode Fuzzy Hash: dc2a8ee3aef82256c3f2e95fd7800583718f24f660b8506ac050ddb3b256d5c6
                                                      • Instruction Fuzzy Hash: CA41B632A0112ADBCB206F7DCC905BE77A5BFA4764B244229E621DB384F739DD85C790
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007FBCFD
                                                      • IsMenu.USER32(00000000), ref: 007FBD1D
                                                      • CreatePopupMenu.USER32 ref: 007FBD53
                                                      • GetMenuItemCount.USER32(pT), ref: 007FBDA4
                                                      • InsertMenuItemW.USER32(pT,?,00000001,00000030), ref: 007FBDCC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                      • String ID: 0$2$pT$pT
                                                      • API String ID: 93392585-54257735
                                                      • Opcode ID: c440b3d8fefcb792e356208f6e35ca44c860d886a482e122566092f6fa0a76a4
                                                      • Instruction ID: 4048bd5710bc4f97e7db7ce92cc6fae5edfcfcfc1d61ea13159e03c686775cb1
                                                      • Opcode Fuzzy Hash: c440b3d8fefcb792e356208f6e35ca44c860d886a482e122566092f6fa0a76a4
                                                      • Instruction Fuzzy Hash: 50519E70B0020DDBDB24DFA8D988BBEBBF4BF45314F148159E61197391D778A941CB62
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 008053A0
                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00805416
                                                      • GetLastError.KERNEL32 ref: 00805420
                                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 008054A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Error$Mode$DiskFreeLastSpace
                                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                      • API String ID: 4194297153-14809454
                                                      • Opcode ID: c64cf05edd44ec82f4932bff8163b3832565ee8681a573b621f258915ca6fdb8
                                                      • Instruction ID: abba89c24541d36d4777ce9cc080c0f835ab63f12069e83ea6a96eea733e053a
                                                      • Opcode Fuzzy Hash: c64cf05edd44ec82f4932bff8163b3832565ee8681a573b621f258915ca6fdb8
                                                      • Instruction Fuzzy Hash: 6531D3B5A00908DFCB50DF68C889AEABBB4FF05305F548059E901CB2A2D731DD86CFA1
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 007FB151
                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB165
                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 007FB16C
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB17B
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 007FB18D
                                                      • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB1A6
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB1B8
                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB1FD
                                                      • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB212
                                                      • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,007FA1E1,?,00000001), ref: 007FB21D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                      • String ID:
                                                      • API String ID: 2156557900-0
                                                      • Opcode ID: 0ba5a31f9abe303752454fc651d4f1841ea3e983e20644f79a7cb81a382b6864
                                                      • Instruction ID: f34301f0a5ca896d6c7366f90e0286e6c3c0c729c6bff50163978e0c58490073
                                                      • Opcode Fuzzy Hash: 0ba5a31f9abe303752454fc651d4f1841ea3e983e20644f79a7cb81a382b6864
                                                      • Instruction Fuzzy Hash: 14318DB5500608BFEB209F64DC48BBD7BA9FBA1321F119019FB05D6290D7B89E458F61
                                                      APIs
                                                      • _free.LIBCMT ref: 007C2C94
                                                        • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                        • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                      • _free.LIBCMT ref: 007C2CA0
                                                      • _free.LIBCMT ref: 007C2CAB
                                                      • _free.LIBCMT ref: 007C2CB6
                                                      • _free.LIBCMT ref: 007C2CC1
                                                      • _free.LIBCMT ref: 007C2CCC
                                                      • _free.LIBCMT ref: 007C2CD7
                                                      • _free.LIBCMT ref: 007C2CE2
                                                      • _free.LIBCMT ref: 007C2CED
                                                      • _free.LIBCMT ref: 007C2CFB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: c8d4d671216b774df3d06d03098e9046d6387746a31d8e7b96f721898edbecb5
                                                      • Instruction ID: ae70cf53277b433889f567f6eccfe88be024aa02f433928240695eb3e2723d7d
                                                      • Opcode Fuzzy Hash: c8d4d671216b774df3d06d03098e9046d6387746a31d8e7b96f721898edbecb5
                                                      • Instruction Fuzzy Hash: D3118076100108EFCB02EF94D886E9D3BA5BF05350F5144A9FA48AB232DA35EA519F90
                                                      APIs
                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00791459
                                                      • OleUninitialize.OLE32(?,00000000), ref: 007914F8
                                                      • UnregisterHotKey.USER32(?), ref: 007916DD
                                                      • DestroyWindow.USER32(?), ref: 007D24B9
                                                      • FreeLibrary.KERNEL32(?), ref: 007D251E
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 007D254B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                      • String ID: close all
                                                      • API String ID: 469580280-3243417748
                                                      • Opcode ID: 2c31d33dc74a4d85ee66064004ec9bdba99de10946b5912af5ffe21299dc8074
                                                      • Instruction ID: c7861e0bdc8097eba4ee072285c9850986ecb3fcb0f69fcd631089ab8104a70d
                                                      • Opcode Fuzzy Hash: 2c31d33dc74a4d85ee66064004ec9bdba99de10946b5912af5ffe21299dc8074
                                                      • Instruction Fuzzy Hash: 28D17C31701212CFDB29DF54E899A29F7A0BF15700F5542AEE54AAB352DB38AC23CF51
                                                      APIs
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00807FAD
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00807FC1
                                                      • GetFileAttributesW.KERNEL32(?), ref: 00807FEB
                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00808005
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00808017
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00808060
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008080B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory$AttributesFile
                                                      • String ID: *.*
                                                      • API String ID: 769691225-438819550
                                                      • Opcode ID: 503225e6ab0ec42e3a9092c763b748c23fe583a08b8906cacfa69db108895fac
                                                      • Instruction ID: 163faf5c8efbe01031da2b9d447e1ebd556a2d4a64ea088c7e68eaea6f11d3ac
                                                      • Opcode Fuzzy Hash: 503225e6ab0ec42e3a9092c763b748c23fe583a08b8906cacfa69db108895fac
                                                      • Instruction Fuzzy Hash: E9819072908245DBCB60EF14C8449AEB3E9FF89714F54886EF885C7290EB35ED45CB52
                                                      APIs
                                                      • IsWindow.USER32(00E45768), ref: 00827F37
                                                      • IsWindowEnabled.USER32(00E45768), ref: 00827F43
                                                      • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0082801E
                                                      • SendMessageW.USER32(00E45768,000000B0,?,?), ref: 00828051
                                                      • IsDlgButtonChecked.USER32(?,?), ref: 00828089
                                                      • GetWindowLongW.USER32(00E45768,000000EC), ref: 008280AB
                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 008280C3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                      • String ID: hW
                                                      • API String ID: 4072528602-1300829777
                                                      • Opcode ID: 9eea29d52d0f250a5841a8b78f1b3b6d0158186d5266be1bac44ff0101d3fba7
                                                      • Instruction ID: 42f664d22777b6721c71c8edd20c8d8596e6792a833570a9187f2b873b257c0c
                                                      • Opcode Fuzzy Hash: 9eea29d52d0f250a5841a8b78f1b3b6d0158186d5266be1bac44ff0101d3fba7
                                                      • Instruction Fuzzy Hash: B771BC7460D224EFEF219F65E984FBABBB9FF19300F144059E945D72A1CB31A885CB21
                                                      APIs
                                                      • SetWindowLongW.USER32(?,000000EB), ref: 00795C7A
                                                        • Part of subcall function 00795D0A: GetClientRect.USER32(?,?), ref: 00795D30
                                                        • Part of subcall function 00795D0A: GetWindowRect.USER32(?,?), ref: 00795D71
                                                        • Part of subcall function 00795D0A: ScreenToClient.USER32(?,?), ref: 00795D99
                                                      • GetDC.USER32 ref: 007D46F5
                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 007D4708
                                                      • SelectObject.GDI32(00000000,00000000), ref: 007D4716
                                                      • SelectObject.GDI32(00000000,00000000), ref: 007D472B
                                                      • ReleaseDC.USER32(?,00000000), ref: 007D4733
                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 007D47C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                      • String ID: U
                                                      • API String ID: 4009187628-3372436214
                                                      • Opcode ID: a841ffcefa8c8851f360938bc361b3ae9c66af460e6d870c2eab5a76c14a0797
                                                      • Instruction ID: 9782fcd2aab76b3284bbec311cf1d32c9bb9e01680b950fd311b007a561a4e00
                                                      • Opcode Fuzzy Hash: a841ffcefa8c8851f360938bc361b3ae9c66af460e6d870c2eab5a76c14a0797
                                                      • Instruction Fuzzy Hash: 7771D131500205DFCF228F64D984ABA7BB6FF4A360F18426AED565A3A6C739DC41DF60
                                                      APIs
                                                      • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 008035E4
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                      • LoadStringW.USER32(00862390,?,00000FFF,?), ref: 0080360A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: LoadString$_wcslen
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 4099089115-2391861430
                                                      • Opcode ID: 81a302e6d268e3c8e041dcc0d7eddb2856b027e72e80a8a4a55e854a59d2d371
                                                      • Instruction ID: 71efcacea93009122cded72c76f2d267a390dc6e88f1d3c0e6e9d8c81664da85
                                                      • Opcode Fuzzy Hash: 81a302e6d268e3c8e041dcc0d7eddb2856b027e72e80a8a4a55e854a59d2d371
                                                      • Instruction Fuzzy Hash: FF515171800109FADF15EBA0DC4AEEDBB78FF14340F144129F615B22A1EB791B99DBA1
                                                      APIs
                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00822E1C
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00822E4F
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00822E84
                                                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00822EB6
                                                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00822EE0
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00822EF1
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00822F0B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$MessageSend
                                                      • String ID: hW
                                                      • API String ID: 2178440468-1300829777
                                                      • Opcode ID: b1b1c8c956ff1eeaa3217e59e3248625b9375fe855ef35966f23af40b81c7472
                                                      • Instruction ID: 11ff562016e52dde70bf6d1b60ba1203b6df3f2d57be1641bd4b4364726e8fd1
                                                      • Opcode Fuzzy Hash: b1b1c8c956ff1eeaa3217e59e3248625b9375fe855ef35966f23af40b81c7472
                                                      • Instruction Fuzzy Hash: A131F438604164AFDB21CF58EC89F6937E1FB5A710F5A5164F911CB2B2CBB1A881AB41
                                                      APIs
                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0080C272
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0080C29A
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0080C2CA
                                                      • GetLastError.KERNEL32 ref: 0080C322
                                                      • SetEvent.KERNEL32(?), ref: 0080C336
                                                      • InternetCloseHandle.WININET(00000000), ref: 0080C341
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                      • String ID:
                                                      • API String ID: 3113390036-3916222277
                                                      • Opcode ID: 50dce172bcb3b34689aaf34a1b92669320ff531969ddd5ba6cda0cadf3f35f93
                                                      • Instruction ID: 341a6e76168e87c015857d13addd3f22aa597ed73cc4611f53eee802d1665067
                                                      • Opcode Fuzzy Hash: 50dce172bcb3b34689aaf34a1b92669320ff531969ddd5ba6cda0cadf3f35f93
                                                      • Instruction Fuzzy Hash: 393149B1600608AFD7719FA98C89ABB7AFCFB49744F14861EF446D2280DB34DD059BA1
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,007D3AAF,?,?,Bad directive syntax error,0082CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 007F98BC
                                                      • LoadStringW.USER32(00000000,?,007D3AAF,?), ref: 007F98C3
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 007F9987
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadMessageModuleString_wcslen
                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                      • API String ID: 858772685-4153970271
                                                      • Opcode ID: 89381a5c8e28f74921f445f80b17bbcfeef8d872bc0cecd9be723088cc5c6967
                                                      • Instruction ID: 78299dc4df60209f2da1503fc1260ef3373f9d524708282da2661724d3c034e8
                                                      • Opcode Fuzzy Hash: 89381a5c8e28f74921f445f80b17bbcfeef8d872bc0cecd9be723088cc5c6967
                                                      • Instruction Fuzzy Hash: F8216F3184021DEBDF11AF90DC0AEFE7779FF14301F044459F615621A1EA79A628DB60
                                                      APIs
                                                      • GetParent.USER32 ref: 007F20AB
                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 007F20C0
                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007F214D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameParentSend
                                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                      • API String ID: 1290815626-3381328864
                                                      • Opcode ID: f80b7d1c9f8b57ddb88c79c676a3339505c3d5b436da6f9f3d278b37fb564084
                                                      • Instruction ID: 99ae6d631c0a8d8130bf7fc1e47456e69b79a7c63604d635b646f2edd95c55d2
                                                      • Opcode Fuzzy Hash: f80b7d1c9f8b57ddb88c79c676a3339505c3d5b436da6f9f3d278b37fb564084
                                                      • Instruction Fuzzy Hash: 3511277628870EF9FA1122209C1BDFA739CEB15325B204116FB04E42D3FB6DA80B5619
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                      • String ID:
                                                      • API String ID: 1282221369-0
                                                      • Opcode ID: fef6a1912a7710a76027c812467c61ac67e224e84cd468cd90e34e8935af9b50
                                                      • Instruction ID: 266c582803aee034355baa6673a9c45b1070f8b47a03223ab81298e88d6b3f4d
                                                      • Opcode Fuzzy Hash: fef6a1912a7710a76027c812467c61ac67e224e84cd468cd90e34e8935af9b50
                                                      • Instruction Fuzzy Hash: A2613772904300AFDB32AFB49889F6E7BA5AF05320F05426DF948EB282D77D9D419B50
                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 007E6890
                                                      • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 007E68A9
                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 007E68B9
                                                      • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 007E68D1
                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 007E68F2
                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,007A8874,00000000,00000000,00000000,000000FF,00000000), ref: 007E6901
                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 007E691E
                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,007A8874,00000000,00000000,00000000,000000FF,00000000), ref: 007E692D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                      • String ID:
                                                      • API String ID: 1268354404-0
                                                      • Opcode ID: feb1cca37e6e1c8e07c6d99f66a039d95ae5278364bab052d041d65730c28368
                                                      • Instruction ID: 16b69450878d25d38401803ad697587a28fc53753c62a18df9a2ee40c218bc7e
                                                      • Opcode Fuzzy Hash: feb1cca37e6e1c8e07c6d99f66a039d95ae5278364bab052d041d65730c28368
                                                      • Instruction Fuzzy Hash: 39519BB0600209EFDB20DF25CC55FAA7BB5FF99350F144628F912972A0DB78E991DB60
                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0080C182
                                                      • GetLastError.KERNEL32 ref: 0080C195
                                                      • SetEvent.KERNEL32(?), ref: 0080C1A9
                                                        • Part of subcall function 0080C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0080C272
                                                        • Part of subcall function 0080C253: GetLastError.KERNEL32 ref: 0080C322
                                                        • Part of subcall function 0080C253: SetEvent.KERNEL32(?), ref: 0080C336
                                                        • Part of subcall function 0080C253: InternetCloseHandle.WININET(00000000), ref: 0080C341
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                      • String ID:
                                                      • API String ID: 337547030-0
                                                      • Opcode ID: d0cb87f71462cc190df42e5e463a20b9db291e258d2dbf0beb995b526b78bf7f
                                                      • Instruction ID: ebfd3c5318661e6732b9dafc32c1dc5594ca3e62f75a853880169b401c746b2f
                                                      • Opcode Fuzzy Hash: d0cb87f71462cc190df42e5e463a20b9db291e258d2dbf0beb995b526b78bf7f
                                                      • Instruction Fuzzy Hash: 36318C71600605EFDB619FA9DD44A7ABBF8FF18300B00862DF956C2A50DB30E815ABA0
                                                      APIs
                                                        • Part of subcall function 007F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F3A57
                                                        • Part of subcall function 007F3A3D: GetCurrentThreadId.KERNEL32 ref: 007F3A5E
                                                        • Part of subcall function 007F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007F25B3), ref: 007F3A65
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F25BD
                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 007F25DB
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 007F25DF
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F25E9
                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 007F2601
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 007F2605
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 007F260F
                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 007F2623
                                                      • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 007F2627
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                      • String ID:
                                                      • API String ID: 2014098862-0
                                                      • Opcode ID: 2bf97a32e73006a19948ea23071913f27b3390e42c489c87d4c24fcbee5e70c5
                                                      • Instruction ID: f7151d5acb5518bbdcce7d7355b956f3f5734868186b24684cea78f87c12d92d
                                                      • Opcode Fuzzy Hash: 2bf97a32e73006a19948ea23071913f27b3390e42c489c87d4c24fcbee5e70c5
                                                      • Instruction Fuzzy Hash: 3D01D430390614BBFB2067699C8EF693F59EF5EB12F104005F328AF1D1C9E624569A69
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,007F1449,?,?,00000000), ref: 007F180C
                                                      • HeapAlloc.KERNEL32(00000000,?,007F1449,?,?,00000000), ref: 007F1813
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007F1449,?,?,00000000), ref: 007F1828
                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,007F1449,?,?,00000000), ref: 007F1830
                                                      • DuplicateHandle.KERNEL32(00000000,?,007F1449,?,?,00000000), ref: 007F1833
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007F1449,?,?,00000000), ref: 007F1843
                                                      • GetCurrentProcess.KERNEL32(007F1449,00000000,?,007F1449,?,?,00000000), ref: 007F184B
                                                      • DuplicateHandle.KERNEL32(00000000,?,007F1449,?,?,00000000), ref: 007F184E
                                                      • CreateThread.KERNEL32(00000000,00000000,007F1874,00000000,00000000,00000000), ref: 007F1868
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                      • String ID:
                                                      • API String ID: 1957940570-0
                                                      • Opcode ID: 68858aea46da432531036967a1b54308dcf8e07730e78119cd97fe4ff8522fc6
                                                      • Instruction ID: d4ab47c54f488b40fab98aca3d919ea45f5035fe5ecd010d15a8f49f791ca61c
                                                      • Opcode Fuzzy Hash: 68858aea46da432531036967a1b54308dcf8e07730e78119cd97fe4ff8522fc6
                                                      • Instruction Fuzzy Hash: 3D01BFB5640308BFE720AB65DC4EF6B7B6CFB89B11F508411FA05DB291C6749815CB60
                                                      APIs
                                                        • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007FC6EE
                                                      • _wcslen.LIBCMT ref: 007FC735
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007FC79C
                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 007FC7CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info_wcslen$Default
                                                      • String ID: 0$pT$pT
                                                      • API String ID: 1227352736-2746175099
                                                      • Opcode ID: ed9d09e5c411bdc484575c2e661e6bb26d977d7b06178ba5f8a0eda4b305413e
                                                      • Instruction ID: 50506a40b95b7df4cb851818b8b67cf1cbacf5c1f22a33f76dde02e9e4c0d7da
                                                      • Opcode Fuzzy Hash: ed9d09e5c411bdc484575c2e661e6bb26d977d7b06178ba5f8a0eda4b305413e
                                                      • Instruction Fuzzy Hash: D351D47160830C9BD716AF28CA49B7B77E8AF85314F040A29F695D3391DB78D904DB62
                                                      APIs
                                                        • Part of subcall function 007FD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 007FD501
                                                        • Part of subcall function 007FD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 007FD50F
                                                        • Part of subcall function 007FD4DC: CloseHandle.KERNEL32(00000000), ref: 007FD5DC
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0081A16D
                                                      • GetLastError.KERNEL32 ref: 0081A180
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0081A1B3
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 0081A268
                                                      • GetLastError.KERNEL32(00000000), ref: 0081A273
                                                      • CloseHandle.KERNEL32(00000000), ref: 0081A2C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 2533919879-2896544425
                                                      • Opcode ID: 9a7cedd2ecb46f5d4a93a24ac027d6ee21d8b8305c5f0796045a4237c84bd1de
                                                      • Instruction ID: fdcdf18c1bf07b151a143ab81d14be52c000c8b18f43745de059449e82d138d3
                                                      • Opcode Fuzzy Hash: 9a7cedd2ecb46f5d4a93a24ac027d6ee21d8b8305c5f0796045a4237c84bd1de
                                                      • Instruction Fuzzy Hash: AD619C31205242AFD724DF14C498F69BBA5FF44318F58848CE46A8B7A2C776EC85CB82
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00823925
                                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0082393A
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00823954
                                                      • _wcslen.LIBCMT ref: 00823999
                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 008239C6
                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 008239F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window_wcslen
                                                      • String ID: SysListView32
                                                      • API String ID: 2147712094-78025650
                                                      • Opcode ID: 41edcac9abafdef83806e3ac9465ecf20239d464cf69ee7df7fc5559aaeb8d22
                                                      • Instruction ID: 23bb535010783b24bc0a04d1c81f8dbc7abbe18cb3ae4f21722c9fc431446de9
                                                      • Opcode Fuzzy Hash: 41edcac9abafdef83806e3ac9465ecf20239d464cf69ee7df7fc5559aaeb8d22
                                                      • Instruction Fuzzy Hash: 4B41A371A00229ABEF219F64DC49FEE7BA9FF08350F100526F958E7281D7759AC4CB90
                                                      APIs
                                                      • _ValidateLocalCookies.LIBCMT ref: 007B2D4B
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 007B2D53
                                                      • _ValidateLocalCookies.LIBCMT ref: 007B2DE1
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 007B2E0C
                                                      • _ValidateLocalCookies.LIBCMT ref: 007B2E61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: &H{$csm
                                                      • API String ID: 1170836740-2200307801
                                                      • Opcode ID: 226c42a77186194b240b98f728613f119761b2e68c0326a0ce68f8b77bbc7a77
                                                      • Instruction ID: 10ee86cc80fe3a6c91d5c4c75b8784c8484793eb6b2baed0c005912a8164e85c
                                                      • Opcode Fuzzy Hash: 226c42a77186194b240b98f728613f119761b2e68c0326a0ce68f8b77bbc7a77
                                                      • Instruction Fuzzy Hash: 83418034A01209EBCF10DF68C849BDEBBB5FF44364F148155E814AB393D739AA46CBA1
                                                      APIs
                                                      • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,007EF3AB,00000000,?,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 0082824C
                                                      • EnableWindow.USER32(00000000,00000000), ref: 00828272
                                                      • ShowWindow.USER32(FFFFFFFF,00000000), ref: 008282D1
                                                      • ShowWindow.USER32(00000000,00000004), ref: 008282E5
                                                      • EnableWindow.USER32(00000000,00000001), ref: 0082830B
                                                      • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0082832F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$Enable$MessageSend
                                                      • String ID: hW
                                                      • API String ID: 642888154-1300829777
                                                      • Opcode ID: d2202f2b58919ea7a6db4c943c7e74bd0551a7dc32883469a3e094e80e6eb17f
                                                      • Instruction ID: 5e87c4c5b7a2f2d3e3f927d16af45bc2dd0d1ba523eccbf44561ca9840c2387f
                                                      • Opcode Fuzzy Hash: d2202f2b58919ea7a6db4c943c7e74bd0551a7dc32883469a3e094e80e6eb17f
                                                      • Instruction Fuzzy Hash: 8141A534602654EFDF21CF25E899BE47BE1FB0A714F195169E5088B263CB71A881CF51
                                                      APIs
                                                      • LoadIconW.USER32(00000000,00007F03), ref: 007FC913
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: IconLoad
                                                      • String ID: blank$info$question$stop$warning
                                                      • API String ID: 2457776203-404129466
                                                      • Opcode ID: 887714a83c0330c24591b2f86ebeab0ca94bac068d637cd341325b6c50962d7a
                                                      • Instruction ID: 0808bdb201ecc9c2968723ccf2a05b8cf653d43e08f15178d07b20ac7dc1f569
                                                      • Opcode Fuzzy Hash: 887714a83c0330c24591b2f86ebeab0ca94bac068d637cd341325b6c50962d7a
                                                      • Instruction Fuzzy Hash: B5112B3168930EBEEB02DB54DD82DFE679CDF15365B50402AFA00E7382E7ADAE045264
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                      • String ID: 0.0.0.0
                                                      • API String ID: 642191829-3771769585
                                                      • Opcode ID: ca8bdd7c4d336a9c242574bacbd5028bf573948a31ddada9e21e94bca02ce58b
                                                      • Instruction ID: 7909ba87be17401f673832e7e25d287a91fa14149006453f36c95f47ea416e6a
                                                      • Opcode Fuzzy Hash: ca8bdd7c4d336a9c242574bacbd5028bf573948a31ddada9e21e94bca02ce58b
                                                      • Instruction Fuzzy Hash: B6110371904118EFCB30BB649C0EEFE77ADEF11711F0101B9F645AA291EF799E818A61
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$LocalTime
                                                      • String ID:
                                                      • API String ID: 952045576-0
                                                      • Opcode ID: a220e3450d141373a7d4a9668078fcb6540863b26c8c4f8b50b21b6db6d55ddd
                                                      • Instruction ID: f7890f16ccd1d9ccb1d71fd94305063ef367c7cb508c6a143653569089bb1668
                                                      • Opcode Fuzzy Hash: a220e3450d141373a7d4a9668078fcb6540863b26c8c4f8b50b21b6db6d55ddd
                                                      • Instruction Fuzzy Hash: 3A419666C10118B6DB11EBF48C8EADF77A8BF45710F508462E614E3222FB3CE655C3A6
                                                      APIs
                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 007AF953
                                                      • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 007EF3D1
                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,007E682C,00000004,00000000,00000000), ref: 007EF454
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: b5a02ca66d403662c43017161f16ba5fcf9498f3793ad8e75c4cf63b996917dd
                                                      • Instruction ID: 79fabeb420d3ab25be2e172200e209e9d1d5923addbccca41299d934c428077e
                                                      • Opcode Fuzzy Hash: b5a02ca66d403662c43017161f16ba5fcf9498f3793ad8e75c4cf63b996917dd
                                                      • Instruction Fuzzy Hash: 0A4118302056C0BEC7759B6D888877B7B91BBDB310F14863DE047D2961C63DB880CB52
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 00822D1B
                                                      • GetDC.USER32(00000000), ref: 00822D23
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00822D2E
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00822D3A
                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00822D76
                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00822D87
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00825A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00822DC2
                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00822DE1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                      • String ID:
                                                      • API String ID: 3864802216-0
                                                      • Opcode ID: 62b9972dd610a14a0bce79d0d3d9fe1558a66f9f8ca3a88b6366d74124b3f6a0
                                                      • Instruction ID: e5fd1b6ad4c927401ddb825d7c2f80c6674c2833901521195b80af444e0c420c
                                                      • Opcode Fuzzy Hash: 62b9972dd610a14a0bce79d0d3d9fe1558a66f9f8ca3a88b6366d74124b3f6a0
                                                      • Instruction Fuzzy Hash: 94318972201624BFEB218F549C8AFFB3BA9FF09711F048055FE08DA291C6759C91CBA4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID:
                                                      • API String ID: 2931989736-0
                                                      • Opcode ID: 7fe6feba54d9d25956e7c247d66ab44b9d8b5cd5f1507338d8ccb2c4b15a8967
                                                      • Instruction ID: 51e36369dc2713af9fb3685b3a065b9f307f28a7522798059d1b095b2d5a1340
                                                      • Opcode Fuzzy Hash: 7fe6feba54d9d25956e7c247d66ab44b9d8b5cd5f1507338d8ccb2c4b15a8967
                                                      • Instruction Fuzzy Hash: 0E218361644A2DB7D6146620DD96FFA23ACAF20794B840030FF25DB782F72CED10C6A5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: NULL Pointer assignment$Not an Object type
                                                      • API String ID: 0-572801152
                                                      • Opcode ID: 639542ba063a22b571c5772b384683ad17e7349a2ca9c58b03b4af7a5ab5952e
                                                      • Instruction ID: 7d70ecfbfb8ff03bc739c056bbcadbb10e58ae468660f78b73dbf1d8b0d7b4d3
                                                      • Opcode Fuzzy Hash: 639542ba063a22b571c5772b384683ad17e7349a2ca9c58b03b4af7a5ab5952e
                                                      • Instruction Fuzzy Hash: C2D17D71A0060AEFDB10CF98D881BEEB7B9FF88344F148569E915EB281D7709985CB90
                                                      APIs
                                                      • GetCPInfo.KERNEL32(?,?), ref: 007D15CE
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 007D1651
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007D16E4
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 007D16FB
                                                        • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007D1777
                                                      • __freea.LIBCMT ref: 007D17A2
                                                      • __freea.LIBCMT ref: 007D17AE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                      • String ID:
                                                      • API String ID: 2829977744-0
                                                      • Opcode ID: 4f11efc3a6210d5c9e0974393d4507f77bc912e4bf5c2a7335906ec9be9a15f2
                                                      • Instruction ID: 2dccec73f3ce1f8873bcbd4af898703067f4846658a0f852493238a4b69bbe76
                                                      • Opcode Fuzzy Hash: 4f11efc3a6210d5c9e0974393d4507f77bc912e4bf5c2a7335906ec9be9a15f2
                                                      • Instruction Fuzzy Hash: 2B91C471E00216BADB208E74DD85EEE7BB5AF49310F98466AE806E7351DB3DDD40CB60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit
                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                      • API String ID: 2610073882-625585964
                                                      • Opcode ID: 51c1fc6beb462196e39da0db94c27fc8c7732a5a24159ec89ab4cb3eb02e62bd
                                                      • Instruction ID: 56beea37f6ae5cc035f9330a7d19d8d0b45a6e5f4e6412a1703bbfebc4ff6430
                                                      • Opcode Fuzzy Hash: 51c1fc6beb462196e39da0db94c27fc8c7732a5a24159ec89ab4cb3eb02e62bd
                                                      • Instruction Fuzzy Hash: 6C916B71A00219ABDF20CFA4D888FEEBBB8FF46715F108559F515EB281D7709985CBA0
                                                      APIs
                                                      • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0080125C
                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00801284
                                                      • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 008012A8
                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008012D8
                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0080135F
                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008013C4
                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00801430
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                      • String ID:
                                                      • API String ID: 2550207440-0
                                                      • Opcode ID: 08207785d5e61cc113752d454ea36b4400b03ae45bf442a34431ae499ae106f3
                                                      • Instruction ID: db8606b86ef554a769281e293c475b582d351fba0cb9a843b06e18396a55793f
                                                      • Opcode Fuzzy Hash: 08207785d5e61cc113752d454ea36b4400b03ae45bf442a34431ae499ae106f3
                                                      • Instruction Fuzzy Hash: CD91BE71A002099FEF50DFA8C889BBEB7B5FF45325F114029E901EB2A1D778A941CB95
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$BeginCreatePath
                                                      • String ID:
                                                      • API String ID: 3225163088-0
                                                      • Opcode ID: 69d4b2e7ab9bc225a00ab4a3cff495542c46a46829741c44af502276886ce520
                                                      • Instruction ID: 2d7cfe500ab3b1cf07ba2ef0be7d2629edc294f9ec5cc73aa90d8b7d2a46ff33
                                                      • Opcode Fuzzy Hash: 69d4b2e7ab9bc225a00ab4a3cff495542c46a46829741c44af502276886ce520
                                                      • Instruction Fuzzy Hash: 63915C71D00219EFCB14CFA9CC89AEEBBB9FF89320F148155E515B7291D378A952CB60
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 0081396B
                                                      • CharUpperBuffW.USER32(?,?), ref: 00813A7A
                                                      • _wcslen.LIBCMT ref: 00813A8A
                                                      • VariantClear.OLEAUT32(?), ref: 00813C1F
                                                        • Part of subcall function 00800CDF: VariantInit.OLEAUT32(00000000), ref: 00800D1F
                                                        • Part of subcall function 00800CDF: VariantCopy.OLEAUT32(?,?), ref: 00800D28
                                                        • Part of subcall function 00800CDF: VariantClear.OLEAUT32(?), ref: 00800D34
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                      • API String ID: 4137639002-1221869570
                                                      • Opcode ID: 432b9f8b9334b4f4f4763fe923f87e91aeed3afa00942c59c4165482c97a0e4a
                                                      • Instruction ID: 401a5adb51fdd2c4a1149b1ed8ea353244a065a172040d69715a4dccf6d70a46
                                                      • Opcode Fuzzy Hash: 432b9f8b9334b4f4f4763fe923f87e91aeed3afa00942c59c4165482c97a0e4a
                                                      • Instruction Fuzzy Hash: 359125746083059FCB14DF28C4849AAB7E8FF89314F14892DF98A97351DB35EE45CB92
                                                      APIs
                                                        • Part of subcall function 007F000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?,?,007F035E), ref: 007F002B
                                                        • Part of subcall function 007F000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0046
                                                        • Part of subcall function 007F000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0054
                                                        • Part of subcall function 007F000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?), ref: 007F0064
                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00814C51
                                                      • _wcslen.LIBCMT ref: 00814D59
                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00814DCF
                                                      • CoTaskMemFree.OLE32(?), ref: 00814DDA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                      • String ID: NULL Pointer assignment
                                                      • API String ID: 614568839-2785691316
                                                      • Opcode ID: 44fb73bd6bba7cfc892b594a4fdd273f5494a77ad29ed5f4907505d4c89b54c1
                                                      • Instruction ID: de94dbc14a94ef1d39909dad09c0addc42f84f0a11bbd990458313b58157ce1b
                                                      • Opcode Fuzzy Hash: 44fb73bd6bba7cfc892b594a4fdd273f5494a77ad29ed5f4907505d4c89b54c1
                                                      • Instruction Fuzzy Hash: AD910371D0021DEBDF10DFA4D895AEEB7B9FF08314F10816AE915A7251EB349A85CFA0
                                                      APIs
                                                      • GetMenu.USER32(?), ref: 00822183
                                                      • GetMenuItemCount.USER32(00000000), ref: 008221B5
                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 008221DD
                                                      • _wcslen.LIBCMT ref: 00822213
                                                      • GetMenuItemID.USER32(?,?), ref: 0082224D
                                                      • GetSubMenu.USER32(?,?), ref: 0082225B
                                                        • Part of subcall function 007F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F3A57
                                                        • Part of subcall function 007F3A3D: GetCurrentThreadId.KERNEL32 ref: 007F3A5E
                                                        • Part of subcall function 007F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007F25B3), ref: 007F3A65
                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008222E3
                                                        • Part of subcall function 007FE97B: Sleep.KERNEL32 ref: 007FE9F3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                      • String ID:
                                                      • API String ID: 4196846111-0
                                                      • Opcode ID: c47289cf4047d3b39a1b2a95289709ff2a7be56b7280c79dcfebcb0eb5ad8ade
                                                      • Instruction ID: d356f280fb81a098947be9491bf37d915e09b258b4bcda82b717fe4f0ec7fef9
                                                      • Opcode Fuzzy Hash: c47289cf4047d3b39a1b2a95289709ff2a7be56b7280c79dcfebcb0eb5ad8ade
                                                      • Instruction Fuzzy Hash: 13719075A00225EFCB14EFA4D845AAEB7F1FF48310F148459E916EB351DB39ED818B90
                                                      APIs
                                                      • GetParent.USER32(?), ref: 007FAEF9
                                                      • GetKeyboardState.USER32(?), ref: 007FAF0E
                                                      • SetKeyboardState.USER32(?), ref: 007FAF6F
                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 007FAF9D
                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 007FAFBC
                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 007FAFFD
                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007FB020
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: fb4fe666cb74b69cc9258be15657cc70c8cb86fc910df6583fe8eb5ef369b4af
                                                      • Instruction ID: a2b10dd5fd5f0a415b313de8a362f2f983dac8ee6b909827b7a05adab7fbcb51
                                                      • Opcode Fuzzy Hash: fb4fe666cb74b69cc9258be15657cc70c8cb86fc910df6583fe8eb5ef369b4af
                                                      • Instruction Fuzzy Hash: 6A51B3E06047D93DFB364234CC49BBA7EE96B06304F088589E2D9599C2D79CECC8D762
                                                      APIs
                                                      • GetParent.USER32(00000000), ref: 007FAD19
                                                      • GetKeyboardState.USER32(?), ref: 007FAD2E
                                                      • SetKeyboardState.USER32(?), ref: 007FAD8F
                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 007FADBB
                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 007FADD8
                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007FAE17
                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007FAE38
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: 2eb4106086e7145ed7c51f8cdc46238dee8cc9f31d573d439ad1980f3726093a
                                                      • Instruction ID: 22896e2e06a5dae8e08dd6ca832b2710f53663930ce614f450da24a1edf1005b
                                                      • Opcode Fuzzy Hash: 2eb4106086e7145ed7c51f8cdc46238dee8cc9f31d573d439ad1980f3726093a
                                                      • Instruction Fuzzy Hash: 4D51C6E16447D93DFB368334CC56B7A7EA96B45300F088589E2DD46AC2D29CEC88D752
                                                      APIs
                                                      • GetConsoleCP.KERNEL32(007D3CD6,?,?,?,?,?,?,?,?,007C5BA3,?,?,007D3CD6,?,?), ref: 007C5470
                                                      • __fassign.LIBCMT ref: 007C54EB
                                                      • __fassign.LIBCMT ref: 007C5506
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,007D3CD6,00000005,00000000,00000000), ref: 007C552C
                                                      • WriteFile.KERNEL32(?,007D3CD6,00000000,007C5BA3,00000000,?,?,?,?,?,?,?,?,?,007C5BA3,?), ref: 007C554B
                                                      • WriteFile.KERNEL32(?,?,00000001,007C5BA3,00000000,?,?,?,?,?,?,?,?,?,007C5BA3,?), ref: 007C5584
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                      • String ID:
                                                      • API String ID: 1324828854-0
                                                      • Opcode ID: d8eb01ef839cd82abf24ef2fb93394cdc15c5272b7dd2c4389ba952d732a1d24
                                                      • Instruction ID: ce7abcf679380bb1ff7c4e7beb2ea50ba0f699977127a0bd926a9c9f71553c88
                                                      • Opcode Fuzzy Hash: d8eb01ef839cd82abf24ef2fb93394cdc15c5272b7dd2c4389ba952d732a1d24
                                                      • Instruction Fuzzy Hash: 7751B570A006499FDB10CFA8E845FEEBBF5FF08300F14451EE555E7291E675AA91CB60
                                                      APIs
                                                      • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00826C33
                                                      • SetWindowLongW.USER32(?,000000EC,?), ref: 00826C4A
                                                      • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00826C73
                                                      • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0080AB79,00000000,00000000), ref: 00826C98
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00826CC7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$MessageSendShow
                                                      • String ID: hW
                                                      • API String ID: 3688381893-1300829777
                                                      • Opcode ID: 7ccbfa097336b8152a9c2ecee0ceb979121e77d98bf3d5220596e71f8aadb72e
                                                      • Instruction ID: 2cf9ad673e5114b4f9ac8947e378deb605d71bb8fd8ae1b0804950d002100811
                                                      • Opcode Fuzzy Hash: 7ccbfa097336b8152a9c2ecee0ceb979121e77d98bf3d5220596e71f8aadb72e
                                                      • Instruction Fuzzy Hash: 5941E735604124AFDB24EF28DC59FB97BA5FB09360F150268F895E72E0E371EDA1CA40
                                                      APIs
                                                        • Part of subcall function 0081304E: inet_addr.WSOCK32(?), ref: 0081307A
                                                        • Part of subcall function 0081304E: _wcslen.LIBCMT ref: 0081309B
                                                      • socket.WSOCK32(00000002,00000001,00000006), ref: 00811112
                                                      • WSAGetLastError.WSOCK32 ref: 00811121
                                                      • WSAGetLastError.WSOCK32 ref: 008111C9
                                                      • closesocket.WSOCK32(00000000), ref: 008111F9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 2675159561-0
                                                      • Opcode ID: 370815cf12d1eb227a428922b2c5482768638c3d7cce703354b20f964a1a0118
                                                      • Instruction ID: 0d4c5c413c992dcdd211c954c4d8c661951a047ea8d36d8c011ba90dbfc04c96
                                                      • Opcode Fuzzy Hash: 370815cf12d1eb227a428922b2c5482768638c3d7cce703354b20f964a1a0118
                                                      • Instruction Fuzzy Hash: 8141C232600604AFDF209F14D888BE9B7EAFF45324F148059FA19DB291D774AD81CBA1
                                                      APIs
                                                        • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007FCF22,?), ref: 007FDDFD
                                                        • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007FCF22,?), ref: 007FDE16
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 007FCF45
                                                      • MoveFileW.KERNEL32(?,?), ref: 007FCF7F
                                                      • _wcslen.LIBCMT ref: 007FD005
                                                      • _wcslen.LIBCMT ref: 007FD01B
                                                      • SHFileOperationW.SHELL32(?), ref: 007FD061
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                      • String ID: \*.*
                                                      • API String ID: 3164238972-1173974218
                                                      • Opcode ID: 18ff5a959e97dc946dc3066137453ed9b831f9e90ec10f625c3f6c65b5477d1a
                                                      • Instruction ID: cbcb0eea186e80ee8bd963fcb5bc5fc14f27bc56d4cc9f9690cf816a44f72bf1
                                                      • Opcode Fuzzy Hash: 18ff5a959e97dc946dc3066137453ed9b831f9e90ec10f625c3f6c65b5477d1a
                                                      • Instruction Fuzzy Hash: BB41587290511D9FDF22EBA4DA85AEDB7F9AF08340F0000E6E605E7251EB38AB44CB50
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00823E35
                                                      • IsMenu.USER32(?), ref: 00823E4A
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00823E92
                                                      • DrawMenuBar.USER32 ref: 00823EA5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$DrawInfoInsert
                                                      • String ID: 0$hW
                                                      • API String ID: 3076010158-580508736
                                                      • Opcode ID: 3750fb7753cbf24dc8b47739bd43ff2b6c31981672f12b0bdf8e4fc2e055a437
                                                      • Instruction ID: d55c8d1a47b00fd2991afd5e3b6711c16ad500ba22725e49c2c386ca9c3943bb
                                                      • Opcode Fuzzy Hash: 3750fb7753cbf24dc8b47739bd43ff2b6c31981672f12b0bdf8e4fc2e055a437
                                                      • Instruction Fuzzy Hash: 50416A79A01219EFDB10DF50E894AAABBB5FF48354F054029E905E7250D734EE89CF91
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F7769
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F778F
                                                      • SysAllocString.OLEAUT32(00000000), ref: 007F7792
                                                      • SysAllocString.OLEAUT32(?), ref: 007F77B0
                                                      • SysFreeString.OLEAUT32(?), ref: 007F77B9
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 007F77DE
                                                      • SysAllocString.OLEAUT32(?), ref: 007F77EC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: fb97999ceb67c1fd68d0d699d881591dc713b35826c9b473dc4037619a8522fa
                                                      • Instruction ID: 717aa6b4758dc47816e0bde3a5014d967cbd5b21ad849fc440dc92bac19d6467
                                                      • Opcode Fuzzy Hash: fb97999ceb67c1fd68d0d699d881591dc713b35826c9b473dc4037619a8522fa
                                                      • Instruction Fuzzy Hash: 0C219F76608219AFDB14AFA8CC88CBB73ACEB093647108125FA14DB250D6749C42CBB4
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F7842
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F7868
                                                      • SysAllocString.OLEAUT32(00000000), ref: 007F786B
                                                      • SysAllocString.OLEAUT32 ref: 007F788C
                                                      • SysFreeString.OLEAUT32 ref: 007F7895
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 007F78AF
                                                      • SysAllocString.OLEAUT32(?), ref: 007F78BD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: 83751abb3e8b787c39df6fd2c97e84bebfae8676315ef6a456145630edd5f14f
                                                      • Instruction ID: f4ef0beedc89d0381ac28df7526c0f2ea4c72f03180dfc70cb26f7eef92e0a8c
                                                      • Opcode Fuzzy Hash: 83751abb3e8b787c39df6fd2c97e84bebfae8676315ef6a456145630edd5f14f
                                                      • Instruction Fuzzy Hash: 64214435608208AFDB24AFA8DC8DDBB77ECFB097A07108125FA15CB2A5D674DC41CB64
                                                      APIs
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 008004F2
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0080052E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CreateHandlePipe
                                                      • String ID: nul
                                                      • API String ID: 1424370930-2873401336
                                                      • Opcode ID: 59d59c6a2de66e8deadec30f32e06baa85d42f2867ff3e3010e53988ba9b9d32
                                                      • Instruction ID: 822da73937458c85b1a993f184173eaa727ad39ed4b29553c4ca976d01b0e553
                                                      • Opcode Fuzzy Hash: 59d59c6a2de66e8deadec30f32e06baa85d42f2867ff3e3010e53988ba9b9d32
                                                      • Instruction Fuzzy Hash: 88215A75600305ABDB609F69DC45BAA7BB4FF45724F204A29E8A1E62E0E7709951CF20
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 008005C6
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00800601
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CreateHandlePipe
                                                      • String ID: nul
                                                      • API String ID: 1424370930-2873401336
                                                      • Opcode ID: addfef7413aee4de2c72deb58ffa638803f469ee44e85b5a885b13c8aed46201
                                                      • Instruction ID: 609f71f3d9ca4815badfc1e51034c45aa62a51e1eaa7bfd31731744afa6a7794
                                                      • Opcode Fuzzy Hash: addfef7413aee4de2c72deb58ffa638803f469ee44e85b5a885b13c8aed46201
                                                      • Instruction Fuzzy Hash: E921A1756003059BDB608F68DC04BAA77E5FFA5724F204A19F8B1E72E0DB719961CF10
                                                      APIs
                                                        • Part of subcall function 0079600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0079604C
                                                        • Part of subcall function 0079600E: GetStockObject.GDI32(00000011), ref: 00796060
                                                        • Part of subcall function 0079600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0079606A
                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00824112
                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0082411F
                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0082412A
                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00824139
                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00824145
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                      • String ID: Msctls_Progress32
                                                      • API String ID: 1025951953-3636473452
                                                      • Opcode ID: 47e84f63eea42eebe3be96050314ba8291df1719a340de235d7433338dd28f80
                                                      • Instruction ID: 4abee027fd11f3781687de7256c1a8bc2cd809db517b11a7d03992e9491aa70f
                                                      • Opcode Fuzzy Hash: 47e84f63eea42eebe3be96050314ba8291df1719a340de235d7433338dd28f80
                                                      • Instruction Fuzzy Hash: 041181B1140229BEEF119F64DC85EE77F5DFF08798F015111BA18E2190C6769C619BA4
                                                      APIs
                                                        • Part of subcall function 007CD7A3: _free.LIBCMT ref: 007CD7CC
                                                      • _free.LIBCMT ref: 007CD82D
                                                        • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                        • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                      • _free.LIBCMT ref: 007CD838
                                                      • _free.LIBCMT ref: 007CD843
                                                      • _free.LIBCMT ref: 007CD897
                                                      • _free.LIBCMT ref: 007CD8A2
                                                      • _free.LIBCMT ref: 007CD8AD
                                                      • _free.LIBCMT ref: 007CD8B8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                      • Instruction ID: 27ade6682f56a3dd946bb67917d9acd128a599c5e94e803a55c9147544ec4270
                                                      • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                      • Instruction Fuzzy Hash: B911EF71541B04EAD531BFB0CC4BFCB7BDCAF05700F40582DB29DA69A3DA79B9064A50
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 007FDA74
                                                      • LoadStringW.USER32(00000000), ref: 007FDA7B
                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 007FDA91
                                                      • LoadStringW.USER32(00000000), ref: 007FDA98
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007FDADC
                                                      Strings
                                                      • %s (%d) : ==> %s: %s %s, xrefs: 007FDAB9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message
                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                      • API String ID: 4072794657-3128320259
                                                      • Opcode ID: c8a1a875cd8e4344852048215a487d21e81484e8bf70402be1061810a1129270
                                                      • Instruction ID: 09145f1666e4ff52fabc4d5f787d1c9c41a17af18675665631494d8b41eafa5b
                                                      • Opcode Fuzzy Hash: c8a1a875cd8e4344852048215a487d21e81484e8bf70402be1061810a1129270
                                                      • Instruction Fuzzy Hash: 8B0186F25002087FE7209BE49D89EFB376CFB08301F408496B706E2141E6749E854F74
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(00E3F238,00E3F238), ref: 0080097B
                                                      • EnterCriticalSection.KERNEL32(00E3F218,00000000), ref: 0080098D
                                                      • TerminateThread.KERNEL32(006F0074,000001F6), ref: 0080099B
                                                      • WaitForSingleObject.KERNEL32(006F0074,000003E8), ref: 008009A9
                                                      • CloseHandle.KERNEL32(006F0074), ref: 008009B8
                                                      • InterlockedExchange.KERNEL32(00E3F238,000001F6), ref: 008009C8
                                                      • LeaveCriticalSection.KERNEL32(00E3F218), ref: 008009CF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                      • String ID:
                                                      • API String ID: 3495660284-0
                                                      • Opcode ID: e91cfd06ee4293593d91d5707d25552810adc50584793d7e02b60552e7653f87
                                                      • Instruction ID: 948e5d440d442a21f8ec465ba67b54c7473afdbcfa36dc50159296c50eb9ac91
                                                      • Opcode Fuzzy Hash: e91cfd06ee4293593d91d5707d25552810adc50584793d7e02b60552e7653f87
                                                      • Instruction Fuzzy Hash: 58F0F431442912FBD7615F94EE8DBEABB35FF05702F505015F101908A5CB759476CF90
                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 00795D30
                                                      • GetWindowRect.USER32(?,?), ref: 00795D71
                                                      • ScreenToClient.USER32(?,?), ref: 00795D99
                                                      • GetClientRect.USER32(?,?), ref: 00795ED7
                                                      • GetWindowRect.USER32(?,?), ref: 00795EF8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Rect$Client$Window$Screen
                                                      • String ID:
                                                      • API String ID: 1296646539-0
                                                      • Opcode ID: e892cb29b7b4d285fdfd1fda8813fec93bf914bcbaa156f24cd5e77c5387f757
                                                      • Instruction ID: 6bca5b95474fbc1ff7e2b3f0d328da4fd5e090b43607974ec2882f59e2d838c6
                                                      • Opcode Fuzzy Hash: e892cb29b7b4d285fdfd1fda8813fec93bf914bcbaa156f24cd5e77c5387f757
                                                      • Instruction Fuzzy Hash: 73B16734A00A4ADBDF10CFA9D4807EEB7F1FF58310F14851AE8AAD7250DB38AA51DB50
                                                      APIs
                                                      • __allrem.LIBCMT ref: 007C00BA
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C00D6
                                                      • __allrem.LIBCMT ref: 007C00ED
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C010B
                                                      • __allrem.LIBCMT ref: 007C0122
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007C0140
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                      • String ID:
                                                      • API String ID: 1992179935-0
                                                      • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                      • Instruction ID: f7c80e27aa41f24a0e7fb6099b29083bb8eeb1f2f7780539d4561e17fa67407c
                                                      • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                      • Instruction Fuzzy Hash: 3E81D376A00B06EFE7209E68CC46FAEB3A9EF41724F24453EF551D6681E778D94087D0
                                                      APIs
                                                        • Part of subcall function 00813149: select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00813195
                                                      • __WSAFDIsSet.WSOCK32(00000000,?), ref: 00811DC0
                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00811DE1
                                                      • WSAGetLastError.WSOCK32 ref: 00811DF2
                                                      • inet_ntoa.WSOCK32(?), ref: 00811E8C
                                                      • htons.WSOCK32(?), ref: 00811EDB
                                                      • _strlen.LIBCMT ref: 00811F35
                                                        • Part of subcall function 007F39E8: _strlen.LIBCMT ref: 007F39F2
                                                        • Part of subcall function 00796D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,007ACF58,?,?,?), ref: 00796DBA
                                                        • Part of subcall function 00796D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,007ACF58,?,?,?), ref: 00796DED
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                      • String ID:
                                                      • API String ID: 1923757996-0
                                                      • Opcode ID: ff2cea7383e1609898573f3ebf11834042381601f7eb54ba972a248a9c92491d
                                                      • Instruction ID: f70193b693949d9fea9c33a758c9ef2cfb768e5f34c8ea1bcb1fb50e03c844cb
                                                      • Opcode Fuzzy Hash: ff2cea7383e1609898573f3ebf11834042381601f7eb54ba972a248a9c92491d
                                                      • Instruction Fuzzy Hash: 84A1C231104340EFCB24DF24D889E6A77A9FF85318F54894CF5569B2A2CB35ED82CB91
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,007B82D9,007B82D9,?,?,?,007C644F,00000001,00000001,8BE85006), ref: 007C6258
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,007C644F,00000001,00000001,8BE85006,?,?,?), ref: 007C62DE
                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 007C63D8
                                                      • __freea.LIBCMT ref: 007C63E5
                                                        • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                      • __freea.LIBCMT ref: 007C63EE
                                                      • __freea.LIBCMT ref: 007C6413
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1414292761-0
                                                      • Opcode ID: 905ec66407580246d075325a7309d948461504a597cba5a7d8ec9093e93eb461
                                                      • Instruction ID: 36c582b1397ec5e416a60e28841bd34e05ca23488ae42d4d386c1930daae47bb
                                                      • Opcode Fuzzy Hash: 905ec66407580246d075325a7309d948461504a597cba5a7d8ec9093e93eb461
                                                      • Instruction Fuzzy Hash: 1751CC72A00256ABEB258F64CCC5FBF7BAAEB44750B14862DF805D6181EB38DC40C6A0
                                                      APIs
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                        • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                        • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                        • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                        • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081BCCA
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0081BD25
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0081BD6A
                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0081BD99
                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0081BDF3
                                                      • RegCloseKey.ADVAPI32(?), ref: 0081BDFF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                      • String ID:
                                                      • API String ID: 1120388591-0
                                                      • Opcode ID: ef6220b0845471af859ff544e33c8d3dfebcd9a00282a6cd40666975b1b691ba
                                                      • Instruction ID: f22d1c24d7a5998597cad8f7ab93027052da75e86a446705ba7a347843805144
                                                      • Opcode Fuzzy Hash: ef6220b0845471af859ff544e33c8d3dfebcd9a00282a6cd40666975b1b691ba
                                                      • Instruction Fuzzy Hash: 8F819E30208241EFD714DF24D895E6ABBE9FF84308F14895CF5598B2A2DB31ED85CB92
                                                      APIs
                                                      • VariantInit.OLEAUT32(00000035), ref: 007EF7B9
                                                      • SysAllocString.OLEAUT32(00000001), ref: 007EF860
                                                      • VariantCopy.OLEAUT32(007EFA64,00000000), ref: 007EF889
                                                      • VariantClear.OLEAUT32(007EFA64), ref: 007EF8AD
                                                      • VariantCopy.OLEAUT32(007EFA64,00000000), ref: 007EF8B1
                                                      • VariantClear.OLEAUT32(?), ref: 007EF8BB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCopy$AllocInitString
                                                      • String ID:
                                                      • API String ID: 3859894641-0
                                                      • Opcode ID: b1d5a2c31381473776085cdf9b01466cda45c91f6f3b73dda3a47ca6ef518d2b
                                                      • Instruction ID: 9f0722f24a6f0537b3afe591ab64159996445ba0914a31f9a249e79ad18e123b
                                                      • Opcode Fuzzy Hash: b1d5a2c31381473776085cdf9b01466cda45c91f6f3b73dda3a47ca6ef518d2b
                                                      • Instruction Fuzzy Hash: 7B51E831602350FADF20AF66D899B39B3A8EF49310F209467F945DF692DB789C40C796
                                                      APIs
                                                        • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                        • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 008094E5
                                                      • _wcslen.LIBCMT ref: 00809506
                                                      • _wcslen.LIBCMT ref: 0080952D
                                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00809585
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$FileName$OpenSave
                                                      • String ID: X
                                                      • API String ID: 83654149-3081909835
                                                      • Opcode ID: dce9c02e6a12c7f31b3b56d73ad80d773db885121ebae7b4330b29012861bdbe
                                                      • Instruction ID: 62416353552688f865836c3bf7184dc6559d7ad5f0a27e4c6ded16da92cb4381
                                                      • Opcode Fuzzy Hash: dce9c02e6a12c7f31b3b56d73ad80d773db885121ebae7b4330b29012861bdbe
                                                      • Instruction Fuzzy Hash: 0FE1BD71608300DFDB64DF24D885A6AB7E0FF85314F05896DF8999B2A2DB34ED05CB92
                                                      APIs
                                                        • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                      • BeginPaint.USER32(?,?,?), ref: 007A9241
                                                      • GetWindowRect.USER32(?,?), ref: 007A92A5
                                                      • ScreenToClient.USER32(?,?), ref: 007A92C2
                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 007A92D3
                                                      • EndPaint.USER32(?,?,?,?,?), ref: 007A9321
                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 007E71EA
                                                        • Part of subcall function 007A9339: BeginPath.GDI32(00000000), ref: 007A9357
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                      • String ID:
                                                      • API String ID: 3050599898-0
                                                      • Opcode ID: 2dea78ca97738b30aac254ac7eaf8faa17360b9a05b55b1499fcac4f35f7fb10
                                                      • Instruction ID: 9206f036e184a040ea729af9ad1efd2c666e13c1d79ccd2b66a20cc053485299
                                                      • Opcode Fuzzy Hash: 2dea78ca97738b30aac254ac7eaf8faa17360b9a05b55b1499fcac4f35f7fb10
                                                      • Instruction Fuzzy Hash: DD418C70105300AFDB21DF25C889FBA7BB8FB9A720F140229FA54872A2C7759855DB62
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 0080080C
                                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00800847
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00800863
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 008008DC
                                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 008008F3
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00800921
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                      • String ID:
                                                      • API String ID: 3368777196-0
                                                      • Opcode ID: 0237753e6a831b541d3a1314fefa3a544090aad19ff919b5127f246a9b7039de
                                                      • Instruction ID: d6e62b334b9d976c001c08afea0602495b606c8d6fa55969442e5b4a8e2c9cb8
                                                      • Opcode Fuzzy Hash: 0237753e6a831b541d3a1314fefa3a544090aad19ff919b5127f246a9b7039de
                                                      • Instruction Fuzzy Hash: F0414A71900205EFDF14AF94DC85AAA77B9FF44310F1480A9ED00DA29BDB34EE65DBA4
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 007F4C95
                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 007F4CB2
                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 007F4CEA
                                                      • _wcslen.LIBCMT ref: 007F4D08
                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 007F4D10
                                                      • _wcsstr.LIBVCRUNTIME ref: 007F4D1A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                      • String ID:
                                                      • API String ID: 72514467-0
                                                      • Opcode ID: b2bf95ae515c6d2d44a253e52e077f2b96ba04be667b0380a1a4fce20695b7fe
                                                      • Instruction ID: 3b5e4344d26cb50c8de2b5c41bf2be4e7d795d6705db9e2ef8c8695b0dc6aaa0
                                                      • Opcode Fuzzy Hash: b2bf95ae515c6d2d44a253e52e077f2b96ba04be667b0380a1a4fce20695b7fe
                                                      • Instruction Fuzzy Hash: E3210832304204BBEB255B79EC49E7F7BACEF55750F10807DFA05CA292EA69DC01D6A0
                                                      APIs
                                                        • Part of subcall function 00793AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00793A97,?,?,00792E7F,?,?,?,00000000), ref: 00793AC2
                                                      • _wcslen.LIBCMT ref: 0080587B
                                                      • CoInitialize.OLE32(00000000), ref: 00805995
                                                      • CoCreateInstance.OLE32(0082FCF8,00000000,00000001,0082FB68,?), ref: 008059AE
                                                      • CoUninitialize.OLE32 ref: 008059CC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                      • String ID: .lnk
                                                      • API String ID: 3172280962-24824748
                                                      • Opcode ID: 97591e9f5071419ae46bcef7bbfb2ce424b233d972ca2ce27357c57287333472
                                                      • Instruction ID: d8c94a308d0f577ea62069f41d923ab38c10b441aa4613d1ebe5261e5fb4e69d
                                                      • Opcode Fuzzy Hash: 97591e9f5071419ae46bcef7bbfb2ce424b233d972ca2ce27357c57287333472
                                                      • Instruction Fuzzy Hash: 5FD14271608601DFCB54DF24D89492BBBE1FF89720F148859F8899B2A1D731EC45CFA2
                                                      APIs
                                                        • Part of subcall function 007F0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007F0FCA
                                                        • Part of subcall function 007F0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007F0FD6
                                                        • Part of subcall function 007F0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007F0FE5
                                                        • Part of subcall function 007F0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007F0FEC
                                                        • Part of subcall function 007F0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007F1002
                                                      • GetLengthSid.ADVAPI32(?,00000000,007F1335), ref: 007F17AE
                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007F17BA
                                                      • HeapAlloc.KERNEL32(00000000), ref: 007F17C1
                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 007F17DA
                                                      • GetProcessHeap.KERNEL32(00000000,00000000,007F1335), ref: 007F17EE
                                                      • HeapFree.KERNEL32(00000000), ref: 007F17F5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                      • String ID:
                                                      • API String ID: 3008561057-0
                                                      • Opcode ID: 5c9a53f668dafbc3a51f2447fb0dc94aad0b52b002cd0db157406034a85a1519
                                                      • Instruction ID: 8aad5e6931d8de8cb6622977d174dd639fbf8b8e122263b36a03146e21c0a4d0
                                                      • Opcode Fuzzy Hash: 5c9a53f668dafbc3a51f2447fb0dc94aad0b52b002cd0db157406034a85a1519
                                                      • Instruction Fuzzy Hash: 37117C71900609FFDB20AFA4CC4ABBF7BA9FB45355F508018F54597211D739A945CB60
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007F14FF
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 007F1506
                                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 007F1515
                                                      • CloseHandle.KERNEL32(00000004), ref: 007F1520
                                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007F154F
                                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 007F1563
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                      • String ID:
                                                      • API String ID: 1413079979-0
                                                      • Opcode ID: 4f2172d7abfdca4526766cf408cdbd87176f5c2ee484e92b866d4ad9040a5fad
                                                      • Instruction ID: dcf09848c863467e847a9db1c5f9c496aa09c70c1832674632c39cc52e33175a
                                                      • Opcode Fuzzy Hash: 4f2172d7abfdca4526766cf408cdbd87176f5c2ee484e92b866d4ad9040a5fad
                                                      • Instruction Fuzzy Hash: 4E11177250024DEBDB218F98DD49BEE7BA9FF48744F148015FA05A2160C3758E619B61
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,007B3379,007B2FE5), ref: 007B3390
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 007B339E
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 007B33B7
                                                      • SetLastError.KERNEL32(00000000,?,007B3379,007B2FE5), ref: 007B3409
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: 139d3e49704821a1f83d7fc6bde7c89ac903fedee859d8f6eaf52efdab83ee8f
                                                      • Instruction ID: ebbe57718831fa59c83506738c37a5dba9b41ba6360102f8671de15cac94a954
                                                      • Opcode Fuzzy Hash: 139d3e49704821a1f83d7fc6bde7c89ac903fedee859d8f6eaf52efdab83ee8f
                                                      • Instruction Fuzzy Hash: 2201F733609711FEAA252774BC8ABEB2B94FB1537A720022DF411862F1EF1D5D829954
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,007C5686,007D3CD6,?,00000000,?,007C5B6A,?,?,?,?,?,007BE6D1,?,00858A48), ref: 007C2D78
                                                      • _free.LIBCMT ref: 007C2DAB
                                                      • _free.LIBCMT ref: 007C2DD3
                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,007BE6D1,?,00858A48,00000010,00794F4A,?,?,00000000,007D3CD6), ref: 007C2DE0
                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,007BE6D1,?,00858A48,00000010,00794F4A,?,?,00000000,007D3CD6), ref: 007C2DEC
                                                      • _abort.LIBCMT ref: 007C2DF2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free$_abort
                                                      • String ID:
                                                      • API String ID: 3160817290-0
                                                      • Opcode ID: 834fbc7a0a5b9cab2c75d07ae2c498697ed8ae2971b5659e1cb13f5ba465d51e
                                                      • Instruction ID: 854555a5092e44083351888d56c691b0aa3e0f5c2020e938a2801eabe64e854e
                                                      • Opcode Fuzzy Hash: 834fbc7a0a5b9cab2c75d07ae2c498697ed8ae2971b5659e1cb13f5ba465d51e
                                                      • Instruction Fuzzy Hash: D9F0A431644B00BBC6226734AC0EF2E2759BBD17A1F25451CF825922E3EE2C98034561
                                                      APIs
                                                        • Part of subcall function 007A9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A9693
                                                        • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96A2
                                                        • Part of subcall function 007A9639: BeginPath.GDI32(?), ref: 007A96B9
                                                        • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96E2
                                                      • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00828A4E
                                                      • LineTo.GDI32(?,00000003,00000000), ref: 00828A62
                                                      • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00828A70
                                                      • LineTo.GDI32(?,00000000,00000003), ref: 00828A80
                                                      • EndPath.GDI32(?), ref: 00828A90
                                                      • StrokePath.GDI32(?), ref: 00828AA0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                      • String ID:
                                                      • API String ID: 43455801-0
                                                      • Opcode ID: b260ee719bba2864d8f0fc55fbf70cf1171daa70907fcc9a9f4957ce496796ca
                                                      • Instruction ID: d41d2083640043d4d9aa5d0cc4e95e995a38ae5b969e817e71e9ebab432e4439
                                                      • Opcode Fuzzy Hash: b260ee719bba2864d8f0fc55fbf70cf1171daa70907fcc9a9f4957ce496796ca
                                                      • Instruction Fuzzy Hash: AE11C976000519FFEF129F94DC88EAA7F6DFB08354F44C012FA199A1A1C771AD55DBA0
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 007F5218
                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 007F5229
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007F5230
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 007F5238
                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 007F524F
                                                      • MulDiv.KERNEL32(000009EC,00000001,?), ref: 007F5261
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CapsDevice$Release
                                                      • String ID:
                                                      • API String ID: 1035833867-0
                                                      • Opcode ID: 12b892369e2ace48aaa3596710a4d4e70217165c06e0a7790ad65571adc575c4
                                                      • Instruction ID: f086e889e3d86e37d1d6a52006c0ef72f4e2d239d347e1ee8298b047764a00ab
                                                      • Opcode Fuzzy Hash: 12b892369e2ace48aaa3596710a4d4e70217165c06e0a7790ad65571adc575c4
                                                      • Instruction Fuzzy Hash: 26014FB5E01718BBEB109BA69C49A6EBFB8FF48751F048165FB04A7281D6709801CBA0
                                                      APIs
                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00791BF4
                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00791BFC
                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00791C07
                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00791C12
                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00791C1A
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00791C22
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Virtual
                                                      • String ID:
                                                      • API String ID: 4278518827-0
                                                      • Opcode ID: 9149e8f847eff52908dc3358b520443df1455187f8a46ef7ca0191a37907dcaf
                                                      • Instruction ID: 1be778de117508baab5263b2d71e0f1d45c75d83651f19cba12828fa171b14a2
                                                      • Opcode Fuzzy Hash: 9149e8f847eff52908dc3358b520443df1455187f8a46ef7ca0191a37907dcaf
                                                      • Instruction Fuzzy Hash: 740167B0902B5ABDE3008F6A8C85B56FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                      APIs
                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007FEB30
                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007FEB46
                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 007FEB55
                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007FEB64
                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007FEB6E
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007FEB75
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 839392675-0
                                                      • Opcode ID: 2cad64ac1fdecc2c2ca4158ee8764fe14eb49147896a0d0ef56d37ecdbd6b3f7
                                                      • Instruction ID: 2b84a6624a29fd2e369ced00f521b322dcd558f5c16a44f6c0b0f12fb16de68c
                                                      • Opcode Fuzzy Hash: 2cad64ac1fdecc2c2ca4158ee8764fe14eb49147896a0d0ef56d37ecdbd6b3f7
                                                      • Instruction Fuzzy Hash: 11F03AB2240558BBE7315B629C0EEFF7A7CFFCAB11F008159FA01D1191D7A45A02C6B5
                                                      APIs
                                                      • GetClientRect.USER32(?), ref: 007E7452
                                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 007E7469
                                                      • GetWindowDC.USER32(?), ref: 007E7475
                                                      • GetPixel.GDI32(00000000,?,?), ref: 007E7484
                                                      • ReleaseDC.USER32(?,00000000), ref: 007E7496
                                                      • GetSysColor.USER32(00000005), ref: 007E74B0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                      • String ID:
                                                      • API String ID: 272304278-0
                                                      • Opcode ID: 34200a1043311d8cade3e5693a9fa187e9838313518a2782d554e64f46b91ab8
                                                      • Instruction ID: 64c526c1ffa642007d3a2df90df70fc590a1c1114771be94e34c57855bd2c398
                                                      • Opcode Fuzzy Hash: 34200a1043311d8cade3e5693a9fa187e9838313518a2782d554e64f46b91ab8
                                                      • Instruction Fuzzy Hash: 0C018631400245EFEB615FA4DC08BBE7BB5FF08321F218164FA16A21A1CB351E52EB50
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 007F187F
                                                      • UnloadUserProfile.USERENV(?,?), ref: 007F188B
                                                      • CloseHandle.KERNEL32(?), ref: 007F1894
                                                      • CloseHandle.KERNEL32(?), ref: 007F189C
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 007F18A5
                                                      • HeapFree.KERNEL32(00000000), ref: 007F18AC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                      • String ID:
                                                      • API String ID: 146765662-0
                                                      • Opcode ID: 96e23529206330947737aeebec012f3576c425a59a9c947b8eafa12ba8c03d4b
                                                      • Instruction ID: e405e0b0166289b14c9f1667ccca5de223b1688c86fb83042dfa426111eb5d58
                                                      • Opcode Fuzzy Hash: 96e23529206330947737aeebec012f3576c425a59a9c947b8eafa12ba8c03d4b
                                                      • Instruction Fuzzy Hash: 0CE0C236004501BBDA115BA5ED0D92ABB29FF49B22B20C620F22581174CB329432DB50
                                                      APIs
                                                        • Part of subcall function 007B0242: EnterCriticalSection.KERNEL32(0086070C,00861884,?,?,007A198B,00862518,?,?,?,007912F9,00000000), ref: 007B024D
                                                        • Part of subcall function 007B0242: LeaveCriticalSection.KERNEL32(0086070C,?,007A198B,00862518,?,?,?,007912F9,00000000), ref: 007B028A
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                        • Part of subcall function 007B00A3: __onexit.LIBCMT ref: 007B00A9
                                                      • __Init_thread_footer.LIBCMT ref: 00817BFB
                                                        • Part of subcall function 007B01F8: EnterCriticalSection.KERNEL32(0086070C,?,?,007A8747,00862514), ref: 007B0202
                                                        • Part of subcall function 007B01F8: LeaveCriticalSection.KERNEL32(0086070C,?,007A8747,00862514), ref: 007B0235
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                      • String ID: +T~$5$G$Variable must be of type 'Object'.
                                                      • API String ID: 535116098-1127575951
                                                      • Opcode ID: 18162c7df571d2bbf149db37561e0df613131e67bfed3a8f9b72411c4c3043ec
                                                      • Instruction ID: 34349c538a3417a56446477b92af55ba1d29f83ef580f5cec416a090746d2335
                                                      • Opcode Fuzzy Hash: 18162c7df571d2bbf149db37561e0df613131e67bfed3a8f9b72411c4c3043ec
                                                      • Instruction Fuzzy Hash: F3916B74A04209EFCB14EF98E8959EDB7B9FF49304F10805DF8069B291DB71AE85CB51
                                                      APIs
                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 0081AEA3
                                                        • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                      • GetProcessId.KERNEL32(00000000), ref: 0081AF38
                                                      • CloseHandle.KERNEL32(00000000), ref: 0081AF67
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CloseExecuteHandleProcessShell_wcslen
                                                      • String ID: <$@
                                                      • API String ID: 146682121-1426351568
                                                      • Opcode ID: 651862da8c74d559885d68505443b18cc0a45475bbcd61f57d00f1d9189e2d4c
                                                      • Instruction ID: 87364d25fad7cf3c8f3cf86fc592ab668cc412bbbcef7b2d76ebb2aa4f46a9f6
                                                      • Opcode Fuzzy Hash: 651862da8c74d559885d68505443b18cc0a45475bbcd61f57d00f1d9189e2d4c
                                                      • Instruction Fuzzy Hash: 5A714775A00619DFCF18DF54D488A9EBBF4FF08314F048499E816AB292CB78ED85CB91
                                                      APIs
                                                      • GetWindowRect.USER32(00E4E868,?), ref: 008262E2
                                                      • ScreenToClient.USER32(?,?), ref: 00826315
                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00826382
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientMoveRectScreen
                                                      • String ID: hW
                                                      • API String ID: 3880355969-1300829777
                                                      • Opcode ID: ad34e3255ddc34fe49c85f0848e491ec4b84c344937d0149067e05f8c78a6cce
                                                      • Instruction ID: dec6a5c39f23260e25cf14d7b6c086c5f8e7a0ae2b556fe6b10c28f89ed24342
                                                      • Opcode Fuzzy Hash: ad34e3255ddc34fe49c85f0848e491ec4b84c344937d0149067e05f8c78a6cce
                                                      • Instruction Fuzzy Hash: A8512A74A00219EFCF20DF68E885AAE7BB5FF45360F108159F815DB290E771AD91CB90
                                                      APIs
                                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007F7206
                                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 007F723C
                                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 007F724D
                                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007F72CF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                                      • String ID: DllGetClassObject
                                                      • API String ID: 753597075-1075368562
                                                      • Opcode ID: fa08f0f5d8f254e9f2d9cd9da1ade4154178f6b7019b7609928e6a60af06e335
                                                      • Instruction ID: 93593074482d87de4027c23ec90c9bdeb315638e7ac8e0975639b04c3e6ea642
                                                      • Opcode Fuzzy Hash: fa08f0f5d8f254e9f2d9cd9da1ade4154178f6b7019b7609928e6a60af06e335
                                                      • Instruction Fuzzy Hash: 7C415071604208EFDB19CF54C885AAA7BB9FF48310F1480ADBE059F30AD7B9D945DBA0
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 007FC306
                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 007FC34C
                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00861990,pT), ref: 007FC395
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Menu$Delete$InfoItem
                                                      • String ID: 0$pT
                                                      • API String ID: 135850232-1622978541
                                                      • Opcode ID: b399d9a14f4d4f95238d3e42f8a747209db5bd2befb580ccd54542ce310fa2f7
                                                      • Instruction ID: 6dc4d9f0f2bfba50dc6ba8fa89b21e0c941a270a988c067b9272b8554039072c
                                                      • Opcode Fuzzy Hash: b399d9a14f4d4f95238d3e42f8a747209db5bd2befb580ccd54542ce310fa2f7
                                                      • Instruction Fuzzy Hash: 4D418C312043099FD721DF29D985B6ABBE4BF85360F108A1DFAA5973D1D738E904CB52
                                                      APIs
                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00825352
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00825375
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00825382
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008253A8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$InvalidateMessageRectSend
                                                      • String ID: hW
                                                      • API String ID: 3340791633-1300829777
                                                      • Opcode ID: 9aba4272718277fc552ef7306decd5a26b1471bc504f8a396072571d463595ce
                                                      • Instruction ID: 19b1a1bacbf31a7601752b8a42a450190e996cc74a096a5a7282761a169c9dd9
                                                      • Opcode Fuzzy Hash: 9aba4272718277fc552ef7306decd5a26b1471bc504f8a396072571d463595ce
                                                      • Instruction Fuzzy Hash: D1318E34A95A28AEEB30DA14EC1EBE97765FB06390F586102FA11D63E1C7B49DC09B41
                                                      APIs
                                                      • ClientToScreen.USER32(?,?), ref: 0082769A
                                                      • GetWindowRect.USER32(?,?), ref: 00827710
                                                      • PtInRect.USER32(?,?,00828B89), ref: 00827720
                                                      • MessageBeep.USER32(00000000), ref: 0082778C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                      • String ID: hW
                                                      • API String ID: 1352109105-1300829777
                                                      • Opcode ID: 5f08ea585a67d2cd35cfd3fc9a92f82b6aea71b986ca9c88958954baa4cfd97f
                                                      • Instruction ID: 63dc7b9b374a7e618ef140a2bf4304401deb5d122b55c937cd061e79f82d510a
                                                      • Opcode Fuzzy Hash: 5f08ea585a67d2cd35cfd3fc9a92f82b6aea71b986ca9c88958954baa4cfd97f
                                                      • Instruction Fuzzy Hash: BB41BF34605265DFDB11CF5AE898EA9BBF4FF48304F1980A8E814DB261C370E982CF90
                                                      APIs
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                        • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007F1E66
                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 007F1E79
                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 007F1EA9
                                                        • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$_wcslen$ClassName
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 2081771294-1403004172
                                                      • Opcode ID: 99eb5bd8bfd38964a4bfd15e68ad53d3bd3a3c528a65cf037bfa953f7e1ad11e
                                                      • Instruction ID: 559f1ec90550be6446529e8a99a002d8a736057f2985fa7820d1b4fb68c02fe9
                                                      • Opcode Fuzzy Hash: 99eb5bd8bfd38964a4bfd15e68ad53d3bd3a3c528a65cf037bfa953f7e1ad11e
                                                      • Instruction Fuzzy Hash: 1821D371A00108EADB14ABA5DC59CFFB7B8EF56360F54451DFA25A72E1DB3C490AC620
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                      • API String ID: 176396367-4004644295
                                                      • Opcode ID: 5338f367daf95b9a27d658c4a426fabc4eec23f5c249ba202edf828681759edb
                                                      • Instruction ID: 59194715dabf25912c944ca7ff443ffcce93b0d7eadebfe4a010118afeff0968
                                                      • Opcode Fuzzy Hash: 5338f367daf95b9a27d658c4a426fabc4eec23f5c249ba202edf828681759edb
                                                      • Instruction Fuzzy Hash: 9E31F5B2A801798BCB22DE6C99405FE3399FFA1750B154029EC55EB345EA75CDC4D3A0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00824705
                                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00824713
                                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0082471A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$DestroyWindow
                                                      • String ID: hW$msctls_updown32
                                                      • API String ID: 4014797782-2789883529
                                                      • Opcode ID: 24da2b54aec8d86986d12bda77129c6e2a199aa1ce7656294be2287c66e863df
                                                      • Instruction ID: 99923f0b74b92273343e68074b1eac92e89b9e6e19255b7e75186c8cb9db2c05
                                                      • Opcode Fuzzy Hash: 24da2b54aec8d86986d12bda77129c6e2a199aa1ce7656294be2287c66e863df
                                                      • Instruction Fuzzy Hash: A5217CB5600218AFEB10DF68EC85DBA37ADFB5A394B041059FA11DB251CB70EC51CA60
                                                      APIs
                                                        • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                      • GetCursorPos.USER32(?), ref: 00829001
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,007E7711,?,?,?,?,?), ref: 00829016
                                                      • GetCursorPos.USER32(?), ref: 0082905E
                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,007E7711,?,?,?), ref: 00829094
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                      • String ID: hW
                                                      • API String ID: 2864067406-1300829777
                                                      • Opcode ID: 06e134cf7c1f31cd6e74d92321d95725d2d1ce3d05d6c53af11bfb0310a557aa
                                                      • Instruction ID: dcbf51fa8d186fedacea90e1784b200574220a761e9051b898554290e36dca5f
                                                      • Opcode Fuzzy Hash: 06e134cf7c1f31cd6e74d92321d95725d2d1ce3d05d6c53af11bfb0310a557aa
                                                      • Instruction Fuzzy Hash: 7021BC31600428EFCB268F94D858EFA7BF9FF8A350F054169F9458B261C335A990DB60
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00822F8D
                                                      • LoadLibraryW.KERNEL32(?), ref: 00822F94
                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00822FA9
                                                      • DestroyWindow.USER32(?), ref: 00822FB1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$DestroyLibraryLoadWindow
                                                      • String ID: SysAnimate32
                                                      • API String ID: 3529120543-1011021900
                                                      • Opcode ID: bf7adc087c6c3f0be5ce940531a7f7750252810655494f776100fdf2e9a45021
                                                      • Instruction ID: 18073cb6d3dd3e43675465eb5d39bbbce3c6a63d1cb4615b7d63754fb3981594
                                                      • Opcode Fuzzy Hash: bf7adc087c6c3f0be5ce940531a7f7750252810655494f776100fdf2e9a45021
                                                      • Instruction Fuzzy Hash: E621ACB2200229BBEF309F64ED84EBB37B9FB59364F104229FA50D2190DB71DC919760
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,007B4D1E,007C28E9,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002), ref: 007B4D8D
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 007B4DA0
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,007B4D1E,007C28E9,?,007B4CBE,007C28E9,008588B8,0000000C,007B4E15,007C28E9,00000002,00000000), ref: 007B4DC3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: 0d80d24c5a35c8818c527497b9a4f7b1b2613176958b157793cdcd87a8bfd88b
                                                      • Instruction ID: 9d4cb54ed74e6fc307e5edcf64e97458b29f77252d161bcf3ad24038c5dffffd
                                                      • Opcode Fuzzy Hash: 0d80d24c5a35c8818c527497b9a4f7b1b2613176958b157793cdcd87a8bfd88b
                                                      • Instruction Fuzzy Hash: 8EF04F34A40208BBDB619F90DC49BEEBBB5FF44752F0040A4F905A22A1CB795951CED0
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E9C
                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00794EAE
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00794EDD,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794EC0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                      • API String ID: 145871493-3689287502
                                                      • Opcode ID: a7fccc074f241322507586879371c02f9b065c35875e09e033597baf7afdf170
                                                      • Instruction ID: ee1acf3151fa4006b4d5e0e06500080882bb26d853075f66335b0f86881fef63
                                                      • Opcode Fuzzy Hash: a7fccc074f241322507586879371c02f9b065c35875e09e033597baf7afdf170
                                                      • Instruction Fuzzy Hash: 26E08C36A02A22AB96321B25BC1AE7F7658BF81BA3B054125FC01E2200DB68CD0380E0
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E62
                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00794E74
                                                      • FreeLibrary.KERNEL32(00000000,?,?,007D3CDE,?,00861418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00794E87
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                      • API String ID: 145871493-1355242751
                                                      • Opcode ID: 24dc1eaec7a7144f35f57272116b6d55987e75c1f51ad3209a9651b16b738ae9
                                                      • Instruction ID: 6acdf6ab29245bd8aa0d82a64eed505104305f8e839b5cc0a183f8f228cf4478
                                                      • Opcode Fuzzy Hash: 24dc1eaec7a7144f35f57272116b6d55987e75c1f51ad3209a9651b16b738ae9
                                                      • Instruction Fuzzy Hash: E0D0C232902A31574A321B247C09DAF3A18FF85B613054110BC00E2310CF28CD13C1D0
                                                      APIs
                                                      • GetCurrentProcessId.KERNEL32 ref: 0081A427
                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0081A435
                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0081A468
                                                      • CloseHandle.KERNEL32(?), ref: 0081A63D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                                      • String ID:
                                                      • API String ID: 3488606520-0
                                                      • Opcode ID: 8362d543eae35ca837c7bca222b222526c6d0ecde1b2b4b2e5cd120507d6e544
                                                      • Instruction ID: fd8f3eef3f8b01634878083ae97a8859cda97d34094f9e8ac505443b9be90157
                                                      • Opcode Fuzzy Hash: 8362d543eae35ca837c7bca222b222526c6d0ecde1b2b4b2e5cd120507d6e544
                                                      • Instruction Fuzzy Hash: 23A1AF726043009FDB24DF24D88AB6AB7E5FF88714F14881DF55ADB292D7B4EC418B92
                                                      APIs
                                                        • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007FCF22,?), ref: 007FDDFD
                                                        • Part of subcall function 007FDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007FCF22,?), ref: 007FDE16
                                                        • Part of subcall function 007FE199: GetFileAttributesW.KERNEL32(?,007FCF95), ref: 007FE19A
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 007FE473
                                                      • MoveFileW.KERNEL32(?,?), ref: 007FE4AC
                                                      • _wcslen.LIBCMT ref: 007FE5EB
                                                      • _wcslen.LIBCMT ref: 007FE603
                                                      • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 007FE650
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                      • String ID:
                                                      • API String ID: 3183298772-0
                                                      • Opcode ID: 6041e571ad4fdd0338f67522ebec08bd8f03731f6d6d6469619ce6537a0e9971
                                                      • Instruction ID: d6b704732540cc3a0d89cb3f2006f6ce2559af6a7e73ea30863d66092f642fa2
                                                      • Opcode Fuzzy Hash: 6041e571ad4fdd0338f67522ebec08bd8f03731f6d6d6469619ce6537a0e9971
                                                      • Instruction Fuzzy Hash: FC5154B24083899BD724EB94DC859EFB3DCAF85340F00491EF789D3251EF78A5888766
                                                      APIs
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                        • Part of subcall function 0081C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0081B6AE,?,?), ref: 0081C9B5
                                                        • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081C9F1
                                                        • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA68
                                                        • Part of subcall function 0081C998: _wcslen.LIBCMT ref: 0081CA9E
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081BAA5
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0081BB00
                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0081BB63
                                                      • RegCloseKey.ADVAPI32(?,?), ref: 0081BBA6
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0081BBB3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                      • String ID:
                                                      • API String ID: 826366716-0
                                                      • Opcode ID: ae04a94f7d8f5bbb1468541db2dcbbf382474407c9fb1a9c1f138320b0db6291
                                                      • Instruction ID: 8236acd5c0f446657fd403e85cda59146bf696b18340349892a685deb6e42306
                                                      • Opcode Fuzzy Hash: ae04a94f7d8f5bbb1468541db2dcbbf382474407c9fb1a9c1f138320b0db6291
                                                      • Instruction Fuzzy Hash: 6961D371208241EFD714DF24C894E6ABBE9FF84318F14855CF4998B2A2DB31ED85CB92
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 007F8BCD
                                                      • VariantClear.OLEAUT32 ref: 007F8C3E
                                                      • VariantClear.OLEAUT32 ref: 007F8C9D
                                                      • VariantClear.OLEAUT32(?), ref: 007F8D10
                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 007F8D3B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Variant$Clear$ChangeInitType
                                                      • String ID:
                                                      • API String ID: 4136290138-0
                                                      • Opcode ID: d3485548eb5c828f3a61d94e67bbc790e3143f42e289ee00db9dfca2e9d76315
                                                      • Instruction ID: 68d8ef60a2c602ea55840534dc9844bd2d10e30c964f0411f75ac9c99ea7e672
                                                      • Opcode Fuzzy Hash: d3485548eb5c828f3a61d94e67bbc790e3143f42e289ee00db9dfca2e9d76315
                                                      • Instruction Fuzzy Hash: 165169B5A00619EFCB10CF68C884AAAB7F8FF8D310B158559EA15DB354E734E911CFA0
                                                      APIs
                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00808BAE
                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00808BDA
                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00808C32
                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00808C57
                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00808C5F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile$SectionWrite$String
                                                      • String ID:
                                                      • API String ID: 2832842796-0
                                                      • Opcode ID: 34c5a3dc4b08785db42da776b381448c71ce5a41c0d64a452b8fc720e3a43f55
                                                      • Instruction ID: 9693068e23556ded42deb05fe26731d2be5693ce659d8b0bd00e6de84b7a279e
                                                      • Opcode Fuzzy Hash: 34c5a3dc4b08785db42da776b381448c71ce5a41c0d64a452b8fc720e3a43f55
                                                      • Instruction Fuzzy Hash: AB513735A00214DFDF55DF64C885A69BBF5FF49314F088058E849AB3A2DB35ED51CB90
                                                      APIs
                                                      • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00818F40
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00818FD0
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00818FEC
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00819032
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00819052
                                                        • Part of subcall function 007AF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00801043,?,753CE610), ref: 007AF6E6
                                                        • Part of subcall function 007AF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,007EFA64,00000000,00000000,?,?,00801043,?,753CE610,?,007EFA64), ref: 007AF70D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                      • String ID:
                                                      • API String ID: 666041331-0
                                                      • Opcode ID: 87eae1263eb5552c36db9b3a499c12e96a0d769752af81df796f57d6662b2fc4
                                                      • Instruction ID: 50c67ea88bc73ac51b1f0e23c8e1a8414c8b4ce85f843cdffdb2a59aa8a7526b
                                                      • Opcode Fuzzy Hash: 87eae1263eb5552c36db9b3a499c12e96a0d769752af81df796f57d6662b2fc4
                                                      • Instruction Fuzzy Hash: F3515934A04605DFCB14DF58D499CADBBF5FF49314B0580A8E84A9B362DB31ED86CB90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: d3d64efe4f7699ae8381035221b87cfaba04fdef363549442306e16ce46043c0
                                                      • Instruction ID: f72d02d356192d33150cee8e2916de621427d8145a17f52c3ac96bac89144724
                                                      • Opcode Fuzzy Hash: d3d64efe4f7699ae8381035221b87cfaba04fdef363549442306e16ce46043c0
                                                      • Instruction Fuzzy Hash: 1D41BE32A00204DFCB24DF78C885F5AB7A5EF89314B1545ADE615EB392DA35AD02CB80
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 007A9141
                                                      • ScreenToClient.USER32(00000000,?), ref: 007A915E
                                                      • GetAsyncKeyState.USER32(00000001), ref: 007A9183
                                                      • GetAsyncKeyState.USER32(00000002), ref: 007A919D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: AsyncState$ClientCursorScreen
                                                      • String ID:
                                                      • API String ID: 4210589936-0
                                                      • Opcode ID: 27f9a65564f69947416c27b629270a8797cf669a10bd085250a3fa7b10cb158c
                                                      • Instruction ID: b03986f67c07b328cd0d2e7f27110c31a282a2f7f7ce54e02fe6fc50b9f18b6d
                                                      • Opcode Fuzzy Hash: 27f9a65564f69947416c27b629270a8797cf669a10bd085250a3fa7b10cb158c
                                                      • Instruction Fuzzy Hash: 5C415E3190865AFBDF199F69C848BEEB775FF4A320F208315E525A7290C7385950CB51
                                                      APIs
                                                      • GetInputState.USER32 ref: 008038CB
                                                      • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00803922
                                                      • TranslateMessage.USER32(?), ref: 0080394B
                                                      • DispatchMessageW.USER32(?), ref: 00803955
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00803966
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                      • String ID:
                                                      • API String ID: 2256411358-0
                                                      • Opcode ID: 36052af2587f9b8f51d252f112141d2fd34735dd0dec32780f74275b1e7a0105
                                                      • Instruction ID: 85d3973068ac30a546bef2461c2eb647f4121ee5b269fd9392a8d8133c261292
                                                      • Opcode Fuzzy Hash: 36052af2587f9b8f51d252f112141d2fd34735dd0dec32780f74275b1e7a0105
                                                      • Instruction Fuzzy Hash: 4E31CE709043469EEF758B349D09BB67BACFB02304F094569E462C22E1E3E49A85CB21
                                                      APIs
                                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0080C21E,00000000), ref: 0080CF38
                                                      • InternetReadFile.WININET(?,00000000,?,?), ref: 0080CF6F
                                                      • GetLastError.KERNEL32(?,00000000,?,?,?,0080C21E,00000000), ref: 0080CFB4
                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,0080C21E,00000000), ref: 0080CFC8
                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,0080C21E,00000000), ref: 0080CFF2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                      • String ID:
                                                      • API String ID: 3191363074-0
                                                      • Opcode ID: bcda36acb24a60f16d8f3baa90d28489d7c77c3dfb81ae4e6e8084be2d271cc2
                                                      • Instruction ID: e59d625afeff1c7448b04bf7b60fe3b49bca9c32317ecac5600df0db6cfe5e3b
                                                      • Opcode Fuzzy Hash: bcda36acb24a60f16d8f3baa90d28489d7c77c3dfb81ae4e6e8084be2d271cc2
                                                      • Instruction Fuzzy Hash: 1E317C71600206EFDB60DFA5CC849AFBBF9FF04354B10852EF506D2180DB70AE419BA1
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 007F1915
                                                      • PostMessageW.USER32(00000001,00000201,00000001), ref: 007F19C1
                                                      • Sleep.KERNEL32(00000000,?,?,?), ref: 007F19C9
                                                      • PostMessageW.USER32(00000001,00000202,00000000), ref: 007F19DA
                                                      • Sleep.KERNEL32(00000000,?,?,?,?), ref: 007F19E2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleep$RectWindow
                                                      • String ID:
                                                      • API String ID: 3382505437-0
                                                      • Opcode ID: 05726b97f0b4dd57cbdb00cef2f193a99e6ecc5eb2a63b12b28128c4ca2a4331
                                                      • Instruction ID: 67303d20ee03eac4c68fdb44a30a179acaa6986cd76e965952f60e1cfdea8341
                                                      • Opcode Fuzzy Hash: 05726b97f0b4dd57cbdb00cef2f193a99e6ecc5eb2a63b12b28128c4ca2a4331
                                                      • Instruction Fuzzy Hash: 0231E27190025DEFCB14CFA8CD99AEE3BB5FB04314F408229FA21A72D0C3B4A954DB90
                                                      APIs
                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00825745
                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 0082579D
                                                      • _wcslen.LIBCMT ref: 008257AF
                                                      • _wcslen.LIBCMT ref: 008257BA
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00825816
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$_wcslen
                                                      • String ID:
                                                      • API String ID: 763830540-0
                                                      • Opcode ID: 2b7ec1c8682f90b2b5548bc132cb8283087fe7ff748e5ae5f7dee8b4ba6d4750
                                                      • Instruction ID: 2c9fb4cafe48b8b750e9ad79a6becf905c19bef0239417ed5f4bb014ac6c705a
                                                      • Opcode Fuzzy Hash: 2b7ec1c8682f90b2b5548bc132cb8283087fe7ff748e5ae5f7dee8b4ba6d4750
                                                      • Instruction Fuzzy Hash: B821B671944628DADB209F64EC84AEEBBB8FF14324F108216F929EB181D770D9C5CF50
                                                      APIs
                                                      • IsWindow.USER32(00000000), ref: 00810951
                                                      • GetForegroundWindow.USER32 ref: 00810968
                                                      • GetDC.USER32(00000000), ref: 008109A4
                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 008109B0
                                                      • ReleaseDC.USER32(00000000,00000003), ref: 008109E8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$ForegroundPixelRelease
                                                      • String ID:
                                                      • API String ID: 4156661090-0
                                                      • Opcode ID: 735977ddd6f40616cddae769de703497b57c5fddfd8843a2977c1e7d3b40c059
                                                      • Instruction ID: 62b1ffc71d99cc402b4192dfd07628f5839947fe8e94332bd0d4c7c331be9ecd
                                                      • Opcode Fuzzy Hash: 735977ddd6f40616cddae769de703497b57c5fddfd8843a2977c1e7d3b40c059
                                                      • Instruction Fuzzy Hash: B5218335A00104AFDB14EF68DC88AAEBBE9FF44700F048028E846D7751CA70AC44CB50
                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32 ref: 007CCDC6
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 007CCDE9
                                                        • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 007CCE0F
                                                      • _free.LIBCMT ref: 007CCE22
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 007CCE31
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                      • String ID:
                                                      • API String ID: 336800556-0
                                                      • Opcode ID: b98becbbfeebc5e5f44dbaaf7b06f096d883cc379f6e196f7c9bb6bc71290ea1
                                                      • Instruction ID: 2cc812852d1a3dfd2522334151d62c93b5f6d290f7fdc0138effde8837074abc
                                                      • Opcode Fuzzy Hash: b98becbbfeebc5e5f44dbaaf7b06f096d883cc379f6e196f7c9bb6bc71290ea1
                                                      • Instruction Fuzzy Hash: 5201A7726016157F23325AB66C8DE7F7B6DEEC7BA1315412DFD09D7201EA698D0281F0
                                                      APIs
                                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A9693
                                                      • SelectObject.GDI32(?,00000000), ref: 007A96A2
                                                      • BeginPath.GDI32(?), ref: 007A96B9
                                                      • SelectObject.GDI32(?,00000000), ref: 007A96E2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$BeginCreatePath
                                                      • String ID:
                                                      • API String ID: 3225163088-0
                                                      • Opcode ID: f17444bba2bdb0754e6a3131fd4b83fffc438f1101e199d4d45a98d0d2a5330a
                                                      • Instruction ID: 4b92ee2fc058a9caa119e4128dddc23048fa2587ad454f947103b362d2154c0d
                                                      • Opcode Fuzzy Hash: f17444bba2bdb0754e6a3131fd4b83fffc438f1101e199d4d45a98d0d2a5330a
                                                      • Instruction Fuzzy Hash: 99217F30802305EBEF119F64DC19BA93FA8BF81315F594316FA10A61A2D3B958A2CF94
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID:
                                                      • API String ID: 2931989736-0
                                                      • Opcode ID: 1661d0ac43b459ebedf49679cca0c7ba2c0f0d40e6fc18691c372dd43f714afa
                                                      • Instruction ID: 7a3f9b5a0537414ffd953ea22e38172ff7d6ec28caa7ef21c44c9d84db6f006e
                                                      • Opcode Fuzzy Hash: 1661d0ac43b459ebedf49679cca0c7ba2c0f0d40e6fc18691c372dd43f714afa
                                                      • Instruction Fuzzy Hash: 8C019262645A1DFAD6086511ED92FFB639CEB213A4B804030FF15DB342F66CED50D2B0
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,?,007BF2DE,007C3863,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6), ref: 007C2DFD
                                                      • _free.LIBCMT ref: 007C2E32
                                                      • _free.LIBCMT ref: 007C2E59
                                                      • SetLastError.KERNEL32(00000000,00791129), ref: 007C2E66
                                                      • SetLastError.KERNEL32(00000000,00791129), ref: 007C2E6F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: 57bfd2d5198fc4ea6401f1db85feaf889fe47762c2f187ac33d436e10e1e476e
                                                      • Instruction ID: b24450939e7497a007849b57a2301b3c51027cff1d81f9372c60ed55cf2c22f4
                                                      • Opcode Fuzzy Hash: 57bfd2d5198fc4ea6401f1db85feaf889fe47762c2f187ac33d436e10e1e476e
                                                      • Instruction Fuzzy Hash: 0D01A436245A00BBDA2267756C4DF2F276DBBD17B5B25852CF425B22A3EB7C8C074520
                                                      APIs
                                                      • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?,?,007F035E), ref: 007F002B
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0046
                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0054
                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?), ref: 007F0064
                                                      • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,007EFF41,80070057,?,?), ref: 007F0070
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                      • String ID:
                                                      • API String ID: 3897988419-0
                                                      • Opcode ID: 46deaa3cc3df0469bb4467c5c8212f8d0f28ffd5fb7e09edb39e1c955c485f34
                                                      • Instruction ID: a2125aeb44c5a73a12cd19613db96e2d1be9e979f033a37e0da623719bead479
                                                      • Opcode Fuzzy Hash: 46deaa3cc3df0469bb4467c5c8212f8d0f28ffd5fb7e09edb39e1c955c485f34
                                                      • Instruction Fuzzy Hash: 98017C76600208BBDB204F68DC08BBE7AADEB44751F148124FA05D2311DB79DD419BA0
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 007FE997
                                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 007FE9A5
                                                      • Sleep.KERNEL32(00000000), ref: 007FE9AD
                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 007FE9B7
                                                      • Sleep.KERNEL32 ref: 007FE9F3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                      • String ID:
                                                      • API String ID: 2833360925-0
                                                      • Opcode ID: 785eb37603eee3df54ab57515492fdec13da4091bb317600c0d665eb27d367f8
                                                      • Instruction ID: d84977f14dec37f889ecf8f2f1f1a60b4e23ae4dbb112653ab5355aab647627f
                                                      • Opcode Fuzzy Hash: 785eb37603eee3df54ab57515492fdec13da4091bb317600c0d665eb27d367f8
                                                      • Instruction Fuzzy Hash: E3013931C01A2DDBCF10DBE4D8496EDBB78BB09700F004546E612B2261DB78A556C7A2
                                                      APIs
                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 007F1114
                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1120
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F112F
                                                      • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,007F0B9B,?,?,?), ref: 007F1136
                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 007F114D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 842720411-0
                                                      • Opcode ID: f7ed2c4ef79d0f1e9ce299aa7fd58b91059d93cca6758d72211be63cc343e204
                                                      • Instruction ID: 0be5c77d4da5a67cdadf061c86483f7c9ee0a92a20ec14aa5c9ac1eeb412f6b7
                                                      • Opcode Fuzzy Hash: f7ed2c4ef79d0f1e9ce299aa7fd58b91059d93cca6758d72211be63cc343e204
                                                      • Instruction Fuzzy Hash: FC011D79500209BFDB214F69DC59A7A3B6EFF85360B504419FA45D7350DB31DC119A60
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007F0FCA
                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007F0FD6
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007F0FE5
                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007F0FEC
                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007F1002
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: 88569ed107ca7f632d8ea862c8ba92bae19e5760b129ce3e7e28f7d65d62526c
                                                      • Instruction ID: 69b44ef0a7a571a7fc72ada32ea40bbec05366971963ae4d8445d356cff19a5e
                                                      • Opcode Fuzzy Hash: 88569ed107ca7f632d8ea862c8ba92bae19e5760b129ce3e7e28f7d65d62526c
                                                      • Instruction Fuzzy Hash: 39F04936200305FBDB214FA49C4EF6A3BADFF89762F608424FA45C7251CA74DC518A60
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007F102A
                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007F1036
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1045
                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007F104C
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1062
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: 5bdd5e8bd943815a6fc7b828805fe51f2cbaf96bd2e9418f5700a3a707b05b41
                                                      • Instruction ID: 0fc5f04ed6cf184179832a18ab3e460f8ad1034529d685f4d2114bfe70f531ef
                                                      • Opcode Fuzzy Hash: 5bdd5e8bd943815a6fc7b828805fe51f2cbaf96bd2e9418f5700a3a707b05b41
                                                      • Instruction Fuzzy Hash: 01F06D35200305FBDB215FA4EC49F6A3BADFF89761F604424FA45C7350CE74D8518A60
                                                      APIs
                                                      • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800324
                                                      • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800331
                                                      • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 0080033E
                                                      • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 0080034B
                                                      • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800358
                                                      • CloseHandle.KERNEL32(?,?,?,?,0080017D,?,008032FC,?,00000001,007D2592,?), ref: 00800365
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: 6ddeb4abe3a7f510ec182948386d72c76a4c5942bd6580ae759f35ccdbd35b44
                                                      • Instruction ID: a61701e7636aa8e519d3846c5d9b84deba097dc8f129879f94aec0c56ce1e71b
                                                      • Opcode Fuzzy Hash: 6ddeb4abe3a7f510ec182948386d72c76a4c5942bd6580ae759f35ccdbd35b44
                                                      • Instruction Fuzzy Hash: 4F019C72800B159FCB31AF66DC80916FBF9FE603157168A3ED19692A71C3B1A959CE80
                                                      APIs
                                                      • _free.LIBCMT ref: 007CD752
                                                        • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                        • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                      • _free.LIBCMT ref: 007CD764
                                                      • _free.LIBCMT ref: 007CD776
                                                      • _free.LIBCMT ref: 007CD788
                                                      • _free.LIBCMT ref: 007CD79A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 72cf81d91b0058771a90c69f1d9e3dd0c6307af2be4e458501e50a4a14c28a98
                                                      • Instruction ID: ea7f4c04a37592d4226da17255a5915d059589eccacc158cae59a5babb6eb6d3
                                                      • Opcode Fuzzy Hash: 72cf81d91b0058771a90c69f1d9e3dd0c6307af2be4e458501e50a4a14c28a98
                                                      • Instruction Fuzzy Hash: DEF01D72544304AF8631EB68F9CAE1A7BDDBB44711BA5082DF049E7512CB3CFC818E64
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 007F5C58
                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 007F5C6F
                                                      • MessageBeep.USER32(00000000), ref: 007F5C87
                                                      • KillTimer.USER32(?,0000040A), ref: 007F5CA3
                                                      • EndDialog.USER32(?,00000001), ref: 007F5CBD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                      • String ID:
                                                      • API String ID: 3741023627-0
                                                      • Opcode ID: fde09eebbfa4d5e5ba9167c6e2d5ee3679806079e3c2b4966fe6e36d1cf5cda6
                                                      • Instruction ID: f723b69c290a4284f45c7ecb2836ba5cfb8aca0b7466e9ea9d702540ab6a6e24
                                                      • Opcode Fuzzy Hash: fde09eebbfa4d5e5ba9167c6e2d5ee3679806079e3c2b4966fe6e36d1cf5cda6
                                                      • Instruction Fuzzy Hash: D8018670500B09ABEB305B50DD4EFBA77B8BF10B05F00555DA783A15E1DBF4A985CAA0
                                                      APIs
                                                      • _free.LIBCMT ref: 007C22BE
                                                        • Part of subcall function 007C29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000), ref: 007C29DE
                                                        • Part of subcall function 007C29C8: GetLastError.KERNEL32(00000000,?,007CD7D1,00000000,00000000,00000000,00000000,?,007CD7F8,00000000,00000007,00000000,?,007CDBF5,00000000,00000000), ref: 007C29F0
                                                      • _free.LIBCMT ref: 007C22D0
                                                      • _free.LIBCMT ref: 007C22E3
                                                      • _free.LIBCMT ref: 007C22F4
                                                      • _free.LIBCMT ref: 007C2305
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 8fb8695df2cdb82e55b22c91d0c68cef932115d2a04c8aa4ad5a02e464972b85
                                                      • Instruction ID: cccf5b1b0fa6628047e221acafad41eea2aebd12de54f9c0f0ecbb7f14d0538d
                                                      • Opcode Fuzzy Hash: 8fb8695df2cdb82e55b22c91d0c68cef932115d2a04c8aa4ad5a02e464972b85
                                                      • Instruction Fuzzy Hash: 30F03A708402209F8A12AF54BC09E093FA4F718761706251EF414E23B7CBB81912EFA8
                                                      APIs
                                                      • EndPath.GDI32(?), ref: 007A95D4
                                                      • StrokeAndFillPath.GDI32(?,?,007E71F7,00000000,?,?,?), ref: 007A95F0
                                                      • SelectObject.GDI32(?,00000000), ref: 007A9603
                                                      • DeleteObject.GDI32 ref: 007A9616
                                                      • StrokePath.GDI32(?), ref: 007A9631
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                                      • String ID:
                                                      • API String ID: 2625713937-0
                                                      • Opcode ID: c9bdfc99aeb837660bba4d23f1c151308243ebefad88b7691e80d985d2eb0f0b
                                                      • Instruction ID: e1d987cc094bc0c056b66cd8d03ad7f3f0b339c8d9227ac3e6db3af753f9160c
                                                      • Opcode Fuzzy Hash: c9bdfc99aeb837660bba4d23f1c151308243ebefad88b7691e80d985d2eb0f0b
                                                      • Instruction Fuzzy Hash: ACF08C31405604EBEF264F24EC1CBB83F64BB42322F488314F525550F2C7B489A2DFA0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: __freea$_free
                                                      • String ID: a/p$am/pm
                                                      • API String ID: 3432400110-3206640213
                                                      • Opcode ID: 3c45930e3ed7bdb636858c06d944d3b26b047fc8bc6db50f61335ffb0592f0fb
                                                      • Instruction ID: 1809bfa23de52f882b40e9b08f9f5ac67f05e28728775a4a2bbdcff6c0b88da9
                                                      • Opcode Fuzzy Hash: 3c45930e3ed7bdb636858c06d944d3b26b047fc8bc6db50f61335ffb0592f0fb
                                                      • Instruction Fuzzy Hash: 8CD1CF35A00286CADB249F68C855FBAB7B1FF07704FA8417DE901AB652D37D9D80CB91
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 007C8B6E
                                                      • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 007C8B7A
                                                      • __dosmaperr.LIBCMT ref: 007C8B81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                      • String ID: .{
                                                      • API String ID: 2434981716-1852962426
                                                      • Opcode ID: c6505a41c7eb48f080900e3ff6e93ed416fd2d8f3d939479bce011d3b48b98aa
                                                      • Instruction ID: f331ee36d80cf53ca6fdbd9faa851b22a7e23bfae06fe63449520c64917b4dcc
                                                      • Opcode Fuzzy Hash: c6505a41c7eb48f080900e3ff6e93ed416fd2d8f3d939479bce011d3b48b98aa
                                                      • Instruction Fuzzy Hash: 32419DF0604145AFDB649F24CC85FBD7FA5EB85300F2881AEF89587242DE39CC028B95
                                                      APIs
                                                        • Part of subcall function 007FB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007F21D0,?,?,00000034,00000800,?,00000034), ref: 007FB42D
                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 007F2760
                                                        • Part of subcall function 007FB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007F21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 007FB3F8
                                                        • Part of subcall function 007FB32A: GetWindowThreadProcessId.USER32(?,?), ref: 007FB355
                                                        • Part of subcall function 007FB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,007F2194,00000034,?,?,00001004,00000000,00000000), ref: 007FB365
                                                        • Part of subcall function 007FB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,007F2194,00000034,?,?,00001004,00000000,00000000), ref: 007FB37B
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007F27CD
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007F281A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                      • String ID: @
                                                      • API String ID: 4150878124-2766056989
                                                      • Opcode ID: 83876530c14217259200c6356314229801266c6eaebeeb8207d2c0ee7999f5e4
                                                      • Instruction ID: da626f5285d071faa05103576e1db59013f59330e4f83930e1b19990f3c9f7df
                                                      • Opcode Fuzzy Hash: 83876530c14217259200c6356314229801266c6eaebeeb8207d2c0ee7999f5e4
                                                      • Instruction Fuzzy Hash: 81412E7290021CAFDB10DFA4CD46AEEBBB8EF09740F104059FA55B7281DB746E45CBA1
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\ssd.exe,00000104), ref: 007C1769
                                                      • _free.LIBCMT ref: 007C1834
                                                      • _free.LIBCMT ref: 007C183E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _free$FileModuleName
                                                      • String ID: C:\Users\user\Desktop\ssd.exe
                                                      • API String ID: 2506810119-322681421
                                                      • Opcode ID: d4130ea71228e495bbe4b506abaa3646b594467d540498015dc22afedc9916ca
                                                      • Instruction ID: 0e3a1dc7ed5f80b08c94ef5ad30b9528731a34359b87e552975426576fd8fe94
                                                      • Opcode Fuzzy Hash: d4130ea71228e495bbe4b506abaa3646b594467d540498015dc22afedc9916ca
                                                      • Instruction Fuzzy Hash: 5E318475A44218EFDB21DF999C89E9EBBFCEB86310B54417EF404D7212D6B48E40CB90
                                                      APIs
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0082CC08,00000000,?,?,?,?), ref: 008244AA
                                                      • GetWindowLongW.USER32 ref: 008244C7
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008244D7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$Long
                                                      • String ID: SysTreeView32
                                                      • API String ID: 847901565-1698111956
                                                      • Opcode ID: 7c1505699b794451a3ec026a9bc7ee3c6cff2cd2a59cc93454e2f77cfc191718
                                                      • Instruction ID: 28b2117036ceb1d3c1b52b10cca20da895430fa480b57b39056ff406b64efd92
                                                      • Opcode Fuzzy Hash: 7c1505699b794451a3ec026a9bc7ee3c6cff2cd2a59cc93454e2f77cfc191718
                                                      • Instruction Fuzzy Hash: 3A319C71201215ABDF209E38EC45BEA7BA9FB08324F205315F975E21D0D774EC919B60
                                                      APIs
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 0082461F
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00824634
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: '$hW
                                                      • API String ID: 3850602802-2162195968
                                                      • Opcode ID: 5593837eb5513ffd4989385c3a9ec41e4b2ad9fd19c0fb5bc6e0bcd43cf98562
                                                      • Instruction ID: 00a4964598df136835bd8056418354f97085762d4c5b93b0dbb258c25dbe20e2
                                                      • Opcode Fuzzy Hash: 5593837eb5513ffd4989385c3a9ec41e4b2ad9fd19c0fb5bc6e0bcd43cf98562
                                                      • Instruction Fuzzy Hash: 2B313874A0121A9FDF14CFA9D981BDABBB5FF19300F14506AE904EB381D771A981CFA0
                                                      APIs
                                                        • Part of subcall function 0081335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00813077,?,?), ref: 00813378
                                                      • inet_addr.WSOCK32(?), ref: 0081307A
                                                      • _wcslen.LIBCMT ref: 0081309B
                                                      • htons.WSOCK32(00000000), ref: 00813106
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                      • String ID: 255.255.255.255
                                                      • API String ID: 946324512-2422070025
                                                      • Opcode ID: 6c500273897354b689946db32a85f020d1bcaba9aa95a287f11f8526255de2db
                                                      • Instruction ID: df30ddab7b2fb1622f722f5d30d3fa3e52f0596b13bde341db7922644507000e
                                                      • Opcode Fuzzy Hash: 6c500273897354b689946db32a85f020d1bcaba9aa95a287f11f8526255de2db
                                                      • Instruction Fuzzy Hash: D631A1356002059FDB20CF68C485EA977E8FF18318F248099E915DB392DB71EE85C760
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00823F40
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00823F54
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00823F78
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window
                                                      • String ID: SysMonthCal32
                                                      • API String ID: 2326795674-1439706946
                                                      • Opcode ID: 7beb1e4188354348551c1268b3c79cb2c83a8751ce720f2388f12ecb12914219
                                                      • Instruction ID: eed551f5131fc66b1a91a063a7e807f437a2708b6ff4fdc0c3e264c2b1269b47
                                                      • Opcode Fuzzy Hash: 7beb1e4188354348551c1268b3c79cb2c83a8751ce720f2388f12ecb12914219
                                                      • Instruction Fuzzy Hash: 5521BF32600229BBDF218F54EC46FEA3B75FF48724F110214FA15AB1D0DAB9AC95CB90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                      • API String ID: 176396367-2734436370
                                                      • Opcode ID: 60175930b631c6f0563cf5f56afcab699e807c1f0ee38df71ba2f5193b741503
                                                      • Instruction ID: b25e52b650acf198db8d2f7aaede2804ef34910d6299646cbf198d5cea58d20b
                                                      • Opcode Fuzzy Hash: 60175930b631c6f0563cf5f56afcab699e807c1f0ee38df71ba2f5193b741503
                                                      • Instruction Fuzzy Hash: 50215B72104525A6C731AB24EC06FB773ECEF91310F104026FB59D7282EB5DED51C295
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00823840
                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00823850
                                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00823876
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MoveWindow
                                                      • String ID: Listbox
                                                      • API String ID: 3315199576-2633736733
                                                      • Opcode ID: b1e77fa73ebe4af1c0523debc07ccc5e46f98107ff29c3a2307843fa9c236c07
                                                      • Instruction ID: 872e194d92a2c779bb3adcb4c9c401ae704b5e88e1bfcb3564b24e1d0787bdf0
                                                      • Opcode Fuzzy Hash: b1e77fa73ebe4af1c0523debc07ccc5e46f98107ff29c3a2307843fa9c236c07
                                                      • Instruction Fuzzy Hash: 4C218E72610228BFEF219F54EC85EBB376AFF89754F118124F9149B190C675DC928BA0
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00804A08
                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00804A5C
                                                      • SetErrorMode.KERNEL32(00000000,?,?,0082CC08), ref: 00804AD0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$InformationVolume
                                                      • String ID: %lu
                                                      • API String ID: 2507767853-685833217
                                                      • Opcode ID: 1dfd41ef653311c4a318eeecf9681afa6fc430e2919278a6f4ce8eb2c91f6c51
                                                      • Instruction ID: 71eeeea773c4d6cb3d9d3a0776ad93406c9961d05cfc2f2a237fbe42fe325330
                                                      • Opcode Fuzzy Hash: 1dfd41ef653311c4a318eeecf9681afa6fc430e2919278a6f4ce8eb2c91f6c51
                                                      • Instruction Fuzzy Hash: 36314C71A00119EFDB10DF64C885EAA7BF8FF09308F1480A9E909DB252D775EE46CB61
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0082424F
                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00824264
                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00824271
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: msctls_trackbar32
                                                      • API String ID: 3850602802-1010561917
                                                      • Opcode ID: 8e6abfe2f04356aebb56e5c356f1178b80861f7d2da04529bef89751c7a34ff9
                                                      • Instruction ID: 7f9b059427b039ba6c580b4902e66c176a70e4d61e5cad8bb3d55578c0878d6f
                                                      • Opcode Fuzzy Hash: 8e6abfe2f04356aebb56e5c356f1178b80861f7d2da04529bef89751c7a34ff9
                                                      • Instruction Fuzzy Hash: CA110231240218BEEF205F29DC06FAB3BACFF95B64F110124FA55E20E0D2B1DCA19B20
                                                      APIs
                                                        • Part of subcall function 00796B57: _wcslen.LIBCMT ref: 00796B6A
                                                        • Part of subcall function 007F2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 007F2DC5
                                                        • Part of subcall function 007F2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F2DD6
                                                        • Part of subcall function 007F2DA7: GetCurrentThreadId.KERNEL32 ref: 007F2DDD
                                                        • Part of subcall function 007F2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 007F2DE4
                                                      • GetFocus.USER32 ref: 007F2F78
                                                        • Part of subcall function 007F2DEE: GetParent.USER32(00000000), ref: 007F2DF9
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 007F2FC3
                                                      • EnumChildWindows.USER32(?,007F303B), ref: 007F2FEB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                      • String ID: %s%d
                                                      • API String ID: 1272988791-1110647743
                                                      • Opcode ID: 37da5d1dc45387eb4efbcb0e8dae95cb787ac64ad0db7a7601a065bfb21c2ed0
                                                      • Instruction ID: f22ab5bfad28fa38f56a2aad36bdcf81f412d27387f7deb4faefede5dee0c738
                                                      • Opcode Fuzzy Hash: 37da5d1dc45387eb4efbcb0e8dae95cb787ac64ad0db7a7601a065bfb21c2ed0
                                                      • Instruction Fuzzy Hash: 5311A5B1700209ABCF547F709C89EFD376AAF94304F048075FA099B353DE78994A8B60
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008258C1
                                                      • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008258EE
                                                      • DrawMenuBar.USER32(?), ref: 008258FD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Menu$InfoItem$Draw
                                                      • String ID: 0
                                                      • API String ID: 3227129158-4108050209
                                                      • Opcode ID: ba1b1edcad17f9953da13e6ebb96406d7069885e5fec714e595abe18d1a005a7
                                                      • Instruction ID: 090c677cb0ad9d8b08fe6c84af568d453e89b1d36e28aa3cd236768e15ff5957
                                                      • Opcode Fuzzy Hash: ba1b1edcad17f9953da13e6ebb96406d7069885e5fec714e595abe18d1a005a7
                                                      • Instruction Fuzzy Hash: 61018C31500228EFDB219F51EC48BAEBFB4FF85360F1080A9E849D6151DB308AC4EF21
                                                      APIs
                                                      • GetForegroundWindow.USER32(?,008618B0,0082A364,000000FC,?,00000000,00000000,?,?,?,007E76CF,?,?,?,?,?), ref: 00827805
                                                      • GetFocus.USER32 ref: 0082780D
                                                        • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                        • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                      • SendMessageW.USER32(00E4E868,000000B0,000001BC,000001C0), ref: 0082787A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$FocusForegroundMessageSend
                                                      • String ID: hW
                                                      • API String ID: 3601265619-1300829777
                                                      • Opcode ID: e1ffa15c57722fc7d566090666d1ec9819334aa6ebca444f1d6760fe62d52f9f
                                                      • Instruction ID: 959087a73f0afefa7ea6f801716ea81f532d943ff2fb6909996a7f168e53e81b
                                                      • Opcode Fuzzy Hash: e1ffa15c57722fc7d566090666d1ec9819334aa6ebca444f1d6760fe62d52f9f
                                                      • Instruction Fuzzy Hash: 81017C316011109FD725DB29E85DAB677E6FF8A320F19036DE115C72A1CB316C46CF90
                                                      APIs
                                                      • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 007ED3BF
                                                      • FreeLibrary.KERNEL32 ref: 007ED3E5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeLibraryProc
                                                      • String ID: GetSystemWow64DirectoryW$X64
                                                      • API String ID: 3013587201-2590602151
                                                      • Opcode ID: 638e484d46b4f59863a2c5406fc7921a452d492780807522d13acdd9275ad18c
                                                      • Instruction ID: 6783ed2285d3e07a9710962bbff66dc38842691a3cd55530665e77e82b42d006
                                                      • Opcode Fuzzy Hash: 638e484d46b4f59863a2c5406fc7921a452d492780807522d13acdd9275ad18c
                                                      • Instruction Fuzzy Hash: E9F0AB72807AA1DBC77112664C5893E3318FF1AB11B698355F612E6291DB2CCC8482E2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d8cafc303357f78443be7bd06fad0b130f3592d80df08f99a380858b738e3cd3
                                                      • Instruction ID: 2bdac5f637c3a7cb700077af051cb6e132dc135858e9cb56f18bfbb190dfd6aa
                                                      • Opcode Fuzzy Hash: d8cafc303357f78443be7bd06fad0b130f3592d80df08f99a380858b738e3cd3
                                                      • Instruction Fuzzy Hash: C8C13875A0020AEFDB14CFA4C898ABEB7B5FF48714F208598E605AB352D735ED41DB90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInitInitializeUninitialize
                                                      • String ID:
                                                      • API String ID: 1998397398-0
                                                      • Opcode ID: 72dbac0aaaa40420781bebe812a5c9c7f3c19e066bc9be97e9fb9bc783d3f151
                                                      • Instruction ID: becb205b14d91e64db8b49917d2313193dc44cb1a479c3d607c4e7c9c362af44
                                                      • Opcode Fuzzy Hash: 72dbac0aaaa40420781bebe812a5c9c7f3c19e066bc9be97e9fb9bc783d3f151
                                                      • Instruction Fuzzy Hash: 75A15C75208200DFCB14DF28D485A6AB7E9FF88714F058859F98ADB362DB34EE45CB91
                                                      APIs
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0082FC08,?), ref: 007F05F0
                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0082FC08,?), ref: 007F0608
                                                      • CLSIDFromProgID.OLE32(?,?,00000000,0082CC40,000000FF,?,00000000,00000800,00000000,?,0082FC08,?), ref: 007F062D
                                                      • _memcmp.LIBVCRUNTIME ref: 007F064E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: FromProg$FreeTask_memcmp
                                                      • String ID:
                                                      • API String ID: 314563124-0
                                                      • Opcode ID: 7188b0e6ac23ecb9f59ac57abdc56a5e41879b99b1e22d722397747187edd8f1
                                                      • Instruction ID: 1c93727aaa82403371f639cdf317c963a4afa0bcbf6dc3fba052054baa16f9ae
                                                      • Opcode Fuzzy Hash: 7188b0e6ac23ecb9f59ac57abdc56a5e41879b99b1e22d722397747187edd8f1
                                                      • Instruction Fuzzy Hash: 0A811971A00109EFCB04DF94C988DEEB7B9FF89315B204558E616EB251DB75AE06CBA0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: f404493e087296ae96afd02fda80a5b7cab1065a08292c891b058e4960df0956
                                                      • Instruction ID: 74cef0a22e21d37764e880a7797e4aecfc8770902acb2b6bc33ea99cbfb58e8b
                                                      • Opcode Fuzzy Hash: f404493e087296ae96afd02fda80a5b7cab1065a08292c891b058e4960df0956
                                                      • Instruction Fuzzy Hash: 64412536A00540FBDB25AAB89C4ABEE3BB4EF41730F54422BF41992392E67C88419261
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00811AFD
                                                      • WSAGetLastError.WSOCK32 ref: 00811B0B
                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00811B8A
                                                      • WSAGetLastError.WSOCK32 ref: 00811B94
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$socket
                                                      • String ID:
                                                      • API String ID: 1881357543-0
                                                      • Opcode ID: 8981d9a9d26266a60024e5dd18844fe08b78e595516320fb70c2acc0f14ee968
                                                      • Instruction ID: 43ea4a203e4e290b0eaba66784a8a18dcb8f620fae8c37e9e31b3116af9f9333
                                                      • Opcode Fuzzy Hash: 8981d9a9d26266a60024e5dd18844fe08b78e595516320fb70c2acc0f14ee968
                                                      • Instruction Fuzzy Hash: AD41D235600200AFDB20AF24D88AF6977E5EF49718F54C548F61A8F2D2D776ED818B90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d38806baa81ccccccf371fcb86e0e97442e0a6310a9e8ec58eb3ff18289edfd7
                                                      • Instruction ID: ae0544c8c7324c5d1948c058ea41047b5507a8cf52001c23db766e6c52dae8a9
                                                      • Opcode Fuzzy Hash: d38806baa81ccccccf371fcb86e0e97442e0a6310a9e8ec58eb3ff18289edfd7
                                                      • Instruction Fuzzy Hash: CB410876A04344FFD7289F78CC46FAABBB9EB88710F10452EF541DB282D7799A018780
                                                      APIs
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00805783
                                                      • GetLastError.KERNEL32(?,00000000), ref: 008057A9
                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 008057CE
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 008057FA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                      • String ID:
                                                      • API String ID: 3321077145-0
                                                      • Opcode ID: 7b9317d7ec6c646f36891e06bba9c603426aa6156255f4d787f8a78e22cbbdc4
                                                      • Instruction ID: 56a1cb4b625ec48848e65fc286534cc65d5a6fd48d375079bfbcff26cade7aaf
                                                      • Opcode Fuzzy Hash: 7b9317d7ec6c646f36891e06bba9c603426aa6156255f4d787f8a78e22cbbdc4
                                                      • Instruction Fuzzy Hash: F9410735614610DFCF15DF15D548A1EBBE2EF89320B19C498E84AAB362CB34FD01CB91
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,007B6D71,00000000,00000000,007B82D9,?,007B82D9,?,00000001,007B6D71,?,00000001,007B82D9,007B82D9), ref: 007CD910
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007CD999
                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 007CD9AB
                                                      • __freea.LIBCMT ref: 007CD9B4
                                                        • Part of subcall function 007C3820: RtlAllocateHeap.NTDLL(00000000,?,00861444,?,007AFDF5,?,?,0079A976,00000010,00861440,007913FC,?,007913C6,?,00791129), ref: 007C3852
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                      • String ID:
                                                      • API String ID: 2652629310-0
                                                      • Opcode ID: 39bea2d22807ee29739ba97aa967af0e89f6bfd3e894641ab22552928882788c
                                                      • Instruction ID: bdac8942d33a6d615343ad074f0efd54c83ce0ae769463bd6efa2dddb080c078
                                                      • Opcode Fuzzy Hash: 39bea2d22807ee29739ba97aa967af0e89f6bfd3e894641ab22552928882788c
                                                      • Instruction Fuzzy Hash: 3231A972A0020AABDB34DF65DC85EAE7BA5EB41310B05426CFC04D7291EB39ED51CBA0
                                                      APIs
                                                      • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 007FABF1
                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 007FAC0D
                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 007FAC74
                                                      • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 007FACC6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: d6a128844897bc370d683c5bb3a9995a6988a3f89cc88022aa9e38cfaef8a35e
                                                      • Instruction ID: df4777d6467e607ad501833310352ada1548b7d18afcbce412462cfabe4a2e1c
                                                      • Opcode Fuzzy Hash: d6a128844897bc370d683c5bb3a9995a6988a3f89cc88022aa9e38cfaef8a35e
                                                      • Instruction Fuzzy Hash: 9E3116B0A0465CBFEB348B658C087FE7BA6BB49310F04421AE689523D0C37D8985C772
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 008216EB
                                                        • Part of subcall function 007F3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F3A57
                                                        • Part of subcall function 007F3A3D: GetCurrentThreadId.KERNEL32 ref: 007F3A5E
                                                        • Part of subcall function 007F3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007F25B3), ref: 007F3A65
                                                      • GetCaretPos.USER32(?), ref: 008216FF
                                                      • ClientToScreen.USER32(00000000,?), ref: 0082174C
                                                      • GetForegroundWindow.USER32 ref: 00821752
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                      • String ID:
                                                      • API String ID: 2759813231-0
                                                      • Opcode ID: d0be3d68864b26dd24c1f6c21a9a0f1d050ded4b44cb83ecce158d0c0dbfb09c
                                                      • Instruction ID: e2c1cdd0b22015534ac2db8a3f9c1477a37f179ef19d37bb310800070b0adccb
                                                      • Opcode Fuzzy Hash: d0be3d68864b26dd24c1f6c21a9a0f1d050ded4b44cb83ecce158d0c0dbfb09c
                                                      • Instruction Fuzzy Hash: 26316172D00109AFCB00EFAAD885CAEB7F9FF88304B548069E415E7211EB359E45CBA0
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 007FD501
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 007FD50F
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 007FD52F
                                                      • CloseHandle.KERNEL32(00000000), ref: 007FD5DC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 420147892-0
                                                      • Opcode ID: 3952a34fa909831c892329778edb55f3a192afd8773634432c1920e2b79f9358
                                                      • Instruction ID: 0d489c860c6a58efff2ea05f20a90145d5df0d4f63e5a10a395194879a70808c
                                                      • Opcode Fuzzy Hash: 3952a34fa909831c892329778edb55f3a192afd8773634432c1920e2b79f9358
                                                      • Instruction Fuzzy Hash: B831A1710083049FD711EF64D885ABFBBE8FF99354F10092DF681832A1EB759949CBA2
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?,0082CB68), ref: 007FD2FB
                                                      • GetLastError.KERNEL32 ref: 007FD30A
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 007FD319
                                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0082CB68), ref: 007FD376
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                                      • String ID:
                                                      • API String ID: 2267087916-0
                                                      • Opcode ID: ccfa93a0f8f9bb38d8fc864d2fc5a2088190b29ad607a895f331fda06b82576b
                                                      • Instruction ID: bbac94718232e9e6193ce0b20a50c3365e0d16d0214ba955af25d44a6d8fddea
                                                      • Opcode Fuzzy Hash: ccfa93a0f8f9bb38d8fc864d2fc5a2088190b29ad607a895f331fda06b82576b
                                                      • Instruction Fuzzy Hash: 6B214871508205DF8720DF28D88587AB7E5BE5A324F104A1DF6A9C32A1EB359D46CB93
                                                      APIs
                                                        • Part of subcall function 007F1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007F102A
                                                        • Part of subcall function 007F1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007F1036
                                                        • Part of subcall function 007F1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1045
                                                        • Part of subcall function 007F1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007F104C
                                                        • Part of subcall function 007F1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007F1062
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007F15BE
                                                      • _memcmp.LIBVCRUNTIME ref: 007F15E1
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 007F1617
                                                      • HeapFree.KERNEL32(00000000), ref: 007F161E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                      • String ID:
                                                      • API String ID: 1592001646-0
                                                      • Opcode ID: 54b28301d112335057e3401facc1dac506cecbd1f53757bd13961c0768c1018a
                                                      • Instruction ID: bb1ff01d01db9411ebc7a86bd4e5bbde39d71b4f47cb0e2d75d53baebc4a250d
                                                      • Opcode Fuzzy Hash: 54b28301d112335057e3401facc1dac506cecbd1f53757bd13961c0768c1018a
                                                      • Instruction Fuzzy Hash: D3218931E00108EFDF10DFA4C949BFEB7B8EF44354F498459E541AB241EB39AA05CBA0
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 0082280A
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00822824
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00822832
                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00822840
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$AttributesLayered
                                                      • String ID:
                                                      • API String ID: 2169480361-0
                                                      • Opcode ID: a70af6b4e358c8e380a25c68b843d484a412324e78840b52fed0b87c60576d86
                                                      • Instruction ID: 2f6a5e980ed60f651754094ae9555e79638e87b69eb55b66331ac30aa2bb7bf5
                                                      • Opcode Fuzzy Hash: a70af6b4e358c8e380a25c68b843d484a412324e78840b52fed0b87c60576d86
                                                      • Instruction Fuzzy Hash: 0F219031208525BFD7149B24E845FAA7B95FF49324F148258F426CB6E2CB75EC82CB90
                                                      APIs
                                                        • Part of subcall function 007F8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,007F790A,?,000000FF,?,007F8754,00000000,?,0000001C,?,?), ref: 007F8D8C
                                                        • Part of subcall function 007F8D7D: lstrcpyW.KERNEL32(00000000,?,?,007F790A,?,000000FF,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F8DB2
                                                        • Part of subcall function 007F8D7D: lstrcmpiW.KERNEL32(00000000,?,007F790A,?,000000FF,?,007F8754,00000000,?,0000001C,?,?), ref: 007F8DE3
                                                      • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F7923
                                                      • lstrcpyW.KERNEL32(00000000,?,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F7949
                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,007F8754,00000000,?,0000001C,?,?,00000000), ref: 007F7984
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: lstrcmpilstrcpylstrlen
                                                      • String ID: cdecl
                                                      • API String ID: 4031866154-3896280584
                                                      • Opcode ID: 0691615a604737da692ea576e67ad8528272bbd226a149a9638f7e5d7cd2458c
                                                      • Instruction ID: 2efd1c7f64b1d5f9edb73bedca28d971195a0c8421e74bb15e000294466c8c1c
                                                      • Opcode Fuzzy Hash: 0691615a604737da692ea576e67ad8528272bbd226a149a9638f7e5d7cd2458c
                                                      • Instruction Fuzzy Hash: 9411293A200305ABDB259F34CC49D7A77A9FF85350B40812AFA42C73A4EB759811C791
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00827D0B
                                                      • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00827D2A
                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00827D42
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0080B7AD,00000000), ref: 00827D6B
                                                        • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$Long
                                                      • String ID:
                                                      • API String ID: 847901565-0
                                                      • Opcode ID: e0834365711ab521d5500d94fb941935415df3bb8f8f2f3020689817a9d6bbb1
                                                      • Instruction ID: e61e94a71934280f34621f31d5c2415608424896657cf8685f04033ec0db43d4
                                                      • Opcode Fuzzy Hash: e0834365711ab521d5500d94fb941935415df3bb8f8f2f3020689817a9d6bbb1
                                                      • Instruction Fuzzy Hash: 9E11AF31605625AFCB109F29EC08ABA3BA5FF45360B158728F939D72F0D7309991CB50
                                                      APIs
                                                      • SendMessageW.USER32(?,00001060,?,00000004), ref: 008256BB
                                                      • _wcslen.LIBCMT ref: 008256CD
                                                      • _wcslen.LIBCMT ref: 008256D8
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00825816
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend_wcslen
                                                      • String ID:
                                                      • API String ID: 455545452-0
                                                      • Opcode ID: 671d9fa24d79c10024f105deff1f538ced6a0147148ae24133d256b61a8e6ab5
                                                      • Instruction ID: 9580ba114db35a460aa99e384bd952381e1fec8b97963af23a42f51afb01273b
                                                      • Opcode Fuzzy Hash: 671d9fa24d79c10024f105deff1f538ced6a0147148ae24133d256b61a8e6ab5
                                                      • Instruction Fuzzy Hash: FC11D671640628E6DF209F65EC85AFE77ACFF10764B508026F915D6081E774D9C0CB64
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5d1d9116291f3bf625392743c4352ad5af5a87754d6127a94f8ecead1a3439bb
                                                      • Instruction ID: 8ff448bee66c02902c46854629027e3bd73dc1b30be42a9eeeecbaa1023661bd
                                                      • Opcode Fuzzy Hash: 5d1d9116291f3bf625392743c4352ad5af5a87754d6127a94f8ecead1a3439bb
                                                      • Instruction Fuzzy Hash: 99018FB2305A167EF62116786CC5F27671CEF423B8B75033DF522611E7DB689C0156A0
                                                      APIs
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 007F1A47
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F1A59
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F1A6F
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007F1A8A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 1cdc524048f3ac55799e3bfad62192923aaa1a3870017be290c062c386b039cd
                                                      • Instruction ID: 5a47171de14f4719f2f1bf5b11cebf853f023f0c7d15a2fdefdf77ccbdbd4e41
                                                      • Opcode Fuzzy Hash: 1cdc524048f3ac55799e3bfad62192923aaa1a3870017be290c062c386b039cd
                                                      • Instruction Fuzzy Hash: C611393AD01219FFEB10DBA5CD85FADBB78FB08750F604091EA00B7290D6716E50DB94
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 007FE1FD
                                                      • MessageBoxW.USER32(?,?,?,?), ref: 007FE230
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 007FE246
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 007FE24D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                      • String ID:
                                                      • API String ID: 2880819207-0
                                                      • Opcode ID: 3b8aa8cdd94e4d26ae2f935be9229c3ed2bb977d48edb6eb73da119b6ba301e4
                                                      • Instruction ID: 9be8e62d510130bb3115779cbd67d94ef22820cf0ee953cf8ac70a1b9617dcd6
                                                      • Opcode Fuzzy Hash: 3b8aa8cdd94e4d26ae2f935be9229c3ed2bb977d48edb6eb73da119b6ba301e4
                                                      • Instruction Fuzzy Hash: E8112B72904258BFDB119FA89C09ABE7FACBB45320F148615F915D3391E3B8CD0087A0
                                                      APIs
                                                      • CreateThread.KERNEL32(00000000,?,007BCFF9,00000000,00000004,00000000), ref: 007BD218
                                                      • GetLastError.KERNEL32 ref: 007BD224
                                                      • __dosmaperr.LIBCMT ref: 007BD22B
                                                      • ResumeThread.KERNEL32(00000000), ref: 007BD249
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                      • String ID:
                                                      • API String ID: 173952441-0
                                                      • Opcode ID: 881449cfb3698208a2118f556acfa75c9345b8200cb772ebede57fab89045a82
                                                      • Instruction ID: d2491451abcd09d99ba66d60cdfd2e6fe60374c026b0afd2eeb7af0e877b2284
                                                      • Opcode Fuzzy Hash: 881449cfb3698208a2118f556acfa75c9345b8200cb772ebede57fab89045a82
                                                      • Instruction Fuzzy Hash: FA019276805208BFDB316BA5DC0EBEE7A69FF81731F204219F925961D0EB798D01C7A1
                                                      APIs
                                                        • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                      • GetClientRect.USER32(?,?), ref: 00829F31
                                                      • GetCursorPos.USER32(?), ref: 00829F3B
                                                      • ScreenToClient.USER32(?,?), ref: 00829F46
                                                      • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00829F7A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Client$CursorLongProcRectScreenWindow
                                                      • String ID:
                                                      • API String ID: 4127811313-0
                                                      • Opcode ID: 7aec3685d80ee34fda9dcc207fb2e84733b6ccfa260db53e21de384c5284e0cd
                                                      • Instruction ID: d17fb3e55335ee5a8a90d542596ac25abb564b5d7dd70bffa6c14a9457cee82f
                                                      • Opcode Fuzzy Hash: 7aec3685d80ee34fda9dcc207fb2e84733b6ccfa260db53e21de384c5284e0cd
                                                      • Instruction Fuzzy Hash: 4811883290012AABCB10DFA8E9899FE77B8FF05301F004451F951E3140DB30BA82CBA1
                                                      APIs
                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0079604C
                                                      • GetStockObject.GDI32(00000011), ref: 00796060
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 0079606A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CreateMessageObjectSendStockWindow
                                                      • String ID:
                                                      • API String ID: 3970641297-0
                                                      • Opcode ID: 0778b88673381a5a199bdeb4fbd63218d24897fb115b7992bbda8b646914a6ef
                                                      • Instruction ID: 649f7ed021d05210978879e7beaf8fb5e47d7bcd81fd7d81fbd8d651ce7c3a7e
                                                      • Opcode Fuzzy Hash: 0778b88673381a5a199bdeb4fbd63218d24897fb115b7992bbda8b646914a6ef
                                                      • Instruction Fuzzy Hash: 74118072501508BFEF224FA8EC94EFABBA9FF187A4F044216FA1452110D736DC60DBA0
                                                      APIs
                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 007B3B56
                                                        • Part of subcall function 007B3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 007B3AD2
                                                        • Part of subcall function 007B3AA3: ___AdjustPointer.LIBCMT ref: 007B3AED
                                                      • _UnwindNestedFrames.LIBCMT ref: 007B3B6B
                                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 007B3B7C
                                                      • CallCatchBlock.LIBVCRUNTIME ref: 007B3BA4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                      • String ID:
                                                      • API String ID: 737400349-0
                                                      • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                      • Instruction ID: 74ef203f8404c04de63dca05f9643c6fa68434eee9a0fbc3489288d6a3aa2ded
                                                      • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                      • Instruction Fuzzy Hash: 34012972100148BBDF126E95CC46EEB7B6AFF48754F044014FE4896121C73AE9A1EBA0
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,007913C6,00000000,00000000,?,007C301A,007913C6,00000000,00000000,00000000,?,007C328B,00000006,FlsSetValue), ref: 007C30A5
                                                      • GetLastError.KERNEL32(?,007C301A,007913C6,00000000,00000000,00000000,?,007C328B,00000006,FlsSetValue,00832290,FlsSetValue,00000000,00000364,?,007C2E46), ref: 007C30B1
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,007C301A,007913C6,00000000,00000000,00000000,?,007C328B,00000006,FlsSetValue,00832290,FlsSetValue,00000000), ref: 007C30BF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3177248105-0
                                                      • Opcode ID: 077c00b71719fb22db1604b7adabce196b9fdbe67768ebfcdbe35ce79db5b6cd
                                                      • Instruction ID: 94430d53c4350698327f89ee7c31950224ba3f1146844ac23cc6739af6d14d51
                                                      • Opcode Fuzzy Hash: 077c00b71719fb22db1604b7adabce196b9fdbe67768ebfcdbe35ce79db5b6cd
                                                      • Instruction Fuzzy Hash: FA01FC33301626ABCB314B78AC44F67779ABF45B61B11872CF906D3140CB25D942C6D0
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 007F747F
                                                      • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 007F7497
                                                      • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 007F74AC
                                                      • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 007F74CA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Type$Register$FileLoadModuleNameUser
                                                      • String ID:
                                                      • API String ID: 1352324309-0
                                                      • Opcode ID: 6edfa34d43423e0f8be2fc731882d575b30c5048675656c36da5204b4d3ee4b6
                                                      • Instruction ID: e5a028c78039ed2585c85dc2b877a64bb51c90c581979d31e96c5f1a368362a5
                                                      • Opcode Fuzzy Hash: 6edfa34d43423e0f8be2fc731882d575b30c5048675656c36da5204b4d3ee4b6
                                                      • Instruction Fuzzy Hash: DC11ADB1205359ABE7309F14EC09BB67BFCFB00B10F108569E626D7291D7B4E904DBA1
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB0C4
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB0E9
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB0F3
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,007FACD3,?,00008000), ref: 007FB126
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CounterPerformanceQuerySleep
                                                      • String ID:
                                                      • API String ID: 2875609808-0
                                                      • Opcode ID: 26c2cd221654c55649fea01a75b8c5a2d7573b479792748e0c1359f0eabecb6c
                                                      • Instruction ID: 51ec25283e899556c58d85ba53db7cef61f08a6928e85138ecc0552e2a897357
                                                      • Opcode Fuzzy Hash: 26c2cd221654c55649fea01a75b8c5a2d7573b479792748e0c1359f0eabecb6c
                                                      • Instruction Fuzzy Hash: 59116D31C01A2CE7CF10AFE4E9696FEBF78FF49711F108086DA41B2281CB3896518B51
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 007F2DC5
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 007F2DD6
                                                      • GetCurrentThreadId.KERNEL32 ref: 007F2DDD
                                                      • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 007F2DE4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 2710830443-0
                                                      • Opcode ID: 0699c842ac0476aba4cbd690c3c1f70776f7ef2ceffb2166365ac8aeb7a189eb
                                                      • Instruction ID: 7e7ab9f835e1eedfd7dc54f57ec6be4f01340ca11954cc1a8e0ed6d52a237c17
                                                      • Opcode Fuzzy Hash: 0699c842ac0476aba4cbd690c3c1f70776f7ef2ceffb2166365ac8aeb7a189eb
                                                      • Instruction Fuzzy Hash: 71E06DB12016287BE7301B629C0EEFB7E6CFB52BA1F404119B206D11819AA88842C6B0
                                                      APIs
                                                        • Part of subcall function 007A9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007A9693
                                                        • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96A2
                                                        • Part of subcall function 007A9639: BeginPath.GDI32(?), ref: 007A96B9
                                                        • Part of subcall function 007A9639: SelectObject.GDI32(?,00000000), ref: 007A96E2
                                                      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00828887
                                                      • LineTo.GDI32(?,?,?), ref: 00828894
                                                      • EndPath.GDI32(?), ref: 008288A4
                                                      • StrokePath.GDI32(?), ref: 008288B2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                      • String ID:
                                                      • API String ID: 1539411459-0
                                                      • Opcode ID: 952a3dc8a85956eeb34b4c9382736e74a7f939caa93f2e84580034b2ff63f836
                                                      • Instruction ID: ba179a81d04382f52a6ebd9d61b7c1a74f78329970f9bec3771598d8d387597b
                                                      • Opcode Fuzzy Hash: 952a3dc8a85956eeb34b4c9382736e74a7f939caa93f2e84580034b2ff63f836
                                                      • Instruction Fuzzy Hash: 51F03A36042668FAEF225F94AC0EFDE3E59BF06310F448100FA11A50E2C7B55562CBE5
                                                      APIs
                                                      • GetSysColor.USER32(00000008), ref: 007A98CC
                                                      • SetTextColor.GDI32(?,?), ref: 007A98D6
                                                      • SetBkMode.GDI32(?,00000001), ref: 007A98E9
                                                      • GetStockObject.GDI32(00000005), ref: 007A98F1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Color$ModeObjectStockText
                                                      • String ID:
                                                      • API String ID: 4037423528-0
                                                      • Opcode ID: db6338ba68a7bcfb6b48a5f9367bb32339cbaf2dde66e654e5ec160ade8674c7
                                                      • Instruction ID: ab1bcd9601bbc3b16d26792a531a73e6530c3bf8084578ed03ac5591ef65d7cf
                                                      • Opcode Fuzzy Hash: db6338ba68a7bcfb6b48a5f9367bb32339cbaf2dde66e654e5ec160ade8674c7
                                                      • Instruction Fuzzy Hash: 20E06D31244680AADB315B75AC0ABED3F20BB56336F04C21AF6FA580E1C3B58661DB11
                                                      APIs
                                                      • GetCurrentThread.KERNEL32 ref: 007F1634
                                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,007F11D9), ref: 007F163B
                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007F11D9), ref: 007F1648
                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,007F11D9), ref: 007F164F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CurrentOpenProcessThreadToken
                                                      • String ID:
                                                      • API String ID: 3974789173-0
                                                      • Opcode ID: 91b8be9903b4e6eec883f4c7fe3444f20e2dbbf75ab3179d2539d724dff2583c
                                                      • Instruction ID: 8ae857bfc7ca525678e06b5106d195f85112775f79470164ab3b858658559435
                                                      • Opcode Fuzzy Hash: 91b8be9903b4e6eec883f4c7fe3444f20e2dbbf75ab3179d2539d724dff2583c
                                                      • Instruction Fuzzy Hash: A9E0E671601211DBD7301FA19D0DB6A7B7CFF55791F14C818F745DA090DA784446C754
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 007ED858
                                                      • GetDC.USER32(00000000), ref: 007ED862
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007ED882
                                                      • ReleaseDC.USER32(?), ref: 007ED8A3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: 6d737f29e1ee93a1dbe5f819c0542a82054ea8f905a06b2475c813938890e402
                                                      • Instruction ID: 7dc18fd9b4e662c75f8986f0b97e0a18407046fa0765d73edf094ec7b88e2ef7
                                                      • Opcode Fuzzy Hash: 6d737f29e1ee93a1dbe5f819c0542a82054ea8f905a06b2475c813938890e402
                                                      • Instruction Fuzzy Hash: 3EE01AB1800204DFCF619FA0D80C67DBBB2FB18710F14C009F806E7250D7384942AF40
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 007ED86C
                                                      • GetDC.USER32(00000000), ref: 007ED876
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 007ED882
                                                      • ReleaseDC.USER32(?), ref: 007ED8A3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: 4709104586180d889febfd370e1e110ea3b7dd635c32141a068c587c2ffa7e75
                                                      • Instruction ID: 26318164d91b549577329d7ffa8b5a8e68778aed791330b2f99100973c68a6da
                                                      • Opcode Fuzzy Hash: 4709104586180d889febfd370e1e110ea3b7dd635c32141a068c587c2ffa7e75
                                                      • Instruction Fuzzy Hash: A6E092B5C00204EFCF61AFA0D80C66EBBB6FB58711B149449F94AE7250DB385902AF90
                                                      APIs
                                                        • Part of subcall function 00797620: _wcslen.LIBCMT ref: 00797625
                                                      • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00804ED4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Connection_wcslen
                                                      • String ID: *$LPT
                                                      • API String ID: 1725874428-3443410124
                                                      • Opcode ID: 2884cff8d50785375820a53e9b630d72385329b000b86a2cffd78a4025fcd11f
                                                      • Instruction ID: 7f2dd9ff25f8f9d5d444f28604d637ffcd86b4f8b31426f700451e023d25b605
                                                      • Opcode Fuzzy Hash: 2884cff8d50785375820a53e9b630d72385329b000b86a2cffd78a4025fcd11f
                                                      • Instruction Fuzzy Hash: E5915EB5A04205DFCB54DF54C884EAABBF1FF44304F159099E90A9B3A2CB35ED85CB91
                                                      APIs
                                                      • __startOneArgErrorHandling.LIBCMT ref: 007BE30D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandling__start
                                                      • String ID: pow
                                                      • API String ID: 3213639722-2276729525
                                                      • Opcode ID: 68936689cbb8b4e2b684cfa9c1b3b2e2432e773bba4b49791ebb556f56df96a8
                                                      • Instruction ID: 1b2470f50562bee5b3c8127742f9986658c23543adb2cdb64525791d99035a10
                                                      • Opcode Fuzzy Hash: 68936689cbb8b4e2b684cfa9c1b3b2e2432e773bba4b49791ebb556f56df96a8
                                                      • Instruction Fuzzy Hash: 6E512961A0C60296CB197714C945BFA3BE8BB50741F348D6CE096833A9EF3D8C95DE86
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #
                                                      • API String ID: 0-1885708031
                                                      • Opcode ID: eb253bba222dc651e4e37b186e1c83610d7665dbd63806dbf99a16a45944bfd2
                                                      • Instruction ID: 1d441742a6b82f36fce7762cc61817deea475513ed6297e82074bdb61db0d636
                                                      • Opcode Fuzzy Hash: eb253bba222dc651e4e37b186e1c83610d7665dbd63806dbf99a16a45944bfd2
                                                      • Instruction Fuzzy Hash: 7F513435501286DFDF25DF29C485ABA7BA4FFAA310F248559FC919B2C0D63C9D42CBA0
                                                      APIs
                                                      • Sleep.KERNEL32(00000000), ref: 007AF2A2
                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 007AF2BB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: GlobalMemorySleepStatus
                                                      • String ID: @
                                                      • API String ID: 2783356886-2766056989
                                                      • Opcode ID: 6a53db1df7cfd15c2bd80e0a95e5d9d18e95bca14c3d83f5797eccd01f3c88e6
                                                      • Instruction ID: 64da553f5b4a3ee07643f61f6f5067a6f3013538241bf21f043bb36a76c79113
                                                      • Opcode Fuzzy Hash: 6a53db1df7cfd15c2bd80e0a95e5d9d18e95bca14c3d83f5797eccd01f3c88e6
                                                      • Instruction Fuzzy Hash: BA516772418744DBDB20AF14EC8ABAFBBF8FB85300F81885CF1D941095EB748569CB66
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 008157E0
                                                      • _wcslen.LIBCMT ref: 008157EC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper_wcslen
                                                      • String ID: CALLARGARRAY
                                                      • API String ID: 157775604-1150593374
                                                      • Opcode ID: aaa0b9dfc3092200a6def810e3b7551ebf857673e79a791d9cbf6e1f34a6e526
                                                      • Instruction ID: f71176ef81a41e9b5ac0c537e10ef4d6f5562707acd245e556f585c354258f19
                                                      • Opcode Fuzzy Hash: aaa0b9dfc3092200a6def810e3b7551ebf857673e79a791d9cbf6e1f34a6e526
                                                      • Instruction Fuzzy Hash: 76418C31A00209DFCB14DFA9C8869FEBBB9FF99724F104169E505E7291E7349D81CBA0
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 0080D130
                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0080D13A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CrackInternet_wcslen
                                                      • String ID: |
                                                      • API String ID: 596671847-2343686810
                                                      • Opcode ID: 8e41848927b717492749ab17e87c1199ca0f40206e90b1c11b264b192c72f8db
                                                      • Instruction ID: 819c1fef96cca6512c7fd9359c783528300538ab935c47c8cd7ea8cea3c118b9
                                                      • Opcode Fuzzy Hash: 8e41848927b717492749ab17e87c1199ca0f40206e90b1c11b264b192c72f8db
                                                      • Instruction Fuzzy Hash: 22311971D00209EBCF15EFA4DC89AEEBFB9FF04340F000119F815A6162EB35AA06CB60
                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?,?), ref: 00823621
                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0082365C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$DestroyMove
                                                      • String ID: static
                                                      • API String ID: 2139405536-2160076837
                                                      • Opcode ID: 9d6e741baf29a05a43986afe71400cc041b0b31020e01460cb2c70eacdc7d212
                                                      • Instruction ID: 56420c82864c857ae2b3a5e9274d8d6900e80c78e796ffc51634dd90d313c317
                                                      • Opcode Fuzzy Hash: 9d6e741baf29a05a43986afe71400cc041b0b31020e01460cb2c70eacdc7d212
                                                      • Instruction Fuzzy Hash: CD318F71110614AEDB209F28EC90EBB73A9FF98724F109619F8A5D7280DA35AD91D760
                                                      APIs
                                                        • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                        • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                      • GetParent.USER32(?), ref: 007E73A3
                                                      • DefDlgProcW.USER32(?,00000133,?,?,?,?), ref: 007E742D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$ParentProc
                                                      • String ID: hW
                                                      • API String ID: 2181805148-1300829777
                                                      • Opcode ID: 43ced1c0b19cf1286a8c52a7d289421a0326e8a82662be747924188b375f8239
                                                      • Instruction ID: c869a2ba4e03e32762f51739cebc672f8ca16b29f3e1c56fbce7583b10d03006
                                                      • Opcode Fuzzy Hash: 43ced1c0b19cf1286a8c52a7d289421a0326e8a82662be747924188b375f8239
                                                      • Instruction Fuzzy Hash: 9F21AD30601184AFCF299F29C8499F93BA6EF8B360F084355FA254B2E2C3389D21DA50
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0082327C
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00823287
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: Combobox
                                                      • API String ID: 3850602802-2096851135
                                                      • Opcode ID: 3cfa0041a918a5a84baa68a3b33a1a6295e4f56a32f6f3dfa058fc5b6e0ed017
                                                      • Instruction ID: c19874b9e845657c378395590919058a9fa0ed8f2f6f18c519255929f67e5c80
                                                      • Opcode Fuzzy Hash: 3cfa0041a918a5a84baa68a3b33a1a6295e4f56a32f6f3dfa058fc5b6e0ed017
                                                      • Instruction Fuzzy Hash: 1111E271300218BFEF219E54EC94EBB3B6AFB943A5F104129F918E7290D6399D918760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CreateMenuPopup
                                                      • String ID: hW
                                                      • API String ID: 3826294624-1300829777
                                                      • Opcode ID: 886e63c76c1491b6e1a37a9f6d66bf4b36729164741185d6f92128c542584efc
                                                      • Instruction ID: dacd06fb750960909973e1b2d54b5ed1ad43b6dfc9e1290e0d75cb9c07d4f57c
                                                      • Opcode Fuzzy Hash: 886e63c76c1491b6e1a37a9f6d66bf4b36729164741185d6f92128c542584efc
                                                      • Instruction Fuzzy Hash: 3A218C34604214DFCB20CF28E455B96BBE5FB0A325F49805AE859CB352D335BE82DF51
                                                      APIs
                                                        • Part of subcall function 0079600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0079604C
                                                        • Part of subcall function 0079600E: GetStockObject.GDI32(00000011), ref: 00796060
                                                        • Part of subcall function 0079600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0079606A
                                                      • GetWindowRect.USER32(00000000,?), ref: 0082377A
                                                      • GetSysColor.USER32(00000012), ref: 00823794
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                      • String ID: static
                                                      • API String ID: 1983116058-2160076837
                                                      • Opcode ID: 1c945fd04aab8e2b4e9d8741cad16498faf273975c60a9be3dd92ff05f55250d
                                                      • Instruction ID: 476b28e78ee812caa609133232d2c1193d0176faa6232ea4b352e42abfd08d30
                                                      • Opcode Fuzzy Hash: 1c945fd04aab8e2b4e9d8741cad16498faf273975c60a9be3dd92ff05f55250d
                                                      • Instruction Fuzzy Hash: 9B1129B2610219AFDF10DFA8DC45EFE7BB9FB08314F004525F955E2250E779E8519B50
                                                      APIs
                                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 008261FC
                                                      • SendMessageW.USER32(?,00000194,00000000,00000000), ref: 00826225
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: hW
                                                      • API String ID: 3850602802-1300829777
                                                      • Opcode ID: 89836f3979f42caad94ff30bc6c5e323c30119f9e1d6f61d3e7ddb6e1d80529f
                                                      • Instruction ID: 3e63f3b83ec41867b91761ecbb2ee38dcc4108356a81680076aef774efa5e09b
                                                      • Opcode Fuzzy Hash: 89836f3979f42caad94ff30bc6c5e323c30119f9e1d6f61d3e7ddb6e1d80529f
                                                      • Instruction Fuzzy Hash: 2111B271140228FFEF108F68EC59FB93BA4FB05314F004115FA26DA1D1E2B0EAA0DB50
                                                      APIs
                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0080CD7D
                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0080CDA6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Internet$OpenOption
                                                      • String ID: <local>
                                                      • API String ID: 942729171-4266983199
                                                      • Opcode ID: 56501e12a4de5330303eebd0b2567d867b346eb86ef16b5e1e94dba6158479e6
                                                      • Instruction ID: c4d8fc1b5ae6d607e762ea3716b5fcb2d30cda9e23fd6c55dccafe2774fa3dd3
                                                      • Opcode Fuzzy Hash: 56501e12a4de5330303eebd0b2567d867b346eb86ef16b5e1e94dba6158479e6
                                                      • Instruction Fuzzy Hash: A311A371215635BED7B44F668C45EF7BE69FF127A4F004326B909C31C0E6649845D6F0
                                                      APIs
                                                      • GetWindowTextLengthW.USER32(00000000), ref: 008234AB
                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008234BA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: LengthMessageSendTextWindow
                                                      • String ID: edit
                                                      • API String ID: 2978978980-2167791130
                                                      • Opcode ID: 5eeff508d21d567d826de16ae7ebf24370f7bf8f83bd527ebac3b436e0195417
                                                      • Instruction ID: 138c8761fc68c0d632bb9d0219267a30d46d8ce6b1569f8f5c403058d54a5ab8
                                                      • Opcode Fuzzy Hash: 5eeff508d21d567d826de16ae7ebf24370f7bf8f83bd527ebac3b436e0195417
                                                      • Instruction Fuzzy Hash: 4411BF71100128ABEF216E64EC54ABB3B6AFB24378F504364FA60D31D0C779DD919B68
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 008247EA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: InfoItemMenu
                                                      • String ID: 0$hW
                                                      • API String ID: 1619232296-580508736
                                                      • Opcode ID: 28a7a57173e3b63cbe3977bdd6dbc2e3bf33238a95eee3fcbca8046209bc6470
                                                      • Instruction ID: 085eeab2bc16fb63e45d222bbbe190a3604ef07fa94f957ad9aae9ba5dab5ce9
                                                      • Opcode Fuzzy Hash: 28a7a57173e3b63cbe3977bdd6dbc2e3bf33238a95eee3fcbca8046209bc6470
                                                      • Instruction Fuzzy Hash: EB118B34960198EFDB20DF48E850AE877F6FB0A305F94A067E856DB251C731AD83DA74
                                                      APIs
                                                      • SendMessageW.USER32(?,?,?,?), ref: 00824FCC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: hW
                                                      • API String ID: 3850602802-1300829777
                                                      • Opcode ID: 5508647f30559930df781b92ed3fec23efd9af2db3e46ce0c50fe7f33d1d32aa
                                                      • Instruction ID: 80a5037b55f731acdef36416e430ee42f7f4e976d644119c33ff6d3f2b5e35ff
                                                      • Opcode Fuzzy Hash: 5508647f30559930df781b92ed3fec23efd9af2db3e46ce0c50fe7f33d1d32aa
                                                      • Instruction Fuzzy Hash: 2C21D07AA1012AEFCF15CFA8D9448EA7BB9FB4D344B004154FA05E7360D631E961EBA0
                                                      APIs
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                      • CharUpperBuffW.USER32(?,?,?), ref: 007F6CB6
                                                      • _wcslen.LIBCMT ref: 007F6CC2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharUpper
                                                      • String ID: STOP
                                                      • API String ID: 1256254125-2411985666
                                                      • Opcode ID: 4ddc2e1e09125ad1a425e2deafaaf2de7ff81d266a650836538402331de8596d
                                                      • Instruction ID: 683588fcbf434ca7dcb0ce7d18724b8cca4c0c02ccb85b24b4dbc8873c352235
                                                      • Opcode Fuzzy Hash: 4ddc2e1e09125ad1a425e2deafaaf2de7ff81d266a650836538402331de8596d
                                                      • Instruction Fuzzy Hash: 2501263270052A9BCF20AFFDDC949BF73B4FB617107000528EAA293295EB39E804C660
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: hW
                                                      • API String ID: 0-1300829777
                                                      • Opcode ID: 0a9794e9a2a1b084420034f1a59e536a3fd76bfef9b0ade4c62f193ccbab7ff4
                                                      • Instruction ID: f2f161bf49ae40051ddd4671d1d4e47f6d3e1f66e16cf9676d8aa6fc2314c172
                                                      • Opcode Fuzzy Hash: 0a9794e9a2a1b084420034f1a59e536a3fd76bfef9b0ade4c62f193ccbab7ff4
                                                      • Instruction Fuzzy Hash: F8118F35601604AFCB24DF19C884EA5BBE6FF89320F158219FA258B3A0C775ED41CF90
                                                      APIs
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                        • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 007F1D4C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: 987b66fe8dab1d1b01e25c3d730787f7c4d520ff8b561a203721219e4eecb3a5
                                                      • Instruction ID: a35a45f7ea954f98d71f5aab71628208fe3f5dd06029c01a09aac447cb2ea2de
                                                      • Opcode Fuzzy Hash: 987b66fe8dab1d1b01e25c3d730787f7c4d520ff8b561a203721219e4eecb3a5
                                                      • Instruction Fuzzy Hash: 4301B571701218EB9F14EBA4DC59CFE73B8FB56360F44091EAA32673D1EA395908C670
                                                      APIs
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                        • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 007F1C46
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: a0e2ec4efed4c1f733741d271993e225e0500ae417df8ee5e40d56c34b32ab53
                                                      • Instruction ID: 79cd98f64539424afc9bc0ed86f27c75d21b319ef23002e7c6b929eab789810a
                                                      • Opcode Fuzzy Hash: a0e2ec4efed4c1f733741d271993e225e0500ae417df8ee5e40d56c34b32ab53
                                                      • Instruction Fuzzy Hash: B901A77568110CE6DF14EBA4DD69DFF77A89B12340F54001DAA16773C1EA289E0CC6B1
                                                      APIs
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                        • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 007F1CC8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: 57180678dbd98f1fc99445c4eeaf7f950ba1e2458cce5e9a679ba180bec5c6e2
                                                      • Instruction ID: 1797e5b7f96d57c8e21981343347e23c1b86737cdf9b2e5877a69474f7a17720
                                                      • Opcode Fuzzy Hash: 57180678dbd98f1fc99445c4eeaf7f950ba1e2458cce5e9a679ba180bec5c6e2
                                                      • Instruction Fuzzy Hash: E001DB71A4011CE7DF14EBA5DE15EFE77A8AB11340F540019BA1273381EA299F08C671
                                                      APIs
                                                        • Part of subcall function 00799CB3: _wcslen.LIBCMT ref: 00799CBD
                                                        • Part of subcall function 007F3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 007F3CCA
                                                      • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 007F1DD3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: 4b4245cf5c396a72b579ff53d773c37ff02c3494e78ab9149069ba5f01eadd10
                                                      • Instruction ID: 230cd29f0aa3690de7c6681ab96e2c4ab472052c994f3b3bc53db75dc6be913a
                                                      • Opcode Fuzzy Hash: 4b4245cf5c396a72b579ff53d773c37ff02c3494e78ab9149069ba5f01eadd10
                                                      • Instruction Fuzzy Hash: FDF0A971B41218E6DF14E7A5DC59EFE7778AB02350F44091DBA32633C1DA685908C271
                                                      APIs
                                                        • Part of subcall function 007A9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007A9BB2
                                                      • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,007E769C,?,?,?), ref: 00829111
                                                        • Part of subcall function 007A9944: GetWindowLongW.USER32(?,000000EB), ref: 007A9952
                                                      • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 008290F7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$MessageProcSend
                                                      • String ID: hW
                                                      • API String ID: 982171247-1300829777
                                                      • Opcode ID: 82a3fa7102d0aa428454b550479b6a5f5a377df7435fda80d471d4b896cf3d17
                                                      • Instruction ID: b0c9fd73e3c8908803841ff10ab242910002f668be719153cb492ad82494ed14
                                                      • Opcode Fuzzy Hash: 82a3fa7102d0aa428454b550479b6a5f5a377df7435fda80d471d4b896cf3d17
                                                      • Instruction Fuzzy Hash: 6A01D430100228FBDB219F15EC4DFA67BA6FF86365F140168F9918B2E1C7726CA5CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: 3, 3, 16, 1
                                                      • API String ID: 176396367-3042988571
                                                      • Opcode ID: 2e0b1b8745d89c07aa5c8dc4e0b259426896168835ef83008eeb3fa94c415ec1
                                                      • Instruction ID: 7eaeed67d993a5841a7449fc8971d7b5067847596be7aad9b0a49975ab4573cb
                                                      • Opcode Fuzzy Hash: 2e0b1b8745d89c07aa5c8dc4e0b259426896168835ef83008eeb3fa94c415ec1
                                                      • Instruction Fuzzy Hash: 71E02B422042206093311279ACC5AFF569DEFC97A0714182FF981C2267EA989DD193A5
                                                      APIs
                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 007F0B23
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: AutoIt$Error allocating memory.
                                                      • API String ID: 2030045667-4017498283
                                                      • Opcode ID: 108a4e8c0efa99f1587c6b1efc9153fd0fc9da88303d82ed518743576d3b3d67
                                                      • Instruction ID: cb4acf06fea1841e82f6a5cd4c2f9b54c95ac680113d91c675999978849da1cf
                                                      • Opcode Fuzzy Hash: 108a4e8c0efa99f1587c6b1efc9153fd0fc9da88303d82ed518743576d3b3d67
                                                      • Instruction Fuzzy Hash: 29E0D831244318AAD22036D47C07F9D7AC4DF05B51F100466FB58956C38AE9649006E9
                                                      APIs
                                                        • Part of subcall function 007AF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,007B0D71,?,?,?,0079100A), ref: 007AF7CE
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,0079100A), ref: 007B0D75
                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0079100A), ref: 007B0D84
                                                      Strings
                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 007B0D7F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                      • API String ID: 55579361-631824599
                                                      • Opcode ID: c7c9c8787d553fd1690e14eaa90b8c720391bcb72139990ca5c0db59b0318963
                                                      • Instruction ID: 0f444fe215b3e5e9297a2355cdfc3fc98f3384fd4cddb92ccb103d491989860f
                                                      • Opcode Fuzzy Hash: c7c9c8787d553fd1690e14eaa90b8c720391bcb72139990ca5c0db59b0318963
                                                      • Instruction Fuzzy Hash: 4AE039742003118BD7309FA8E4083967BF0FB00740F018A2DE482C6692DBB8E485CBD1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: LocalTime
                                                      • String ID: %.3d$X64
                                                      • API String ID: 481472006-1077770165
                                                      • Opcode ID: 1f1483404cc33f1dbd66dacf2565b29f4fa8a804c2e90d909f912d3828b7662f
                                                      • Instruction ID: 024f023edb2cb0e06106a9e3ab918785cddcfe0e37c986ad8b78773d6d103d26
                                                      • Opcode Fuzzy Hash: 1f1483404cc33f1dbd66dacf2565b29f4fa8a804c2e90d909f912d3828b7662f
                                                      • Instruction Fuzzy Hash: E3D012A180A148E9CB7097E1DD498BAB37CFB4D341F508452FA16E1040D62CCD086761
                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0082232C
                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0082233F
                                                        • Part of subcall function 007FE97B: Sleep.KERNEL32 ref: 007FE9F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: 36007830800275cc06a0169619c0c4e48e04680b6c68c60c7c94045046c05542
                                                      • Instruction ID: 171d1e66da8aa8da75d4195de7836ff97b3e12d8dd9e8da2b47a63ede3f65305
                                                      • Opcode Fuzzy Hash: 36007830800275cc06a0169619c0c4e48e04680b6c68c60c7c94045046c05542
                                                      • Instruction Fuzzy Hash: EBD0A932390300B6E2B4AB309C0FFEA6A04BB00B00F008A167705AA2E0C8F4A8028A10
                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0082236C
                                                      • PostMessageW.USER32(00000000), ref: 00822373
                                                        • Part of subcall function 007FE97B: Sleep.KERNEL32 ref: 007FE9F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: 4804e7bb71a4d1d427ea56754c6355f809b068711b7b92750428e03e46a45e08
                                                      • Instruction ID: ce53e60186df15dd93e3dfe62d3df5e96b13a2decb46665d0ebaa99cfd6bbc2b
                                                      • Opcode Fuzzy Hash: 4804e7bb71a4d1d427ea56754c6355f809b068711b7b92750428e03e46a45e08
                                                      • Instruction Fuzzy Hash: 34D0C932391710BAE6B4AB709C0FFDA6615BB14B11F408A167755EA2E0D9F4B8068A54
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 007CBE93
                                                      • GetLastError.KERNEL32 ref: 007CBEA1
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007CBEFC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1725476672.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                                                      • Associated: 00000000.00000002.1725460360.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.000000000082C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725534162.0000000000852000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725580116.000000000085C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1725598434.0000000000864000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_790000_ssd.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                      • String ID:
                                                      • API String ID: 1717984340-0
                                                      • Opcode ID: a7c5839a6a6a3a2c645723a44979097a3b68f6dacc785474cefd3bfae193a3c2
                                                      • Instruction ID: f2a073a2eae75c8ba818b7af1c5a280cbd7290c4f3304bacf9e2b5088783a8a7
                                                      • Opcode Fuzzy Hash: a7c5839a6a6a3a2c645723a44979097a3b68f6dacc785474cefd3bfae193a3c2
                                                      • Instruction Fuzzy Hash: BB41D235600216EFDF218FA5CC8AFBE7BA5AF41720F14416DF9599B2A1DB388D05CB60