Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nnn.exe

Overview

General Information

Sample name:nnn.exe
Analysis ID:1578009
MD5:674524d2048c49e12fa30e6f42ead69a
SHA1:d7a6349ab0c08e0825c7ab0b7e65c719ebcdc9a6
SHA256:b03db0564666573fc8c78762884386005dd29e7f39d76e008e36dea70bc7f2e7
Tags:exeuser-mamrmtsh
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Found API chain indicative of sandbox detection
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • nnn.exe (PID: 7256 cmdline: "C:\Users\user\Desktop\nnn.exe" MD5: 674524D2048C49E12FA30E6F42EAD69A)
    • RegSvcs.exe (PID: 7308 cmdline: "C:\Users\user\Desktop\nnn.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.pgsu.co.id", "Username": "joko.wahyono@pgsu.co.id", "Password": "Vecls16@Vezs           "}
SourceRuleDescriptionAuthorStrings
00000001.00000002.4161444744.0000000002639000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.4160397848.00000000005B2000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.4160397848.00000000005B2000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1726912638.00000000014C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.nnn.exe.14c0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.nnn.exe.14c0000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.nnn.exe.14c0000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x316d7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31749:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x317d3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x31865:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x318cf:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x31941:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x319d7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31a67:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.nnn.exe.14c0000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.nnn.exe.14c0000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 4 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 107.178.108.41, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7308, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 1.2.RegSvcs.exe.5b0000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.pgsu.co.id", "Username": "joko.wahyono@pgsu.co.id", "Password": "Vecls16@Vezs "}
                    Source: nnn.exeVirustotal: Detection: 29%Perma Link
                    Source: nnn.exeReversingLabs: Detection: 50%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: nnn.exeJoe Sandbox ML: detected
                    Source: nnn.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: Binary string: wntdll.pdbUGP source: nnn.exe, 00000000.00000003.1726269624.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, nnn.exe, 00000000.00000003.1722135943.0000000003DF0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: nnn.exe, 00000000.00000003.1726269624.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, nnn.exe, 00000000.00000003.1722135943.0000000003DF0000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EEDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00EEDBBE
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF68EE FindFirstFileW,FindClose,0_2_00EF68EE
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00EF698F
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EED076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EED076
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EED3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EED3A9
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EF9642
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EF979D
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00EF9B2B
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00EF5C97
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 107.178.108.41:587
                    Source: Joe Sandbox ViewIP Address: 107.178.108.41 107.178.108.41
                    Source: Joe Sandbox ViewASN Name: IOFLOODUS IOFLOODUS
                    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 107.178.108.41:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EFCE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00EFCE44
                    Source: global trafficDNS traffic detected: DNS query: mail.pgsu.co.id
                    Source: RegSvcs.exe, 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.pgsu.co.id
                    Source: RegSvcs.exe, 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pgsu.co.id
                    Source: RegSvcs.exe, 00000001.00000002.4160575138.0000000000924000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.or
                    Source: RegSvcs.exe, 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4163043040.00000000057EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
                    Source: RegSvcs.exe, 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4163043040.00000000057EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                    Source: RegSvcs.exe, 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4160754639.0000000000977000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4163043040.00000000057EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: RegSvcs.exe, 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4160754639.0000000000977000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4163043040.00000000057EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: nnn.exe, 00000000.00000002.1726912638.00000000014C0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4160397848.00000000005B2000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.nnn.exe.14c0000.1.raw.unpack, cPKWk.cs.Net Code: gdCwU6rsZ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EFEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00EFEAFF
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EFED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00EFED6A
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EFEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00EFEAFF
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EEAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00EEAA57
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00F19576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00F19576

                    System Summary

                    barindex
                    Source: 0.2.nnn.exe.14c0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.nnn.exe.14c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.RegSvcs.exe.5b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1726912638.00000000014C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: nnn.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: nnn.exe, 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_4c9415c7-e
                    Source: nnn.exe, 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_8ed2a35b-3
                    Source: nnn.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f665ec9d-c
                    Source: nnn.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_c341c1a8-2
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EED5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00EED5EB
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EE1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00EE1201
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EEE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00EEE8F6
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E880600_2_00E88060
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF20460_2_00EF2046
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EE82980_2_00EE8298
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EBE4FF0_2_00EBE4FF
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EB676B0_2_00EB676B
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00F148730_2_00F14873
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E8CAF00_2_00E8CAF0
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EACAA00_2_00EACAA0
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E9CC390_2_00E9CC39
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EB6DD90_2_00EB6DD9
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E9D0630_2_00E9D063
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E891C00_2_00E891C0
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E9B1190_2_00E9B119
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA13940_2_00EA1394
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA17060_2_00EA1706
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA781B0_2_00EA781B
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA19B00_2_00EA19B0
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E9997D0_2_00E9997D
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E879200_2_00E87920
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA7A4A0_2_00EA7A4A
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA7CA70_2_00EA7CA7
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA1C770_2_00EA1C77
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EB9EEE0_2_00EB9EEE
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00F0BE440_2_00F0BE44
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA1F320_2_00EA1F32
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_017504780_2_01750478
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00CA93801_2_00CA9380
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00CA4AA01_2_00CA4AA0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00CA9B481_2_00CA9B48
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00CACDC81_2_00CACDC8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00CA3E881_2_00CA3E88
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00CA41D01_2_00CA41D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00CAF4C01_2_00CAF4C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_058EDD101_2_058EDD10
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_058EBCF81_2_058EBCF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_058E3F401_2_058E3F40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_058E56C81_2_058E56C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_058E00401_2_058E0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_058E8B721_2_058E8B72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_058E2AF01_2_058E2AF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_058E4FE81_2_058E4FE8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_058E32381_2_058E3238
                    Source: C:\Users\user\Desktop\nnn.exeCode function: String function: 00EA0A30 appears 46 times
                    Source: C:\Users\user\Desktop\nnn.exeCode function: String function: 00E9F9F2 appears 31 times
                    Source: nnn.exe, 00000000.00000003.1722728782.00000000040BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs nnn.exe
                    Source: nnn.exe, 00000000.00000003.1724847047.0000000003F13000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs nnn.exe
                    Source: nnn.exe, 00000000.00000002.1726912638.00000000014C0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef1a08a05-b195-4d04-8a01-a86b7545550f.exe4 vs nnn.exe
                    Source: nnn.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 0.2.nnn.exe.14c0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.nnn.exe.14c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.2.RegSvcs.exe.5b0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1726912638.00000000014C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.nnn.exe.14c0000.1.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.nnn.exe.14c0000.1.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.nnn.exe.14c0000.1.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.nnn.exe.14c0000.1.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.nnn.exe.14c0000.1.raw.unpack, 6oQOw74dfIt.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.nnn.exe.14c0000.1.raw.unpack, aMIWm.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.nnn.exe.14c0000.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.nnn.exe.14c0000.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@3/1
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF37B5 GetLastError,FormatMessageW,0_2_00EF37B5
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EE10BF AdjustTokenPrivileges,CloseHandle,0_2_00EE10BF
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EE16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00EE16C3
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00EF51CD
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00F0A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00F0A67C
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00EF648E
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E842A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00E842A2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\nnn.exeFile created: C:\Users\user\AppData\Local\Temp\aut489E.tmpJump to behavior
                    Source: nnn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: nnn.exeVirustotal: Detection: 29%
                    Source: nnn.exeReversingLabs: Detection: 50%
                    Source: unknownProcess created: C:\Users\user\Desktop\nnn.exe "C:\Users\user\Desktop\nnn.exe"
                    Source: C:\Users\user\Desktop\nnn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\nnn.exe"
                    Source: C:\Users\user\Desktop\nnn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\nnn.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: nnn.exeStatic file information: File size 1179136 > 1048576
                    Source: nnn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: nnn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: nnn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: nnn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: nnn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: nnn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: nnn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: nnn.exe, 00000000.00000003.1726269624.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, nnn.exe, 00000000.00000003.1722135943.0000000003DF0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: nnn.exe, 00000000.00000003.1726269624.0000000003F90000.00000004.00001000.00020000.00000000.sdmp, nnn.exe, 00000000.00000003.1722135943.0000000003DF0000.00000004.00001000.00020000.00000000.sdmp
                    Source: nnn.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: nnn.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: nnn.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: nnn.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: nnn.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E842DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E842DE
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA0A76 push ecx; ret 0_2_00EA0A89
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_058E3AD7 push ebx; retf 1_2_058E3ADA
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E9F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00E9F98E
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00F11C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00F11C41
                    Source: C:\Users\user\Desktop\nnn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\nnn.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96380
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\nnn.exeAPI/Special instruction interceptor: Address: 175009C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2054Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7757Jump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeAPI coverage: 4.0 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EEDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00EEDBBE
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF68EE FindFirstFileW,FindClose,0_2_00EF68EE
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00EF698F
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EED076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EED076
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EED3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EED3A9
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EF9642
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EF979D
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00EF9B2B
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00EF5C97
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E842DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E842DE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99563Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99438Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98969Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97745Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97625Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97516Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97395Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97266Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97105Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96848Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96719Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95485Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94577Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94434Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94307Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 93969Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 93860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 93735Jump to behavior
                    Source: RegSvcs.exe, 00000001.00000002.4163043040.00000000057EC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EFEAA2 BlockInput,0_2_00EFEAA2
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EB2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00EB2622
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E842DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E842DE
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA4CE8 mov eax, dword ptr fs:[00000030h]0_2_00EA4CE8
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_01750368 mov eax, dword ptr fs:[00000030h]0_2_01750368
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_01750308 mov eax, dword ptr fs:[00000030h]0_2_01750308
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_0174ECE8 mov eax, dword ptr fs:[00000030h]0_2_0174ECE8
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EE0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00EE0B62
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EB2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00EB2622
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00EA083F
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA09D5 SetUnhandledExceptionFilter,0_2_00EA09D5
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00EA0C21
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\nnn.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 38C008Jump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EE1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00EE1201
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EC2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00EC2BA5
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EEB226 SendInput,keybd_event,0_2_00EEB226
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00F022DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00F022DA
                    Source: C:\Users\user\Desktop\nnn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\nnn.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EE0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00EE0B62
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EE1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00EE1663
                    Source: nnn.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: nnn.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EA0698 cpuid 0_2_00EA0698
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EF8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00EF8195
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EDD27A GetUserNameW,0_2_00EDD27A
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00EBBB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00EBBB6F
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00E842DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E842DE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: nnn.exe, 00000000.00000002.1727184472.0000000001899000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcupdate.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.nnn.exe.14c0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nnn.exe.14c0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.5b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.4161444744.0000000002639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4160397848.00000000005B2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726912638.00000000014C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4161444744.00000000025C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: nnn.exe PID: 7256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7308, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: nnn.exeBinary or memory string: WIN_81
                    Source: nnn.exeBinary or memory string: WIN_XP
                    Source: nnn.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                    Source: nnn.exeBinary or memory string: WIN_XPe
                    Source: nnn.exeBinary or memory string: WIN_VISTA
                    Source: nnn.exeBinary or memory string: WIN_7
                    Source: nnn.exeBinary or memory string: WIN_8
                    Source: Yara matchFile source: 0.2.nnn.exe.14c0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nnn.exe.14c0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.5b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.4160397848.00000000005B2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726912638.00000000014C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4161444744.00000000025C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: nnn.exe PID: 7256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7308, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.nnn.exe.14c0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nnn.exe.14c0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.5b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.4161444744.0000000002639000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4160397848.00000000005B2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1726912638.00000000014C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4161444744.00000000025C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: nnn.exe PID: 7256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7308, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00F01204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00F01204
                    Source: C:\Users\user\Desktop\nnn.exeCode function: 0_2_00F01806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00F01806
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    221
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS138
                    System Information Discovery
                    Distributed Component Object Model221
                    Input Capture
                    1
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets341
                    Security Software Discovery
                    SSH4
                    Clipboard Data
                    11
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts221
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials221
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    nnn.exe29%VirustotalBrowse
                    nnn.exe50%ReversingLabsWin32.Trojan.AutoitInject
                    nnn.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://pgsu.co.id0%Avira URL Cloudsafe
                    http://r10.i.lencr.or0%Avira URL Cloudsafe
                    http://mail.pgsu.co.id0%Avira URL Cloudsafe
                    http://r10.o.lencr.org0#0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    pgsu.co.id
                    107.178.108.41
                    truetrue
                      unknown
                      mail.pgsu.co.id
                      unknown
                      unknowntrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://pgsu.co.idRegSvcs.exe, 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://r10.o.lencr.org0#RegSvcs.exe, 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4163043040.00000000057EC000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://account.dyn.com/nnn.exe, 00000000.00000002.1726912638.00000000014C0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4160397848.00000000005B2000.00000040.80000000.00040000.00000000.sdmpfalse
                          high
                          http://mail.pgsu.co.idRegSvcs.exe, 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://r10.i.lencr.orRegSvcs.exe, 00000001.00000002.4160575138.0000000000924000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://x1.c.lencr.org/0RegSvcs.exe, 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4160754639.0000000000977000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4163043040.00000000057EC000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://x1.i.lencr.org/0RegSvcs.exe, 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4160754639.0000000000977000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4163043040.00000000057EC000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://r10.i.lencr.org/0RegSvcs.exe, 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4163043040.00000000057EC000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                107.178.108.41
                                pgsu.co.idUnited States
                                53755IOFLOODUStrue
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1578009
                                Start date and time:2024-12-19 04:59:04 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 7m 54s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:6
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:nnn.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@3/2@3/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 49
                                • Number of non-executed functions: 304
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.63, 20.109.210.53
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                TimeTypeDescription
                                23:00:02API Interceptor11925570x Sleep call for process: RegSvcs.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                107.178.108.41ssd.exeGet hashmaliciousAgentTeslaBrowse
                                  newrfq.exeGet hashmaliciousAgentTeslaBrowse
                                    mp.exeGet hashmaliciousAgentTeslaBrowse
                                      ttp.exeGet hashmaliciousAgentTeslaBrowse
                                        06.exeGet hashmaliciousAgentTeslaBrowse
                                          sdfg.exeGet hashmaliciousAgentTeslaBrowse
                                            pmm.exeGet hashmaliciousAgentTeslaBrowse
                                              Q7bAgeTZB8vmku7.exeGet hashmaliciousAgentTeslaBrowse
                                                QcgYuePXfjXfcUD.exeGet hashmaliciousAgentTeslaBrowse
                                                  XXKPgtA6DfbWnGL.exeGet hashmaliciousAgentTeslaBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    IOFLOODUSssd.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 107.178.108.41
                                                    SqWzv6g2gV.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    RXnQXC1eJa.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    37O0XUq6Vp.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    tO8laPAv1k.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    nPcYcCBa00.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    JLrciUppSu.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    122046760.batGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    pkqLAMAv96.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    IIC0XbKFjS.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 104.161.43.18
                                                    No context
                                                    No context
                                                    Process:C:\Users\user\Desktop\nnn.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):151562
                                                    Entropy (8bit):7.908808024915831
                                                    Encrypted:false
                                                    SSDEEP:3072:z6NVbwW4RTZDhRxABX56C+6VcuXXwFN6aHqNrq4gfURHZQ:2NVr8hGUB6Dt9qxcRHq
                                                    MD5:3F11144B624779E9002C15AB41F6051E
                                                    SHA1:4C38395DA3819D33637C0F72727D70CFC63A1D87
                                                    SHA-256:13CAC0BD87D1194457A58234DB84AD400FC59AE24AC5A119A57CAEDA2D0CF1D4
                                                    SHA-512:65DB4DFF74D4D38F7AF04B6BBF731C4FDCD89D1F6D199562F73019C8FC36CBC255E82DD4E46B52546A6D8A2050AA5B4F2DA145BEABE5FFEBFD0B99EB6B721112
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:EA06......;.y...E...T....K.M*.*.&eR.M.....X..jT.@..i.... .X....F.{...h.|..+Q..-.I,.M;....J..y*.......O%.Wg7(,..r..*...".A..,f....o.:\......5..Ujt.D.H.M...lS>...^...d.`..J.G.........5.`....$.....#e4.P..z...B..$.....cw=...#. ..\. ._7^oD...~@..E..4...v..`B@.;f..g.`......U....2..,|6..^eo..d...b)@..1@..4...P........Q.S.t.eR...:Z%..H.B<t.....K.B.,>O........Z.......K.N..,.........U..kU.../Q...8..#.Ig&o..T..)^..;......[_....\nV.kf.M;0....b..v.>~....bg.)].W..y...%fiI..g...{U.v!.;.NM..`hS.t......}.-:!...}.......S8..c..{R.... .....K4.Md^:F.p.4.X,._....g.....U.]er..I...kt.'.O....1...1 .,&.....p..n....~..M.7.8..l..........0...Xm.5.W'.........U./.....9..t>G..[....6._<..[.D.a&..3c..6.+..e..0..2.L..*..d.o......Zm@.P(...&...@6....eo..;..ZG..ka3.......L...q:T].......|........~].......I.n}..P'.)...=.Pj6H.F'..N.uiP.v)...2c<...4JE.UR...Yln.2.m.RJ%J.8....xE..0...4..'7.P/.z,.-J.....D.P..U*..m..Z.......xMj5z...,.L.J%Z.e..f..J.b._...L..H..h...L.P"q..viW.X@..E.E......
                                                    Process:C:\Users\user\Desktop\nnn.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):240128
                                                    Entropy (8bit):6.62695684717245
                                                    Encrypted:false
                                                    SSDEEP:6144:97zoQGyY5le4gIk3sjJa+N/Stf1YWRnmRT9jCtcmdRxdLtm8i4KVUo4N1Oju:NzoxyYve4gIssjwc/Stf1YWRnmRT9jCB
                                                    MD5:935B78428A4A27D67AE0DFA0BD11E615
                                                    SHA1:81292227E5045274B982469F34A5ECE33917753E
                                                    SHA-256:0DBF363D16D066A8CCF25C30B37BD36F91665A7706D32F0E2FC7691B2E018F5A
                                                    SHA-512:5BBFD02B14AAF48083EA5993E162665198BA832893081FC8E9B4B9E6EC9DFBE9E833119F030A673023F15723CC29487BFF6D1C807352B2D6D540B9E39970AFBA
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:...77DRECKZJ..RK.4WRAI2R.74DREGKZJA9RKH4WRAI2RH74DREGKZJA9RK.4WROV.\H.=.s.F..k.Q;8hD%=&;S?hTU*<*3k8/aK'%h]9r..ar%XP!|HJA~JA9RKH4..AI~SK7..s#GKZJA9RK.4USJH9RH.7DRMGKZJA9L.K4WrAI2.K74D.EGkZJA;RKL4WRAI2RL74DREGKZJE9RIH4WRAI0R..4DBEG[ZJA9BKH$WRAI2RX74DREGKZJA9..K4.RAI2.K7rAREGKZJA9RKH4WRAI2RH.7D^EGKZJA9RKH4WRAI2RH74DREGKZJA9RKH4WRAI2RH74DREGKZJA9RkH4_RAI2RH74DREOkZJ.9RKH4WRAI2RfCQ<&EGK~.B9RkH4W.BI2PH74DREGKZJA9RKh4W2o;A +74D.@GKZ.B9RMH4W.BI2RH74DREGKZJ.9R.fF2>.*2RD74DR.DKZHA9R.K4WRAI2RH74DRE.KZ.A9RKH4WRAI2RH74DR.DKZJA9.KH4URDI..J7.tSEDKZJ@9RMH4WRAI2RH74DREGKZJA9RKH4WRAI2RH74DREGKZJA9RKH4WR\...|z.8yA8M...,.7..R.+.x;.G.<_..._....f<4..7.Kb..S...>.<R+@.....$Y4I#.=n63.U....t.&.|.B<.=...?..%N..{..tk...J3....M..+[:| 9B>-.g%4$5".H.8RKH4.......]<..jHUTu+*...u[J...,EGK>JA9 KH46RAIuRH7[DRE)KZJ?9RK64WR.I2R.74DeEGK.JA9?KH4sRAILRH7.9]J...#2..KH4WRt..b.Z.....|...#.6o5j...6.|..W..D2.6z....Y."~._e_Bq..L[LE<PLL7[oO....6@V@EL^IM.\...s.o..q...#....0.ERKH4WR.I2.H74..E.KZJ.9.K.WRA..R.7.D...K
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):6.851802124828
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:nnn.exe
                                                    File size:1'179'136 bytes
                                                    MD5:674524d2048c49e12fa30e6f42ead69a
                                                    SHA1:d7a6349ab0c08e0825c7ab0b7e65c719ebcdc9a6
                                                    SHA256:b03db0564666573fc8c78762884386005dd29e7f39d76e008e36dea70bc7f2e7
                                                    SHA512:9d80559a64b453f02ec432553f9d781317924cd24e962af2ee2c024829441d45ae64381aeca4b6d7a5d819959c177fe35a7fb4398327684c126d3b2ab254c9ff
                                                    SSDEEP:24576:5qDEvCTbMWu7rQYlBQcBiT6rprG8aUEveu5+TS:5TvC/MTQYxsWR7aUEB+T
                                                    TLSH:AF45BF0373918022FE9BD9331B56E615DBBD6E160123AF5F1B981D7AB9F0060173EA63
                                                    File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                    Icon Hash:0131719696496713
                                                    Entrypoint:0x420577
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x67635812 [Wed Dec 18 23:17:38 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:1
                                                    File Version Major:5
                                                    File Version Minor:1
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:1
                                                    Import Hash:948cc502fe9226992dce9417f952fce3
                                                    Instruction
                                                    call 00007FFAC0D93EC3h
                                                    jmp 00007FFAC0D937CFh
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    push dword ptr [ebp+08h]
                                                    mov esi, ecx
                                                    call 00007FFAC0D939ADh
                                                    mov dword ptr [esi], 0049FDF0h
                                                    mov eax, esi
                                                    pop esi
                                                    pop ebp
                                                    retn 0004h
                                                    and dword ptr [ecx+04h], 00000000h
                                                    mov eax, ecx
                                                    and dword ptr [ecx+08h], 00000000h
                                                    mov dword ptr [ecx+04h], 0049FDF8h
                                                    mov dword ptr [ecx], 0049FDF0h
                                                    ret
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    push dword ptr [ebp+08h]
                                                    mov esi, ecx
                                                    call 00007FFAC0D9397Ah
                                                    mov dword ptr [esi], 0049FE0Ch
                                                    mov eax, esi
                                                    pop esi
                                                    pop ebp
                                                    retn 0004h
                                                    and dword ptr [ecx+04h], 00000000h
                                                    mov eax, ecx
                                                    and dword ptr [ecx+08h], 00000000h
                                                    mov dword ptr [ecx+04h], 0049FE14h
                                                    mov dword ptr [ecx], 0049FE0Ch
                                                    ret
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    mov esi, ecx
                                                    lea eax, dword ptr [esi+04h]
                                                    mov dword ptr [esi], 0049FDD0h
                                                    and dword ptr [eax], 00000000h
                                                    and dword ptr [eax+04h], 00000000h
                                                    push eax
                                                    mov eax, dword ptr [ebp+08h]
                                                    add eax, 04h
                                                    push eax
                                                    call 00007FFAC0D9656Dh
                                                    pop ecx
                                                    pop ecx
                                                    mov eax, esi
                                                    pop esi
                                                    pop ebp
                                                    retn 0004h
                                                    lea eax, dword ptr [ecx+04h]
                                                    mov dword ptr [ecx], 0049FDD0h
                                                    push eax
                                                    call 00007FFAC0D965B8h
                                                    pop ecx
                                                    ret
                                                    push ebp
                                                    mov ebp, esp
                                                    push esi
                                                    mov esi, ecx
                                                    lea eax, dword ptr [esi+04h]
                                                    mov dword ptr [esi], 0049FDD0h
                                                    push eax
                                                    call 00007FFAC0D965A1h
                                                    test byte ptr [ebp+08h], 00000001h
                                                    pop ecx
                                                    Programming Language:
                                                    • [ C ] VS2008 SP1 build 30729
                                                    • [IMP] VS2008 SP1 build 30729
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x493ac.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x11e0000x7594.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0xd40000x493ac0x494004cc117b02db774d06e62296d264fcdceFalse0.764515118387372data7.186464582872443IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x11e0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0xd44580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                    RT_ICON0xd45800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                    RT_ICON0xd46a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                    RT_ICON0xd47d00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 4838 x 4838 px/mEnglishGreat Britain0.06979770495682007
                                                    RT_MENU0xe4ff80x50dataEnglishGreat Britain0.9
                                                    RT_STRING0xe50480x594dataEnglishGreat Britain0.3333333333333333
                                                    RT_STRING0xe55dc0x68adataEnglishGreat Britain0.2735961768219833
                                                    RT_STRING0xe5c680x490dataEnglishGreat Britain0.3715753424657534
                                                    RT_STRING0xe60f80x5fcdataEnglishGreat Britain0.3087467362924282
                                                    RT_STRING0xe66f40x65cdataEnglishGreat Britain0.34336609336609336
                                                    RT_STRING0xe6d500x466dataEnglishGreat Britain0.3605683836589698
                                                    RT_STRING0xe71b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                    RT_RCDATA0xe73100x35b7fdata1.0003454058746268
                                                    RT_GROUP_ICON0x11ce900x14dataEnglishGreat Britain1.25
                                                    RT_GROUP_ICON0x11cea40x14dataEnglishGreat Britain1.25
                                                    RT_GROUP_ICON0x11ceb80x14dataEnglishGreat Britain1.15
                                                    RT_GROUP_ICON0x11cecc0x14dataEnglishGreat Britain1.25
                                                    RT_VERSION0x11cee00xdcdataEnglishGreat Britain0.6181818181818182
                                                    RT_MANIFEST0x11cfbc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                    DLLImport
                                                    WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                    MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                    WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                    PSAPI.DLLGetProcessMemoryInfo
                                                    IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                    USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                    UxTheme.dllIsThemeActive
                                                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                    USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                    GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                    SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                    OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishGreat Britain
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 19, 2024 05:00:06.134247065 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:06.254090071 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:06.254273891 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:07.444377899 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:07.445389032 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:07.565089941 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:07.825557947 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:07.825783968 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:07.945614100 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:08.208023071 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:08.216794014 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:08.336509943 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:08.609569073 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:08.609622955 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:08.609663963 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:08.609668970 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:08.658283949 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:08.801166058 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:08.920731068 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:09.181873083 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:09.201853991 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:09.321832895 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:09.581747055 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:09.582634926 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:09.702219009 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:09.963105917 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:09.963409901 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:10.082983971 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:10.347291946 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:10.347621918 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:10.467459917 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:10.727585077 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:10.728064060 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:10.847822905 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:11.177880049 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:11.178102016 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:11.297769070 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:11.557923079 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:11.558649063 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:11.558832884 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:11.558832884 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:11.558832884 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:00:11.678662062 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:11.678731918 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:11.678766966 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:11.678796053 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:12.011750937 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:00:12.063622952 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:01:43.267781019 CET49730587192.168.2.4107.178.108.41
                                                    Dec 19, 2024 05:01:43.387484074 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:01:43.649033070 CET58749730107.178.108.41192.168.2.4
                                                    Dec 19, 2024 05:01:43.655827999 CET49730587192.168.2.4107.178.108.41
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 19, 2024 05:00:03.255337000 CET4939453192.168.2.41.1.1.1
                                                    Dec 19, 2024 05:00:04.251239061 CET4939453192.168.2.41.1.1.1
                                                    Dec 19, 2024 05:00:05.267054081 CET4939453192.168.2.41.1.1.1
                                                    Dec 19, 2024 05:00:06.064115047 CET53493941.1.1.1192.168.2.4
                                                    Dec 19, 2024 05:00:06.064176083 CET53493941.1.1.1192.168.2.4
                                                    Dec 19, 2024 05:00:06.064205885 CET53493941.1.1.1192.168.2.4
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Dec 19, 2024 05:00:03.255337000 CET192.168.2.41.1.1.10xf712Standard query (0)mail.pgsu.co.idA (IP address)IN (0x0001)false
                                                    Dec 19, 2024 05:00:04.251239061 CET192.168.2.41.1.1.10xf712Standard query (0)mail.pgsu.co.idA (IP address)IN (0x0001)false
                                                    Dec 19, 2024 05:00:05.267054081 CET192.168.2.41.1.1.10xf712Standard query (0)mail.pgsu.co.idA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Dec 19, 2024 05:00:06.064115047 CET1.1.1.1192.168.2.40xf712No error (0)mail.pgsu.co.idpgsu.co.idCNAME (Canonical name)IN (0x0001)false
                                                    Dec 19, 2024 05:00:06.064115047 CET1.1.1.1192.168.2.40xf712No error (0)pgsu.co.id107.178.108.41A (IP address)IN (0x0001)false
                                                    Dec 19, 2024 05:00:06.064176083 CET1.1.1.1192.168.2.40xf712No error (0)mail.pgsu.co.idpgsu.co.idCNAME (Canonical name)IN (0x0001)false
                                                    Dec 19, 2024 05:00:06.064176083 CET1.1.1.1192.168.2.40xf712No error (0)pgsu.co.id107.178.108.41A (IP address)IN (0x0001)false
                                                    Dec 19, 2024 05:00:06.064205885 CET1.1.1.1192.168.2.40xf712No error (0)mail.pgsu.co.idpgsu.co.idCNAME (Canonical name)IN (0x0001)false
                                                    Dec 19, 2024 05:00:06.064205885 CET1.1.1.1192.168.2.40xf712No error (0)pgsu.co.id107.178.108.41A (IP address)IN (0x0001)false
                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                    Dec 19, 2024 05:00:07.444377899 CET58749730107.178.108.41192.168.2.4220-grogolvps.padinet.com ESMTP Exim 4.98 #2 Thu, 19 Dec 2024 11:00:07 +0700
                                                    220-We do not authorize the use of this system to transport unsolicited,
                                                    220 and/or bulk e-mail.
                                                    Dec 19, 2024 05:00:07.445389032 CET49730587192.168.2.4107.178.108.41EHLO 835180
                                                    Dec 19, 2024 05:00:07.825557947 CET58749730107.178.108.41192.168.2.4250-grogolvps.padinet.com Hello 835180 [8.46.123.189]
                                                    250-SIZE 52428800
                                                    250-LIMITS MAILMAX=1000 RCPTMAX=50000
                                                    250-8BITMIME
                                                    250-PIPELINING
                                                    250-PIPECONNECT
                                                    250-AUTH PLAIN LOGIN
                                                    250-STARTTLS
                                                    250 HELP
                                                    Dec 19, 2024 05:00:07.825783968 CET49730587192.168.2.4107.178.108.41STARTTLS
                                                    Dec 19, 2024 05:00:08.208023071 CET58749730107.178.108.41192.168.2.4220 TLS go ahead

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:22:59:58
                                                    Start date:18/12/2024
                                                    Path:C:\Users\user\Desktop\nnn.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\nnn.exe"
                                                    Imagebase:0xe80000
                                                    File size:1'179'136 bytes
                                                    MD5 hash:674524D2048C49E12FA30E6F42EAD69A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1726912638.00000000014C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1726912638.00000000014C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1726912638.00000000014C0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:23:00:01
                                                    Start date:18/12/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\nnn.exe"
                                                    Imagebase:0x1e0000
                                                    File size:45'984 bytes
                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4161444744.0000000002639000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4161444744.000000000260E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4160397848.00000000005B2000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4160397848.00000000005B2000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4161444744.00000000025C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4161444744.00000000025C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:high
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:3.2%
                                                      Dynamic/Decrypted Code Coverage:0.9%
                                                      Signature Coverage:2.8%
                                                      Total number of Nodes:1990
                                                      Total number of Limit Nodes:52
                                                      execution_graph 95073 e81cad SystemParametersInfoW 95074 eb8402 95079 eb81be 95074->95079 95077 eb842a 95084 eb81ef try_get_first_available_module 95079->95084 95081 eb83ee 95098 eb27ec 26 API calls pre_c_initialization 95081->95098 95083 eb8343 95083->95077 95091 ec0984 95083->95091 95087 eb8338 95084->95087 95094 ea8e0b 40 API calls 2 library calls 95084->95094 95086 eb838c 95086->95087 95095 ea8e0b 40 API calls 2 library calls 95086->95095 95087->95083 95097 eaf2d9 20 API calls __dosmaperr 95087->95097 95089 eb83ab 95089->95087 95096 ea8e0b 40 API calls 2 library calls 95089->95096 95099 ec0081 95091->95099 95093 ec099f 95093->95077 95094->95086 95095->95089 95096->95087 95097->95081 95098->95083 95100 ec008d ___BuildCatchObject 95099->95100 95101 ec009b 95100->95101 95104 ec00d4 95100->95104 95156 eaf2d9 20 API calls __dosmaperr 95101->95156 95103 ec00a0 95157 eb27ec 26 API calls pre_c_initialization 95103->95157 95110 ec065b 95104->95110 95109 ec00aa __fread_nolock 95109->95093 95111 ec0678 95110->95111 95112 ec068d 95111->95112 95113 ec06a6 95111->95113 95173 eaf2c6 20 API calls __dosmaperr 95112->95173 95159 eb5221 95113->95159 95116 ec06ab 95117 ec06cb 95116->95117 95118 ec06b4 95116->95118 95172 ec039a CreateFileW 95117->95172 95175 eaf2c6 20 API calls __dosmaperr 95118->95175 95122 ec06b9 95176 eaf2d9 20 API calls __dosmaperr 95122->95176 95124 ec0781 GetFileType 95125 ec078c GetLastError 95124->95125 95126 ec07d3 95124->95126 95179 eaf2a3 20 API calls __dosmaperr 95125->95179 95181 eb516a 21 API calls 2 library calls 95126->95181 95127 ec0692 95174 eaf2d9 20 API calls __dosmaperr 95127->95174 95128 ec0756 GetLastError 95178 eaf2a3 20 API calls __dosmaperr 95128->95178 95129 ec0704 95129->95124 95129->95128 95177 ec039a CreateFileW 95129->95177 95133 ec079a CloseHandle 95133->95127 95136 ec07c3 95133->95136 95135 ec0749 95135->95124 95135->95128 95180 eaf2d9 20 API calls __dosmaperr 95136->95180 95137 ec07f4 95139 ec0840 95137->95139 95182 ec05ab 72 API calls 3 library calls 95137->95182 95144 ec086d 95139->95144 95183 ec014d 72 API calls 4 library calls 95139->95183 95140 ec07c8 95140->95127 95143 ec0866 95143->95144 95145 ec087e 95143->95145 95184 eb86ae 95144->95184 95147 ec00f8 95145->95147 95148 ec08fc CloseHandle 95145->95148 95158 ec0121 LeaveCriticalSection __wsopen_s 95147->95158 95199 ec039a CreateFileW 95148->95199 95150 ec0927 95151 ec0931 GetLastError 95150->95151 95152 ec095d 95150->95152 95200 eaf2a3 20 API calls __dosmaperr 95151->95200 95152->95147 95154 ec093d 95201 eb5333 21 API calls 2 library calls 95154->95201 95156->95103 95157->95109 95158->95109 95160 eb522d ___BuildCatchObject 95159->95160 95202 eb2f5e EnterCriticalSection 95160->95202 95162 eb527b 95203 eb532a 95162->95203 95164 eb5259 95206 eb5000 95164->95206 95165 eb5234 95165->95162 95165->95164 95169 eb52c7 EnterCriticalSection 95165->95169 95166 eb52a4 __fread_nolock 95166->95116 95169->95162 95171 eb52d4 LeaveCriticalSection 95169->95171 95171->95165 95172->95129 95173->95127 95174->95147 95175->95122 95176->95127 95177->95135 95178->95127 95179->95133 95180->95140 95181->95137 95182->95139 95183->95143 95232 eb53c4 95184->95232 95186 eb86c4 95245 eb5333 21 API calls 2 library calls 95186->95245 95188 eb86be 95188->95186 95189 eb53c4 __wsopen_s 26 API calls 95188->95189 95198 eb86f6 95188->95198 95191 eb86ed 95189->95191 95190 eb53c4 __wsopen_s 26 API calls 95192 eb8702 CloseHandle 95190->95192 95195 eb53c4 __wsopen_s 26 API calls 95191->95195 95192->95186 95196 eb870e GetLastError 95192->95196 95193 eb871c 95194 eb873e 95193->95194 95246 eaf2a3 20 API calls __dosmaperr 95193->95246 95194->95147 95195->95198 95196->95186 95198->95186 95198->95190 95199->95150 95200->95154 95201->95152 95202->95165 95214 eb2fa6 LeaveCriticalSection 95203->95214 95205 eb5331 95205->95166 95215 eb4c7d 95206->95215 95208 eb5012 95212 eb501f 95208->95212 95222 eb3405 11 API calls 2 library calls 95208->95222 95210 eb5071 95210->95162 95213 eb5147 EnterCriticalSection 95210->95213 95223 eb29c8 95212->95223 95213->95162 95214->95205 95221 eb4c8a __dosmaperr 95215->95221 95216 eb4cca 95230 eaf2d9 20 API calls __dosmaperr 95216->95230 95217 eb4cb5 RtlAllocateHeap 95219 eb4cc8 95217->95219 95217->95221 95219->95208 95221->95216 95221->95217 95229 ea4ead 7 API calls 2 library calls 95221->95229 95222->95208 95224 eb29d3 RtlFreeHeap 95223->95224 95225 eb29fc __dosmaperr 95223->95225 95224->95225 95226 eb29e8 95224->95226 95225->95210 95231 eaf2d9 20 API calls __dosmaperr 95226->95231 95228 eb29ee GetLastError 95228->95225 95229->95221 95230->95219 95231->95228 95233 eb53d1 95232->95233 95234 eb53e6 95232->95234 95247 eaf2c6 20 API calls __dosmaperr 95233->95247 95238 eb540b 95234->95238 95249 eaf2c6 20 API calls __dosmaperr 95234->95249 95237 eb53d6 95248 eaf2d9 20 API calls __dosmaperr 95237->95248 95238->95188 95239 eb5416 95250 eaf2d9 20 API calls __dosmaperr 95239->95250 95242 eb53de 95242->95188 95243 eb541e 95251 eb27ec 26 API calls pre_c_initialization 95243->95251 95245->95193 95246->95194 95247->95237 95248->95242 95249->95239 95250->95243 95251->95242 95252 ec2ba5 95253 ec2baf 95252->95253 95254 e82b25 95252->95254 95295 e83a5a 95253->95295 95280 e82b83 7 API calls 95254->95280 95257 ec2bb8 95302 e89cb3 95257->95302 95261 e82b2f 95269 e82b44 95261->95269 95284 e83837 95261->95284 95262 ec2bc6 95263 ec2bce 95262->95263 95264 ec2bf5 95262->95264 95308 e833c6 95263->95308 95267 e833c6 22 API calls 95264->95267 95278 ec2bf1 GetForegroundWindow ShellExecuteW 95267->95278 95274 e82b5f 95269->95274 95294 e830f2 Shell_NotifyIconW ___scrt_fastfail 95269->95294 95277 e82b66 SetCurrentDirectoryW 95274->95277 95275 ec2c26 95275->95274 95276 e833c6 22 API calls 95276->95278 95279 e82b7a 95277->95279 95278->95275 95326 e82cd4 7 API calls 95280->95326 95282 e82b2a 95283 e82c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95282->95283 95283->95261 95285 e83862 ___scrt_fastfail 95284->95285 95327 e84212 95285->95327 95287 e838e8 95290 ec3386 Shell_NotifyIconW 95287->95290 95291 e83906 Shell_NotifyIconW 95287->95291 95331 e83923 95291->95331 95293 e8391c 95293->95269 95294->95274 95421 ec1f50 95295->95421 95298 e89cb3 22 API calls 95299 e83a8d 95298->95299 95423 e83aa2 95299->95423 95301 e83a97 95301->95257 95303 e89cc2 _wcslen 95302->95303 95304 e9fe0b 22 API calls 95303->95304 95305 e89cea __fread_nolock 95304->95305 95306 e9fddb 22 API calls 95305->95306 95307 e89d00 95306->95307 95307->95262 95309 e833dd 95308->95309 95310 ec30bb 95308->95310 95443 e833ee 95309->95443 95312 e9fddb 22 API calls 95310->95312 95314 ec30c5 _wcslen 95312->95314 95313 e833e8 95317 e86350 95313->95317 95315 e9fe0b 22 API calls 95314->95315 95316 ec30fe __fread_nolock 95315->95316 95318 e86362 95317->95318 95319 ec4a51 95317->95319 95458 e86373 95318->95458 95468 e84a88 22 API calls __fread_nolock 95319->95468 95322 e8636e 95322->95276 95323 ec4a5b 95324 ec4a67 95323->95324 95325 e8a8c7 22 API calls 95323->95325 95325->95324 95326->95282 95328 ec35a4 95327->95328 95329 e838b7 95327->95329 95328->95329 95330 ec35ad DestroyIcon 95328->95330 95329->95287 95353 eec874 42 API calls _strftime 95329->95353 95330->95329 95332 e8393f 95331->95332 95351 e83a13 95331->95351 95354 e86270 95332->95354 95335 e8395a 95359 e86b57 95335->95359 95336 ec3393 LoadStringW 95338 ec33ad 95336->95338 95347 e83994 ___scrt_fastfail 95338->95347 95371 e8a8c7 95338->95371 95339 e8396f 95340 e8397c 95339->95340 95341 ec33c9 95339->95341 95340->95338 95343 e83986 95340->95343 95344 e86350 22 API calls 95341->95344 95345 e86350 22 API calls 95343->95345 95346 ec33d7 95344->95346 95345->95347 95346->95347 95348 e833c6 22 API calls 95346->95348 95349 e839f9 Shell_NotifyIconW 95347->95349 95350 ec33f9 95348->95350 95349->95351 95352 e833c6 22 API calls 95350->95352 95351->95293 95352->95347 95353->95287 95375 e9fe0b 95354->95375 95356 e86295 95385 e9fddb 95356->95385 95358 e8394d 95358->95335 95358->95336 95360 ec4ba1 95359->95360 95361 e86b67 _wcslen 95359->95361 95411 e893b2 95360->95411 95364 e86b7d 95361->95364 95365 e86ba2 95361->95365 95363 ec4baa 95363->95363 95410 e86f34 22 API calls 95364->95410 95367 e9fddb 22 API calls 95365->95367 95369 e86bae 95367->95369 95368 e86b85 __fread_nolock 95368->95339 95370 e9fe0b 22 API calls 95369->95370 95370->95368 95372 e8a8ea __fread_nolock 95371->95372 95373 e8a8db 95371->95373 95372->95347 95373->95372 95374 e9fe0b 22 API calls 95373->95374 95374->95372 95378 e9fddb 95375->95378 95377 e9fdfa 95377->95356 95378->95377 95380 e9fdfc 95378->95380 95395 eaea0c 95378->95395 95402 ea4ead 7 API calls 2 library calls 95378->95402 95381 ea066d 95380->95381 95403 ea32a4 RaiseException 95380->95403 95404 ea32a4 RaiseException 95381->95404 95384 ea068a 95384->95356 95388 e9fde0 95385->95388 95386 eaea0c ___std_exception_copy 21 API calls 95386->95388 95387 e9fdfa 95387->95358 95388->95386 95388->95387 95391 e9fdfc 95388->95391 95407 ea4ead 7 API calls 2 library calls 95388->95407 95390 ea066d 95409 ea32a4 RaiseException 95390->95409 95391->95390 95408 ea32a4 RaiseException 95391->95408 95394 ea068a 95394->95358 95400 eb3820 __dosmaperr 95395->95400 95396 eb385e 95406 eaf2d9 20 API calls __dosmaperr 95396->95406 95398 eb3849 RtlAllocateHeap 95399 eb385c 95398->95399 95398->95400 95399->95378 95400->95396 95400->95398 95405 ea4ead 7 API calls 2 library calls 95400->95405 95402->95378 95403->95381 95404->95384 95405->95400 95406->95399 95407->95388 95408->95390 95409->95394 95410->95368 95412 e893c0 95411->95412 95414 e893c9 __fread_nolock 95411->95414 95412->95414 95415 e8aec9 95412->95415 95414->95363 95416 e8aed9 __fread_nolock 95415->95416 95417 e8aedc 95415->95417 95416->95414 95418 e9fddb 22 API calls 95417->95418 95419 e8aee7 95418->95419 95420 e9fe0b 22 API calls 95419->95420 95420->95416 95422 e83a67 GetModuleFileNameW 95421->95422 95422->95298 95424 ec1f50 __wsopen_s 95423->95424 95425 e83aaf GetFullPathNameW 95424->95425 95426 e83ae9 95425->95426 95427 e83ace 95425->95427 95437 e8a6c3 95426->95437 95428 e86b57 22 API calls 95427->95428 95430 e83ada 95428->95430 95433 e837a0 95430->95433 95434 e837ae 95433->95434 95435 e893b2 22 API calls 95434->95435 95436 e837c2 95435->95436 95436->95301 95438 e8a6dd 95437->95438 95439 e8a6d0 95437->95439 95440 e9fddb 22 API calls 95438->95440 95439->95430 95441 e8a6e7 95440->95441 95442 e9fe0b 22 API calls 95441->95442 95442->95439 95444 e833fe _wcslen 95443->95444 95445 ec311d 95444->95445 95446 e83411 95444->95446 95447 e9fddb 22 API calls 95445->95447 95453 e8a587 95446->95453 95449 ec3127 95447->95449 95451 e9fe0b 22 API calls 95449->95451 95450 e8341e __fread_nolock 95450->95313 95452 ec3157 __fread_nolock 95451->95452 95454 e8a59d 95453->95454 95457 e8a598 __fread_nolock 95453->95457 95455 e9fe0b 22 API calls 95454->95455 95456 ecf80f 95454->95456 95455->95457 95456->95456 95457->95450 95459 e86382 95458->95459 95465 e863b6 __fread_nolock 95458->95465 95460 ec4a82 95459->95460 95461 e863a9 95459->95461 95459->95465 95462 e9fddb 22 API calls 95460->95462 95463 e8a587 22 API calls 95461->95463 95464 ec4a91 95462->95464 95463->95465 95466 e9fe0b 22 API calls 95464->95466 95465->95322 95467 ec4ac5 __fread_nolock 95466->95467 95468->95323 95469 e82de3 95470 e82df0 __wsopen_s 95469->95470 95471 e82e09 95470->95471 95472 ec2c2b ___scrt_fastfail 95470->95472 95473 e83aa2 23 API calls 95471->95473 95474 ec2c47 GetOpenFileNameW 95472->95474 95475 e82e12 95473->95475 95476 ec2c96 95474->95476 95485 e82da5 95475->95485 95478 e86b57 22 API calls 95476->95478 95480 ec2cab 95478->95480 95480->95480 95482 e82e27 95503 e844a8 95482->95503 95486 ec1f50 __wsopen_s 95485->95486 95487 e82db2 GetLongPathNameW 95486->95487 95488 e86b57 22 API calls 95487->95488 95489 e82dda 95488->95489 95490 e83598 95489->95490 95533 e8a961 95490->95533 95493 e83aa2 23 API calls 95494 e835b5 95493->95494 95495 ec32eb 95494->95495 95496 e835c0 95494->95496 95501 ec330d 95495->95501 95550 e9ce60 41 API calls 95495->95550 95538 e8515f 95496->95538 95502 e835df 95502->95482 95551 e84ecb 95503->95551 95506 ec3833 95573 ef2cf9 95506->95573 95507 e84ecb 94 API calls 95509 e844e1 95507->95509 95509->95506 95511 e844e9 95509->95511 95510 ec3848 95512 ec384c 95510->95512 95513 ec3869 95510->95513 95515 ec3854 95511->95515 95516 e844f5 95511->95516 95614 e84f39 95512->95614 95514 e9fe0b 22 API calls 95513->95514 95530 ec38ae 95514->95530 95620 eeda5a 82 API calls 95515->95620 95613 e8940c 136 API calls 2 library calls 95516->95613 95520 e82e31 95521 ec3862 95521->95513 95522 ec3a5f 95527 ec3a67 95522->95527 95523 e84f39 68 API calls 95523->95527 95527->95523 95624 ee989b 82 API calls __wsopen_s 95527->95624 95529 e89cb3 22 API calls 95529->95530 95530->95522 95530->95527 95530->95529 95599 e8a4a1 95530->95599 95607 e83ff7 95530->95607 95621 ee967e 22 API calls __fread_nolock 95530->95621 95622 ee95ad 42 API calls _wcslen 95530->95622 95623 ef0b5a 22 API calls 95530->95623 95534 e9fe0b 22 API calls 95533->95534 95535 e8a976 95534->95535 95536 e9fddb 22 API calls 95535->95536 95537 e835aa 95536->95537 95537->95493 95539 e8516e 95538->95539 95543 e8518f __fread_nolock 95538->95543 95541 e9fe0b 22 API calls 95539->95541 95540 e9fddb 22 API calls 95542 e835cc 95540->95542 95541->95543 95544 e835f3 95542->95544 95543->95540 95546 e83605 95544->95546 95549 e83624 __fread_nolock 95544->95549 95545 e9fddb 22 API calls 95547 e8363b 95545->95547 95548 e9fe0b 22 API calls 95546->95548 95547->95502 95548->95549 95549->95545 95550->95495 95625 e84e90 LoadLibraryA 95551->95625 95556 ec3ccf 95558 e84f39 68 API calls 95556->95558 95557 e84ef6 LoadLibraryExW 95633 e84e59 LoadLibraryA 95557->95633 95560 ec3cd6 95558->95560 95562 e84e59 3 API calls 95560->95562 95564 ec3cde 95562->95564 95655 e850f5 95564->95655 95565 e84f20 95565->95564 95566 e84f2c 95565->95566 95567 e84f39 68 API calls 95566->95567 95569 e844cd 95567->95569 95569->95506 95569->95507 95572 ec3d05 95574 ef2d15 95573->95574 95575 e8511f 64 API calls 95574->95575 95576 ef2d29 95575->95576 95910 ef2e66 95576->95910 95579 ef2d3f 95579->95510 95580 e850f5 40 API calls 95581 ef2d56 95580->95581 95582 e850f5 40 API calls 95581->95582 95583 ef2d66 95582->95583 95584 e850f5 40 API calls 95583->95584 95585 ef2d81 95584->95585 95586 e850f5 40 API calls 95585->95586 95587 ef2d9c 95586->95587 95588 e8511f 64 API calls 95587->95588 95589 ef2db3 95588->95589 95590 eaea0c ___std_exception_copy 21 API calls 95589->95590 95591 ef2dba 95590->95591 95592 eaea0c ___std_exception_copy 21 API calls 95591->95592 95593 ef2dc4 95592->95593 95594 e850f5 40 API calls 95593->95594 95595 ef2dd8 95594->95595 95596 ef28fe 27 API calls 95595->95596 95597 ef2dee 95596->95597 95597->95579 95916 ef22ce 95597->95916 95600 e8a52b 95599->95600 95605 e8a4b1 __fread_nolock 95599->95605 95602 e9fe0b 22 API calls 95600->95602 95601 e9fddb 22 API calls 95603 e8a4b8 95601->95603 95602->95605 95604 e9fddb 22 API calls 95603->95604 95606 e8a4d6 95603->95606 95604->95606 95605->95601 95606->95530 95608 e8400a 95607->95608 95611 e840ae 95607->95611 95609 e9fe0b 22 API calls 95608->95609 95612 e8403c 95608->95612 95609->95612 95610 e9fddb 22 API calls 95610->95612 95611->95530 95612->95610 95612->95611 95613->95520 95615 e84f4a 95614->95615 95616 e84f43 95614->95616 95618 e84f59 95615->95618 95619 e84f6a FreeLibrary 95615->95619 95617 eae678 67 API calls 95616->95617 95617->95615 95618->95515 95619->95618 95620->95521 95621->95530 95622->95530 95623->95530 95624->95527 95626 e84ea8 GetProcAddress 95625->95626 95627 e84ec6 95625->95627 95628 e84eb8 95626->95628 95630 eae5eb 95627->95630 95628->95627 95629 e84ebf FreeLibrary 95628->95629 95629->95627 95663 eae52a 95630->95663 95632 e84eea 95632->95556 95632->95557 95634 e84e8d 95633->95634 95635 e84e6e GetProcAddress 95633->95635 95638 e84f80 95634->95638 95636 e84e7e 95635->95636 95636->95634 95637 e84e86 FreeLibrary 95636->95637 95637->95634 95639 e9fe0b 22 API calls 95638->95639 95640 e84f95 95639->95640 95715 e85722 95640->95715 95642 e84fa1 __fread_nolock 95643 ec3d1d 95642->95643 95644 e850a5 95642->95644 95651 e84fdc 95642->95651 95729 ef304d 74 API calls 95643->95729 95718 e842a2 CreateStreamOnHGlobal 95644->95718 95647 ec3d22 95649 e8511f 64 API calls 95647->95649 95648 e850f5 40 API calls 95648->95651 95650 ec3d45 95649->95650 95652 e850f5 40 API calls 95650->95652 95651->95647 95651->95648 95653 e8506e ISource 95651->95653 95724 e8511f 95651->95724 95652->95653 95653->95565 95656 e85107 95655->95656 95659 ec3d70 95655->95659 95751 eae8c4 95656->95751 95660 ef28fe 95893 ef274e 95660->95893 95662 ef2919 95662->95572 95664 eae536 ___BuildCatchObject 95663->95664 95665 eae544 95664->95665 95667 eae574 95664->95667 95688 eaf2d9 20 API calls __dosmaperr 95665->95688 95669 eae579 95667->95669 95670 eae586 95667->95670 95668 eae549 95689 eb27ec 26 API calls pre_c_initialization 95668->95689 95690 eaf2d9 20 API calls __dosmaperr 95669->95690 95680 eb8061 95670->95680 95674 eae58f 95675 eae5a2 95674->95675 95676 eae595 95674->95676 95692 eae5d4 LeaveCriticalSection __fread_nolock 95675->95692 95691 eaf2d9 20 API calls __dosmaperr 95676->95691 95677 eae554 __fread_nolock 95677->95632 95681 eb806d ___BuildCatchObject 95680->95681 95693 eb2f5e EnterCriticalSection 95681->95693 95683 eb807b 95694 eb80fb 95683->95694 95687 eb80ac __fread_nolock 95687->95674 95688->95668 95689->95677 95690->95677 95691->95677 95692->95677 95693->95683 95701 eb811e 95694->95701 95695 eb8177 95696 eb4c7d __dosmaperr 20 API calls 95695->95696 95697 eb8180 95696->95697 95699 eb29c8 _free 20 API calls 95697->95699 95700 eb8189 95699->95700 95703 eb8088 95700->95703 95712 eb3405 11 API calls 2 library calls 95700->95712 95701->95695 95701->95701 95701->95703 95710 ea918d EnterCriticalSection 95701->95710 95711 ea91a1 LeaveCriticalSection 95701->95711 95707 eb80b7 95703->95707 95704 eb81a8 95713 ea918d EnterCriticalSection 95704->95713 95714 eb2fa6 LeaveCriticalSection 95707->95714 95709 eb80be 95709->95687 95710->95701 95711->95701 95712->95704 95713->95703 95714->95709 95716 e9fddb 22 API calls 95715->95716 95717 e85734 95716->95717 95717->95642 95719 e842d9 95718->95719 95720 e842bc FindResourceExW 95718->95720 95719->95651 95720->95719 95721 ec35ba LoadResource 95720->95721 95721->95719 95722 ec35cf SizeofResource 95721->95722 95722->95719 95723 ec35e3 LockResource 95722->95723 95723->95719 95725 e8512e 95724->95725 95726 ec3d90 95724->95726 95730 eaece3 95725->95730 95729->95647 95733 eaeaaa 95730->95733 95732 e8513c 95732->95651 95734 eaeab6 ___BuildCatchObject 95733->95734 95735 eaeac2 95734->95735 95736 eaeae8 95734->95736 95746 eaf2d9 20 API calls __dosmaperr 95735->95746 95748 ea918d EnterCriticalSection 95736->95748 95739 eaeac7 95747 eb27ec 26 API calls pre_c_initialization 95739->95747 95740 eaeaf4 95749 eaec0a 62 API calls 2 library calls 95740->95749 95743 eaeb08 95750 eaeb27 LeaveCriticalSection __fread_nolock 95743->95750 95745 eaead2 __fread_nolock 95745->95732 95746->95739 95747->95745 95748->95740 95749->95743 95750->95745 95754 eae8e1 95751->95754 95753 e85118 95753->95660 95755 eae8ed ___BuildCatchObject 95754->95755 95756 eae92d 95755->95756 95757 eae900 ___scrt_fastfail 95755->95757 95758 eae925 __fread_nolock 95755->95758 95767 ea918d EnterCriticalSection 95756->95767 95781 eaf2d9 20 API calls __dosmaperr 95757->95781 95758->95753 95760 eae937 95768 eae6f8 95760->95768 95763 eae91a 95782 eb27ec 26 API calls pre_c_initialization 95763->95782 95767->95760 95772 eae70a ___scrt_fastfail 95768->95772 95774 eae727 95768->95774 95769 eae717 95856 eaf2d9 20 API calls __dosmaperr 95769->95856 95771 eae71c 95857 eb27ec 26 API calls pre_c_initialization 95771->95857 95772->95769 95772->95774 95779 eae76a __fread_nolock 95772->95779 95783 eae96c LeaveCriticalSection __fread_nolock 95774->95783 95775 eae886 ___scrt_fastfail 95859 eaf2d9 20 API calls __dosmaperr 95775->95859 95779->95774 95779->95775 95784 ead955 95779->95784 95791 eb8d45 95779->95791 95858 eacf78 26 API calls 4 library calls 95779->95858 95781->95763 95782->95758 95783->95758 95785 ead961 95784->95785 95786 ead976 95784->95786 95860 eaf2d9 20 API calls __dosmaperr 95785->95860 95786->95779 95788 ead966 95861 eb27ec 26 API calls pre_c_initialization 95788->95861 95790 ead971 95790->95779 95792 eb8d6f 95791->95792 95793 eb8d57 95791->95793 95794 eb90d9 95792->95794 95798 eb8db4 95792->95798 95871 eaf2c6 20 API calls __dosmaperr 95793->95871 95887 eaf2c6 20 API calls __dosmaperr 95794->95887 95796 eb8d5c 95872 eaf2d9 20 API calls __dosmaperr 95796->95872 95802 eb8dbf 95798->95802 95803 eb8d64 95798->95803 95809 eb8def 95798->95809 95800 eb90de 95888 eaf2d9 20 API calls __dosmaperr 95800->95888 95873 eaf2c6 20 API calls __dosmaperr 95802->95873 95803->95779 95804 eb8dcc 95889 eb27ec 26 API calls pre_c_initialization 95804->95889 95806 eb8dc4 95874 eaf2d9 20 API calls __dosmaperr 95806->95874 95810 eb8e08 95809->95810 95811 eb8e4a 95809->95811 95812 eb8e2e 95809->95812 95810->95812 95845 eb8e15 95810->95845 95878 eb3820 21 API calls __dosmaperr 95811->95878 95875 eaf2c6 20 API calls __dosmaperr 95812->95875 95814 eb8e33 95876 eaf2d9 20 API calls __dosmaperr 95814->95876 95818 eb8e61 95821 eb29c8 _free 20 API calls 95818->95821 95819 eb8e3a 95877 eb27ec 26 API calls pre_c_initialization 95819->95877 95820 eb8fb3 95823 eb9029 95820->95823 95826 eb8fcc GetConsoleMode 95820->95826 95824 eb8e6a 95821->95824 95825 eb902d ReadFile 95823->95825 95827 eb29c8 _free 20 API calls 95824->95827 95829 eb90a1 GetLastError 95825->95829 95830 eb9047 95825->95830 95826->95823 95831 eb8fdd 95826->95831 95828 eb8e71 95827->95828 95832 eb8e7b 95828->95832 95833 eb8e96 95828->95833 95834 eb90ae 95829->95834 95835 eb9005 95829->95835 95830->95829 95836 eb901e 95830->95836 95831->95825 95837 eb8fe3 ReadConsoleW 95831->95837 95879 eaf2d9 20 API calls __dosmaperr 95832->95879 95881 eb9424 28 API calls __wsopen_s 95833->95881 95885 eaf2d9 20 API calls __dosmaperr 95834->95885 95854 eb8e45 __fread_nolock 95835->95854 95882 eaf2a3 20 API calls __dosmaperr 95835->95882 95849 eb906c 95836->95849 95850 eb9083 95836->95850 95836->95854 95837->95836 95842 eb8fff GetLastError 95837->95842 95838 eb29c8 _free 20 API calls 95838->95803 95842->95835 95843 eb8e80 95880 eaf2c6 20 API calls __dosmaperr 95843->95880 95844 eb90b3 95886 eaf2c6 20 API calls __dosmaperr 95844->95886 95862 ebf89b 95845->95862 95883 eb8a61 31 API calls 3 library calls 95849->95883 95852 eb909a 95850->95852 95850->95854 95884 eb88a1 29 API calls __wsopen_s 95852->95884 95854->95838 95855 eb909f 95855->95854 95856->95771 95857->95774 95858->95779 95859->95771 95860->95788 95861->95790 95863 ebf8a8 95862->95863 95864 ebf8b5 95862->95864 95890 eaf2d9 20 API calls __dosmaperr 95863->95890 95866 ebf8c1 95864->95866 95891 eaf2d9 20 API calls __dosmaperr 95864->95891 95866->95820 95868 ebf8ad 95868->95820 95869 ebf8e2 95892 eb27ec 26 API calls pre_c_initialization 95869->95892 95871->95796 95872->95803 95873->95806 95874->95804 95875->95814 95876->95819 95877->95854 95878->95818 95879->95843 95880->95854 95881->95845 95882->95854 95883->95854 95884->95855 95885->95844 95886->95854 95887->95800 95888->95804 95889->95803 95890->95868 95891->95869 95892->95868 95896 eae4e8 95893->95896 95895 ef275d 95895->95662 95899 eae469 95896->95899 95898 eae505 95898->95895 95900 eae478 95899->95900 95901 eae48c 95899->95901 95907 eaf2d9 20 API calls __dosmaperr 95900->95907 95905 eae488 __alldvrm 95901->95905 95909 eb333f 11 API calls 2 library calls 95901->95909 95903 eae47d 95908 eb27ec 26 API calls pre_c_initialization 95903->95908 95905->95898 95907->95903 95908->95905 95909->95905 95911 ef2e7a 95910->95911 95912 ef2d3b 95911->95912 95913 e850f5 40 API calls 95911->95913 95914 ef28fe 27 API calls 95911->95914 95915 e8511f 64 API calls 95911->95915 95912->95579 95912->95580 95913->95911 95914->95911 95915->95911 95917 ef22d9 95916->95917 95918 ef22e7 95916->95918 95919 eae5eb 29 API calls 95917->95919 95920 ef232c 95918->95920 95921 eae5eb 29 API calls 95918->95921 95944 ef22f0 95918->95944 95919->95918 95945 ef2557 95920->95945 95923 ef2311 95921->95923 95923->95920 95927 ef231a 95923->95927 95924 ef2370 95925 ef2395 95924->95925 95926 ef2374 95924->95926 95949 ef2171 95925->95949 95928 ef2381 95926->95928 95931 eae678 67 API calls 95926->95931 95929 eae678 67 API calls 95927->95929 95927->95944 95933 eae678 67 API calls 95928->95933 95928->95944 95929->95944 95931->95928 95932 ef239d 95934 ef23c3 95932->95934 95935 ef23a3 95932->95935 95933->95944 95956 ef23f3 95934->95956 95937 ef23b0 95935->95937 95938 eae678 67 API calls 95935->95938 95939 eae678 67 API calls 95937->95939 95937->95944 95938->95937 95939->95944 95940 ef23de 95943 eae678 67 API calls 95940->95943 95940->95944 95941 ef23ca 95941->95940 95964 eae678 95941->95964 95943->95944 95944->95579 95946 ef257c 95945->95946 95947 ef2565 __fread_nolock 95945->95947 95948 eae8c4 __fread_nolock 40 API calls 95946->95948 95947->95924 95948->95947 95950 eaea0c ___std_exception_copy 21 API calls 95949->95950 95951 ef217f 95950->95951 95952 eaea0c ___std_exception_copy 21 API calls 95951->95952 95953 ef2190 95952->95953 95954 eaea0c ___std_exception_copy 21 API calls 95953->95954 95955 ef219c 95954->95955 95955->95932 95963 ef2408 95956->95963 95957 ef24c0 95981 ef2724 95957->95981 95958 ef21cc 40 API calls 95958->95963 95960 ef24c7 95960->95941 95963->95957 95963->95958 95963->95960 95977 ef2606 95963->95977 95985 ef2269 40 API calls 95963->95985 95965 eae684 ___BuildCatchObject 95964->95965 95966 eae6aa 95965->95966 95967 eae695 95965->95967 95976 eae6a5 __fread_nolock 95966->95976 96021 ea918d EnterCriticalSection 95966->96021 96038 eaf2d9 20 API calls __dosmaperr 95967->96038 95969 eae69a 96039 eb27ec 26 API calls pre_c_initialization 95969->96039 95971 eae6c6 96022 eae602 95971->96022 95974 eae6d1 96040 eae6ee LeaveCriticalSection __fread_nolock 95974->96040 95976->95940 95978 ef2617 95977->95978 95979 ef261d 95977->95979 95978->95979 95986 ef26d7 95978->95986 95979->95963 95982 ef2731 95981->95982 95984 ef2742 95981->95984 95983 eadbb3 65 API calls 95982->95983 95983->95984 95984->95960 95985->95963 95987 ef2714 95986->95987 95988 ef2703 95986->95988 95987->95978 95990 eadbb3 95988->95990 95991 eadbc1 95990->95991 95996 eadbdd 95990->95996 95992 eadbcd 95991->95992 95993 eadbe3 95991->95993 95991->95996 96002 eaf2d9 20 API calls __dosmaperr 95992->96002 95999 ead9cc 95993->95999 95996->95987 95997 eadbd2 96003 eb27ec 26 API calls pre_c_initialization 95997->96003 96004 ead97b 95999->96004 96001 ead9f0 96001->95996 96002->95997 96003->95996 96005 ead987 ___BuildCatchObject 96004->96005 96012 ea918d EnterCriticalSection 96005->96012 96007 ead995 96013 ead9f4 96007->96013 96011 ead9b3 __fread_nolock 96011->96001 96012->96007 96014 eb49a1 27 API calls 96013->96014 96015 eada09 96014->96015 96016 eada3a 62 API calls 96015->96016 96017 eada24 96016->96017 96018 eb4a56 62 API calls 96017->96018 96019 ead9a2 96018->96019 96020 ead9c0 LeaveCriticalSection __fread_nolock 96019->96020 96020->96011 96021->95971 96023 eae60f 96022->96023 96024 eae624 96022->96024 96066 eaf2d9 20 API calls __dosmaperr 96023->96066 96030 eae61f 96024->96030 96041 eadc0b 96024->96041 96027 eae614 96067 eb27ec 26 API calls pre_c_initialization 96027->96067 96030->95974 96033 ead955 __fread_nolock 26 API calls 96034 eae646 96033->96034 96051 eb862f 96034->96051 96037 eb29c8 _free 20 API calls 96037->96030 96038->95969 96039->95976 96040->95976 96042 eadc23 96041->96042 96044 eadc1f 96041->96044 96043 ead955 __fread_nolock 26 API calls 96042->96043 96042->96044 96045 eadc43 96043->96045 96047 eb4d7a 96044->96047 96068 eb59be 96045->96068 96048 eb4d90 96047->96048 96050 eae640 96047->96050 96049 eb29c8 _free 20 API calls 96048->96049 96048->96050 96049->96050 96050->96033 96052 eb863e 96051->96052 96053 eb8653 96051->96053 96191 eaf2c6 20 API calls __dosmaperr 96052->96191 96054 eb868e 96053->96054 96058 eb867a 96053->96058 96193 eaf2c6 20 API calls __dosmaperr 96054->96193 96057 eb8643 96192 eaf2d9 20 API calls __dosmaperr 96057->96192 96188 eb8607 96058->96188 96059 eb8693 96194 eaf2d9 20 API calls __dosmaperr 96059->96194 96063 eae64c 96063->96030 96063->96037 96064 eb869b 96195 eb27ec 26 API calls pre_c_initialization 96064->96195 96066->96027 96067->96030 96069 eb59ca ___BuildCatchObject 96068->96069 96070 eb59ea 96069->96070 96071 eb59d2 96069->96071 96073 eb5a88 96070->96073 96077 eb5a1f 96070->96077 96147 eaf2c6 20 API calls __dosmaperr 96071->96147 96152 eaf2c6 20 API calls __dosmaperr 96073->96152 96075 eb59d7 96148 eaf2d9 20 API calls __dosmaperr 96075->96148 96076 eb5a8d 96153 eaf2d9 20 API calls __dosmaperr 96076->96153 96093 eb5147 EnterCriticalSection 96077->96093 96081 eb59df __fread_nolock 96081->96044 96082 eb5a95 96154 eb27ec 26 API calls pre_c_initialization 96082->96154 96083 eb5a25 96085 eb5a41 96083->96085 96086 eb5a56 96083->96086 96149 eaf2d9 20 API calls __dosmaperr 96085->96149 96094 eb5aa9 96086->96094 96089 eb5a46 96150 eaf2c6 20 API calls __dosmaperr 96089->96150 96091 eb5a51 96151 eb5a80 LeaveCriticalSection __wsopen_s 96091->96151 96093->96083 96095 eb5ad7 96094->96095 96132 eb5ad0 96094->96132 96096 eb5adb 96095->96096 96097 eb5afa 96095->96097 96162 eaf2c6 20 API calls __dosmaperr 96096->96162 96101 eb5b4b 96097->96101 96102 eb5b2e 96097->96102 96100 eb5ae0 96163 eaf2d9 20 API calls __dosmaperr 96100->96163 96105 eb5b61 96101->96105 96168 eb9424 28 API calls __wsopen_s 96101->96168 96165 eaf2c6 20 API calls __dosmaperr 96102->96165 96103 eb5cb1 96103->96091 96155 eb564e 96105->96155 96107 eb5ae7 96164 eb27ec 26 API calls pre_c_initialization 96107->96164 96110 eb5b33 96166 eaf2d9 20 API calls __dosmaperr 96110->96166 96114 eb5ba8 96118 eb5bbc 96114->96118 96119 eb5c02 WriteFile 96114->96119 96115 eb5b6f 96120 eb5b73 96115->96120 96121 eb5b95 96115->96121 96116 eb5b3b 96167 eb27ec 26 API calls pre_c_initialization 96116->96167 96124 eb5bf2 96118->96124 96125 eb5bc4 96118->96125 96122 eb5c25 GetLastError 96119->96122 96127 eb5b8b 96119->96127 96126 eb5c69 96120->96126 96169 eb55e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 96120->96169 96170 eb542e 45 API calls 3 library calls 96121->96170 96122->96127 96173 eb56c4 7 API calls 2 library calls 96124->96173 96128 eb5bc9 96125->96128 96129 eb5be2 96125->96129 96126->96132 96177 eaf2d9 20 API calls __dosmaperr 96126->96177 96127->96126 96127->96132 96138 eb5c45 96127->96138 96128->96126 96134 eb5bd2 96128->96134 96172 eb5891 8 API calls 2 library calls 96129->96172 96179 ea0a8c 96132->96179 96171 eb57a3 7 API calls 2 library calls 96134->96171 96136 eb5be0 96136->96127 96137 eb5c8e 96178 eaf2c6 20 API calls __dosmaperr 96137->96178 96141 eb5c4c 96138->96141 96142 eb5c60 96138->96142 96174 eaf2d9 20 API calls __dosmaperr 96141->96174 96176 eaf2a3 20 API calls __dosmaperr 96142->96176 96145 eb5c51 96175 eaf2c6 20 API calls __dosmaperr 96145->96175 96147->96075 96148->96081 96149->96089 96150->96091 96151->96081 96152->96076 96153->96082 96154->96081 96156 ebf89b __fread_nolock 26 API calls 96155->96156 96157 eb565e 96156->96157 96158 eb5663 96157->96158 96186 eb2d74 38 API calls 3 library calls 96157->96186 96158->96114 96158->96115 96160 eb5686 96160->96158 96161 eb56a4 GetConsoleMode 96160->96161 96161->96158 96162->96100 96163->96107 96164->96132 96165->96110 96166->96116 96167->96132 96168->96105 96169->96127 96170->96127 96171->96136 96172->96136 96173->96136 96174->96145 96175->96132 96176->96132 96177->96137 96178->96132 96180 ea0a97 IsProcessorFeaturePresent 96179->96180 96181 ea0a95 96179->96181 96183 ea0c5d 96180->96183 96181->96103 96187 ea0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96183->96187 96185 ea0d40 96185->96103 96186->96160 96187->96185 96196 eb8585 96188->96196 96190 eb862b 96190->96063 96191->96057 96192->96063 96193->96059 96194->96064 96195->96063 96197 eb8591 ___BuildCatchObject 96196->96197 96207 eb5147 EnterCriticalSection 96197->96207 96199 eb859f 96200 eb85d1 96199->96200 96201 eb85c6 96199->96201 96208 eaf2d9 20 API calls __dosmaperr 96200->96208 96202 eb86ae __wsopen_s 29 API calls 96201->96202 96204 eb85cc 96202->96204 96209 eb85fb LeaveCriticalSection __wsopen_s 96204->96209 96206 eb85ee __fread_nolock 96206->96190 96207->96199 96208->96204 96209->96206 96210 ed3a41 96214 ef10c0 96210->96214 96212 ed3a4c 96213 ef10c0 53 API calls 96212->96213 96213->96212 96219 ef10fa 96214->96219 96222 ef10cd 96214->96222 96215 ef10fc 96249 e9fa11 53 API calls 96215->96249 96216 ef1101 96225 e87510 96216->96225 96219->96212 96221 e86350 22 API calls 96221->96219 96222->96215 96222->96216 96222->96219 96223 ef10f4 96222->96223 96248 e8b270 39 API calls 96223->96248 96226 e87522 96225->96226 96227 e87525 96225->96227 96226->96221 96228 e8755b 96227->96228 96229 e8752d 96227->96229 96230 ec50f6 96228->96230 96233 e8756d 96228->96233 96240 ec500f 96228->96240 96250 ea51c6 26 API calls 96229->96250 96253 ea5183 26 API calls 96230->96253 96251 e9fb21 51 API calls 96233->96251 96234 e8753d 96237 e9fddb 22 API calls 96234->96237 96235 ec510e 96235->96235 96239 e87547 96237->96239 96241 e89cb3 22 API calls 96239->96241 96242 e9fe0b 22 API calls 96240->96242 96247 ec5088 96240->96247 96241->96226 96243 ec5058 96242->96243 96244 e9fddb 22 API calls 96243->96244 96245 ec507f 96244->96245 96246 e89cb3 22 API calls 96245->96246 96246->96247 96252 e9fb21 51 API calls 96247->96252 96248->96219 96249->96216 96250->96234 96251->96234 96252->96230 96253->96235 96254 e81044 96259 e810f3 96254->96259 96256 e8104a 96295 ea00a3 29 API calls __onexit 96256->96295 96258 e81054 96296 e81398 96259->96296 96263 e8116a 96264 e8a961 22 API calls 96263->96264 96265 e81174 96264->96265 96266 e8a961 22 API calls 96265->96266 96267 e8117e 96266->96267 96268 e8a961 22 API calls 96267->96268 96269 e81188 96268->96269 96270 e8a961 22 API calls 96269->96270 96271 e811c6 96270->96271 96272 e8a961 22 API calls 96271->96272 96273 e81292 96272->96273 96306 e8171c 96273->96306 96277 e812c4 96278 e8a961 22 API calls 96277->96278 96279 e812ce 96278->96279 96327 e91940 96279->96327 96281 e812f9 96337 e81aab 96281->96337 96283 e81315 96284 e81325 GetStdHandle 96283->96284 96285 e8137a 96284->96285 96286 ec2485 96284->96286 96289 e81387 OleInitialize 96285->96289 96286->96285 96287 ec248e 96286->96287 96288 e9fddb 22 API calls 96287->96288 96290 ec2495 96288->96290 96289->96256 96344 ef011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96290->96344 96292 ec249e 96345 ef0944 CreateThread 96292->96345 96294 ec24aa CloseHandle 96294->96285 96295->96258 96346 e813f1 96296->96346 96299 e813f1 22 API calls 96300 e813d0 96299->96300 96301 e8a961 22 API calls 96300->96301 96302 e813dc 96301->96302 96303 e86b57 22 API calls 96302->96303 96304 e81129 96303->96304 96305 e81bc3 6 API calls 96304->96305 96305->96263 96307 e8a961 22 API calls 96306->96307 96308 e8172c 96307->96308 96309 e8a961 22 API calls 96308->96309 96310 e81734 96309->96310 96311 e8a961 22 API calls 96310->96311 96312 e8174f 96311->96312 96313 e9fddb 22 API calls 96312->96313 96314 e8129c 96313->96314 96315 e81b4a 96314->96315 96316 e81b58 96315->96316 96317 e8a961 22 API calls 96316->96317 96318 e81b63 96317->96318 96319 e8a961 22 API calls 96318->96319 96320 e81b6e 96319->96320 96321 e8a961 22 API calls 96320->96321 96322 e81b79 96321->96322 96323 e8a961 22 API calls 96322->96323 96324 e81b84 96323->96324 96325 e9fddb 22 API calls 96324->96325 96326 e81b96 RegisterWindowMessageW 96325->96326 96326->96277 96328 e91981 96327->96328 96332 e9195d 96327->96332 96353 ea0242 5 API calls __Init_thread_wait 96328->96353 96331 e9198b 96331->96332 96354 ea01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96331->96354 96336 e9196e 96332->96336 96355 ea0242 5 API calls __Init_thread_wait 96332->96355 96333 e98727 96333->96336 96356 ea01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96333->96356 96336->96281 96338 ec272d 96337->96338 96339 e81abb 96337->96339 96357 ef3209 23 API calls 96338->96357 96340 e9fddb 22 API calls 96339->96340 96342 e81ac3 96340->96342 96342->96283 96343 ec2738 96344->96292 96345->96294 96358 ef092a 28 API calls 96345->96358 96347 e8a961 22 API calls 96346->96347 96348 e813fc 96347->96348 96349 e8a961 22 API calls 96348->96349 96350 e81404 96349->96350 96351 e8a961 22 API calls 96350->96351 96352 e813c6 96351->96352 96352->96299 96353->96331 96354->96332 96355->96333 96356->96336 96357->96343 96359 ed2a00 96363 e8d7b0 ISource 96359->96363 96360 e8d9d5 96361 e8db11 PeekMessageW 96361->96363 96362 e8d807 GetInputState 96362->96361 96362->96363 96363->96360 96363->96361 96363->96362 96365 ed1cbe TranslateAcceleratorW 96363->96365 96366 e8db8f PeekMessageW 96363->96366 96367 e8da04 timeGetTime 96363->96367 96368 e8db73 TranslateMessage DispatchMessageW 96363->96368 96369 e8dbaf Sleep 96363->96369 96370 ed2b74 Sleep 96363->96370 96373 ed1dda timeGetTime 96363->96373 96391 e8dfd0 96363->96391 96414 e91310 96363->96414 96469 e9edf6 96363->96469 96474 e8dd50 235 API calls 96363->96474 96475 e8bf40 96363->96475 96534 ef3a2a 23 API calls 96363->96534 96535 e8ec40 96363->96535 96559 ef359c 82 API calls __wsopen_s 96363->96559 96365->96363 96366->96363 96367->96363 96368->96366 96371 e8dbc0 96369->96371 96370->96371 96371->96360 96371->96363 96372 e9e551 timeGetTime 96371->96372 96376 ed2c0b GetExitCodeProcess 96371->96376 96379 ed2a31 96371->96379 96380 f129bf GetForegroundWindow 96371->96380 96382 ed2ca9 Sleep 96371->96382 96560 f05658 23 API calls 96371->96560 96561 eee97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 96371->96561 96562 eed4dc 47 API calls 96371->96562 96372->96371 96533 e9e300 23 API calls 96373->96533 96377 ed2c37 CloseHandle 96376->96377 96378 ed2c21 WaitForSingleObject 96376->96378 96377->96371 96378->96363 96378->96377 96379->96360 96380->96371 96382->96363 96392 e8e010 96391->96392 96409 e8e0dc ISource 96392->96409 96565 ea0242 5 API calls __Init_thread_wait 96392->96565 96395 ed2fca 96397 e8a961 22 API calls 96395->96397 96395->96409 96396 e8a961 22 API calls 96396->96409 96400 ed2fe4 96397->96400 96566 ea00a3 29 API calls __onexit 96400->96566 96402 ed2fee 96567 ea01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96402->96567 96404 ef359c 82 API calls 96404->96409 96406 e8ec40 235 API calls 96406->96409 96408 e8a8c7 22 API calls 96408->96409 96409->96396 96409->96404 96409->96406 96409->96408 96410 e8e3e1 96409->96410 96411 e904f0 22 API calls 96409->96411 96563 e8a81b 41 API calls 96409->96563 96564 e9a308 235 API calls 96409->96564 96568 ea0242 5 API calls __Init_thread_wait 96409->96568 96569 ea00a3 29 API calls __onexit 96409->96569 96570 ea01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96409->96570 96571 f047d4 235 API calls 96409->96571 96572 f068c1 235 API calls 96409->96572 96410->96363 96411->96409 96415 e917b0 96414->96415 96416 e91376 96414->96416 96672 ea0242 5 API calls __Init_thread_wait 96415->96672 96418 e91390 96416->96418 96419 ed6331 96416->96419 96420 e91940 9 API calls 96418->96420 96686 f0709c 235 API calls 96419->96686 96423 e913a0 96420->96423 96422 e917ba 96425 e917fb 96422->96425 96427 e89cb3 22 API calls 96422->96427 96426 e91940 9 API calls 96423->96426 96424 ed633d 96424->96363 96429 ed6346 96425->96429 96431 e9182c 96425->96431 96428 e913b6 96426->96428 96435 e917d4 96427->96435 96428->96425 96430 e913ec 96428->96430 96687 ef359c 82 API calls __wsopen_s 96429->96687 96430->96429 96454 e91408 __fread_nolock 96430->96454 96674 e8aceb 96431->96674 96434 e91839 96684 e9d217 235 API calls 96434->96684 96673 ea01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96435->96673 96438 ed636e 96688 ef359c 82 API calls __wsopen_s 96438->96688 96439 e9152f 96441 e9153c 96439->96441 96442 ed63d1 96439->96442 96443 e91940 9 API calls 96441->96443 96690 f05745 54 API calls _wcslen 96442->96690 96445 e91549 96443->96445 96450 e91940 9 API calls 96445->96450 96453 e915c7 ISource 96445->96453 96446 e9fddb 22 API calls 96446->96454 96447 e9fe0b 22 API calls 96447->96454 96448 e91872 96685 e9faeb 23 API calls 96448->96685 96449 e9171d 96449->96363 96456 e91563 96450->96456 96453->96448 96457 e9167b ISource 96453->96457 96459 e91940 9 API calls 96453->96459 96464 e84f39 68 API calls 96453->96464 96573 eed4ce 96453->96573 96576 eff0ec 96453->96576 96585 ef6ef1 96453->96585 96665 f0958b 96453->96665 96668 f0959f 96453->96668 96691 ef359c 82 API calls __wsopen_s 96453->96691 96454->96434 96454->96438 96454->96439 96454->96446 96454->96447 96454->96453 96455 e8ec40 235 API calls 96454->96455 96460 ed63b2 96454->96460 96455->96454 96456->96453 96462 e8a8c7 22 API calls 96456->96462 96457->96449 96671 e9ce17 22 API calls ISource 96457->96671 96459->96453 96689 ef359c 82 API calls __wsopen_s 96460->96689 96462->96453 96464->96453 96471 e9ee09 96469->96471 96473 e9ee12 96469->96473 96470 e9ee36 IsDialogMessageW 96470->96471 96470->96473 96471->96363 96472 edefaf GetClassLongW 96472->96470 96472->96473 96473->96470 96473->96471 96473->96472 96474->96363 97005 e8adf0 96475->97005 96477 e8bf9d 96478 e8bfa9 96477->96478 96479 ed04b6 96477->96479 96481 ed04c6 96478->96481 96482 e8c01e 96478->96482 97033 ef359c 82 API calls __wsopen_s 96479->97033 97034 ef359c 82 API calls __wsopen_s 96481->97034 97010 e8ac91 96482->97010 96485 e8c7da 96490 e9fe0b 22 API calls 96485->96490 96487 ee7120 22 API calls 96530 e8c039 ISource __fread_nolock 96487->96530 96498 e8c808 __fread_nolock 96490->96498 96492 ed04f5 96496 ed055a 96492->96496 97035 e9d217 235 API calls 96492->97035 96495 e8af8a 22 API calls 96495->96530 96518 e8c603 96496->96518 97036 ef359c 82 API calls __wsopen_s 96496->97036 96497 e9fe0b 22 API calls 96529 e8c350 ISource __fread_nolock 96497->96529 96498->96497 96499 ed091a 97045 ef3209 23 API calls 96499->97045 96502 e8ec40 235 API calls 96502->96530 96503 ed08a5 96504 e8ec40 235 API calls 96503->96504 96506 ed08cf 96504->96506 96506->96518 97043 e8a81b 41 API calls 96506->97043 96507 ed0591 97037 ef359c 82 API calls __wsopen_s 96507->97037 96508 ed08f6 97044 ef359c 82 API calls __wsopen_s 96508->97044 96513 e8bbe0 40 API calls 96513->96530 96514 e8aceb 23 API calls 96514->96530 96515 e8c237 96517 e8c253 96515->96517 96519 e8a8c7 22 API calls 96515->96519 96516 e9fddb 22 API calls 96516->96530 96520 ed0976 96517->96520 96524 e8c297 ISource 96517->96524 96518->96363 96519->96517 96522 e8aceb 23 API calls 96520->96522 96523 ed09bf 96522->96523 96523->96518 97046 ef359c 82 API calls __wsopen_s 96523->97046 96524->96523 96525 e8aceb 23 API calls 96524->96525 96526 e8c335 96525->96526 96526->96523 96527 e8c342 96526->96527 97021 e8a704 96527->97021 96532 e8c3ac 96529->96532 97032 e9ce17 22 API calls ISource 96529->97032 96530->96485 96530->96487 96530->96492 96530->96495 96530->96496 96530->96498 96530->96499 96530->96502 96530->96503 96530->96507 96530->96508 96530->96513 96530->96514 96530->96515 96530->96516 96530->96518 96530->96523 96531 e9fe0b 22 API calls 96530->96531 97014 e8ad81 96530->97014 97038 ee7099 22 API calls __fread_nolock 96530->97038 97039 f05745 54 API calls _wcslen 96530->97039 97040 e9aa42 22 API calls ISource 96530->97040 97041 eef05c 40 API calls 96530->97041 97042 e8a993 41 API calls 96530->97042 96531->96530 96532->96363 96533->96363 96534->96363 96557 e8ec76 ISource 96535->96557 96536 ea0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96536->96557 96537 e9fddb 22 API calls 96537->96557 96538 ea01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96538->96557 96539 e8fef7 96545 e8a8c7 22 API calls 96539->96545 96552 e8ed9d ISource 96539->96552 96542 ed4600 96548 e8a8c7 22 API calls 96542->96548 96542->96552 96543 ed4b0b 97072 ef359c 82 API calls __wsopen_s 96543->97072 96544 e8a8c7 22 API calls 96544->96557 96545->96552 96548->96552 96550 e8fbe3 96550->96552 96553 ed4bdc 96550->96553 96558 e8f3ae ISource 96550->96558 96551 e8a961 22 API calls 96551->96557 96552->96363 97073 ef359c 82 API calls __wsopen_s 96553->97073 96554 ea00a3 29 API calls pre_c_initialization 96554->96557 96556 ed4beb 97074 ef359c 82 API calls __wsopen_s 96556->97074 96557->96536 96557->96537 96557->96538 96557->96539 96557->96542 96557->96543 96557->96544 96557->96550 96557->96551 96557->96552 96557->96554 96557->96556 96557->96558 97069 e901e0 235 API calls 2 library calls 96557->97069 97070 e906a0 41 API calls ISource 96557->97070 96558->96552 97071 ef359c 82 API calls __wsopen_s 96558->97071 96559->96363 96560->96371 96561->96371 96562->96371 96563->96409 96564->96409 96565->96395 96566->96402 96567->96409 96568->96409 96569->96409 96570->96409 96571->96409 96572->96409 96692 eedbbe lstrlenW 96573->96692 96577 e87510 53 API calls 96576->96577 96578 eff126 96577->96578 96697 e89e90 96578->96697 96580 eff136 96581 eff15b 96580->96581 96582 e8ec40 235 API calls 96580->96582 96584 eff15f 96581->96584 96725 e89c6e 22 API calls 96581->96725 96582->96581 96584->96453 96586 e8a961 22 API calls 96585->96586 96587 ef6f1d 96586->96587 96588 e8a961 22 API calls 96587->96588 96589 ef6f26 96588->96589 96590 ef6f3a 96589->96590 96887 e8b567 39 API calls 96589->96887 96592 e87510 53 API calls 96590->96592 96593 ef6f57 _wcslen 96592->96593 96594 ef70bf 96593->96594 96595 ef6fbc 96593->96595 96664 ef70e9 96593->96664 96597 e84ecb 94 API calls 96594->96597 96596 e87510 53 API calls 96595->96596 96598 ef6fc8 96596->96598 96599 ef70d0 96597->96599 96602 e8a8c7 22 API calls 96598->96602 96606 ef6fdb 96598->96606 96600 ef70e5 96599->96600 96603 e84ecb 94 API calls 96599->96603 96601 e8a961 22 API calls 96600->96601 96600->96664 96604 ef711a 96601->96604 96602->96606 96603->96600 96605 e8a961 22 API calls 96604->96605 96609 ef7126 96605->96609 96607 ef7027 96606->96607 96610 ef7005 96606->96610 96613 e8a8c7 22 API calls 96606->96613 96608 e87510 53 API calls 96607->96608 96611 ef7034 96608->96611 96612 e8a961 22 API calls 96609->96612 96614 e833c6 22 API calls 96610->96614 96615 ef703d 96611->96615 96616 ef7047 96611->96616 96617 ef712f 96612->96617 96613->96610 96618 ef700f 96614->96618 96619 e8a8c7 22 API calls 96615->96619 96888 eee199 GetFileAttributesW 96616->96888 96621 e8a961 22 API calls 96617->96621 96622 e87510 53 API calls 96618->96622 96619->96616 96624 ef7138 96621->96624 96625 ef701b 96622->96625 96623 ef7050 96626 ef7063 96623->96626 96630 e84c6d 22 API calls 96623->96630 96627 e87510 53 API calls 96624->96627 96628 e86350 22 API calls 96625->96628 96629 e87510 53 API calls 96626->96629 96636 ef7069 96626->96636 96631 ef7145 96627->96631 96628->96607 96632 ef70a0 96629->96632 96630->96626 96733 e8525f 96631->96733 96889 eed076 57 API calls 96632->96889 96635 ef7166 96775 e84c6d 96635->96775 96636->96664 96639 ef71a9 96641 e8a8c7 22 API calls 96639->96641 96640 e84c6d 22 API calls 96642 ef7186 96640->96642 96643 ef71ba 96641->96643 96642->96639 96645 e86b57 22 API calls 96642->96645 96644 e86350 22 API calls 96643->96644 96646 ef71c8 96644->96646 96647 ef719b 96645->96647 96648 e86350 22 API calls 96646->96648 96649 e86b57 22 API calls 96647->96649 96650 ef71d6 96648->96650 96649->96639 96651 e86350 22 API calls 96650->96651 96652 ef71e4 96651->96652 96653 e87510 53 API calls 96652->96653 96654 ef71f0 96653->96654 96778 eed7bc 96654->96778 96656 ef7201 96657 eed4ce 4 API calls 96656->96657 96658 ef720b 96657->96658 96659 e87510 53 API calls 96658->96659 96663 ef7239 96658->96663 96660 ef7229 96659->96660 96832 ef2947 96660->96832 96662 e84f39 68 API calls 96662->96664 96663->96662 96664->96453 96913 f07f59 96665->96913 96667 f0959b 96667->96453 96669 f07f59 120 API calls 96668->96669 96670 f095af 96669->96670 96670->96453 96671->96457 96672->96422 96673->96425 96675 e8acf9 96674->96675 96676 e8ad2a ISource 96674->96676 96677 e8ad55 96675->96677 96679 e8ad01 ISource 96675->96679 96676->96434 96677->96676 96678 e8a8c7 22 API calls 96677->96678 96678->96676 96679->96676 96680 ecfa48 96679->96680 96681 e8ad21 96679->96681 96680->96676 97004 e9ce17 22 API calls ISource 96680->97004 96681->96676 96682 ecfa3a VariantClear 96681->96682 96682->96676 96684->96448 96685->96448 96686->96424 96687->96453 96688->96453 96689->96453 96690->96456 96691->96453 96693 eedbdc GetFileAttributesW 96692->96693 96694 eed4d5 96692->96694 96693->96694 96695 eedbe8 FindFirstFileW 96693->96695 96694->96453 96695->96694 96696 eedbf9 FindClose 96695->96696 96696->96694 96698 e86270 22 API calls 96697->96698 96723 e89eb5 96698->96723 96699 e89fd2 96700 e8a4a1 22 API calls 96699->96700 96701 e89fec 96700->96701 96701->96580 96704 ecf7c4 96731 ee96e2 84 API calls __wsopen_s 96704->96731 96705 ecf699 96711 e9fddb 22 API calls 96705->96711 96706 e8a405 96706->96701 96732 ee96e2 84 API calls __wsopen_s 96706->96732 96710 e8a6c3 22 API calls 96710->96723 96713 ecf754 96711->96713 96712 ecf7d2 96714 e8a4a1 22 API calls 96712->96714 96716 e9fe0b 22 API calls 96713->96716 96715 ecf7e8 96714->96715 96715->96701 96718 e8a12c __fread_nolock 96716->96718 96718->96704 96718->96706 96719 e8a587 22 API calls 96719->96723 96720 e8aec9 22 API calls 96721 e8a0db CharUpperBuffW 96720->96721 96727 e8a673 22 API calls 96721->96727 96723->96699 96723->96704 96723->96705 96723->96706 96723->96710 96723->96718 96723->96719 96723->96720 96724 e8a4a1 22 API calls 96723->96724 96726 e84573 41 API calls _wcslen 96723->96726 96728 e848c8 23 API calls 96723->96728 96729 e849bd 22 API calls __fread_nolock 96723->96729 96730 e8a673 22 API calls 96723->96730 96724->96723 96725->96584 96726->96723 96727->96723 96728->96723 96729->96723 96730->96723 96731->96712 96732->96701 96734 e8a961 22 API calls 96733->96734 96735 e85275 96734->96735 96736 e8a961 22 API calls 96735->96736 96737 e8527d 96736->96737 96738 e8a961 22 API calls 96737->96738 96739 e85285 96738->96739 96740 e8a961 22 API calls 96739->96740 96741 e8528d 96740->96741 96742 ec3df5 96741->96742 96743 e852c1 96741->96743 96744 e8a8c7 22 API calls 96742->96744 96745 e86d25 22 API calls 96743->96745 96746 ec3dfe 96744->96746 96747 e852cf 96745->96747 96748 e8a6c3 22 API calls 96746->96748 96749 e893b2 22 API calls 96747->96749 96751 e85304 96748->96751 96750 e852d9 96749->96750 96750->96751 96752 e86d25 22 API calls 96750->96752 96753 e85349 96751->96753 96754 e85325 96751->96754 96761 ec3e20 96751->96761 96756 e852fa 96752->96756 96890 e86d25 96753->96890 96754->96753 96760 e84c6d 22 API calls 96754->96760 96758 e893b2 22 API calls 96756->96758 96757 e8535a 96759 e85370 96757->96759 96765 e8a8c7 22 API calls 96757->96765 96758->96751 96762 e85384 96759->96762 96767 e8a8c7 22 API calls 96759->96767 96763 e85332 96760->96763 96764 e86b57 22 API calls 96761->96764 96766 e8538f 96762->96766 96770 e8a8c7 22 API calls 96762->96770 96763->96753 96769 e86d25 22 API calls 96763->96769 96771 ec3ee0 96764->96771 96765->96759 96768 e8539a 96766->96768 96772 e8a8c7 22 API calls 96766->96772 96767->96762 96768->96635 96769->96753 96770->96766 96771->96753 96773 e84c6d 22 API calls 96771->96773 96903 e849bd 22 API calls __fread_nolock 96771->96903 96772->96768 96773->96771 96776 e8aec9 22 API calls 96775->96776 96777 e84c78 96776->96777 96777->96639 96777->96640 96779 eed7d8 96778->96779 96780 eed7dd 96779->96780 96781 eed7f3 96779->96781 96783 e8a8c7 22 API calls 96780->96783 96831 eed7ee 96780->96831 96782 e8a961 22 API calls 96781->96782 96784 eed7fb 96782->96784 96783->96831 96785 e8a961 22 API calls 96784->96785 96786 eed803 96785->96786 96787 e8a961 22 API calls 96786->96787 96788 eed80e 96787->96788 96789 e8a961 22 API calls 96788->96789 96790 eed816 96789->96790 96791 e8a961 22 API calls 96790->96791 96792 eed81e 96791->96792 96793 e8a961 22 API calls 96792->96793 96794 eed826 96793->96794 96795 e8a961 22 API calls 96794->96795 96796 eed82e 96795->96796 96797 e8a961 22 API calls 96796->96797 96798 eed836 96797->96798 96799 e8525f 22 API calls 96798->96799 96800 eed84d 96799->96800 96801 e8525f 22 API calls 96800->96801 96802 eed866 96801->96802 96803 e84c6d 22 API calls 96802->96803 96804 eed872 96803->96804 96805 eed885 96804->96805 96806 e893b2 22 API calls 96804->96806 96807 e84c6d 22 API calls 96805->96807 96806->96805 96808 eed88e 96807->96808 96809 eed89e 96808->96809 96810 e893b2 22 API calls 96808->96810 96811 eed8b0 96809->96811 96812 e8a8c7 22 API calls 96809->96812 96810->96809 96813 e86350 22 API calls 96811->96813 96812->96811 96814 eed8bb 96813->96814 96905 eed978 22 API calls 96814->96905 96816 eed8ca 96906 eed978 22 API calls 96816->96906 96818 eed8dd 96819 e84c6d 22 API calls 96818->96819 96820 eed8e7 96819->96820 96821 eed8fe 96820->96821 96822 eed8ec 96820->96822 96824 e84c6d 22 API calls 96821->96824 96823 e833c6 22 API calls 96822->96823 96825 eed8f9 96823->96825 96826 eed907 96824->96826 96828 e86350 22 API calls 96825->96828 96827 eed925 96826->96827 96830 e833c6 22 API calls 96826->96830 96829 e86350 22 API calls 96827->96829 96828->96827 96829->96831 96830->96825 96831->96656 96833 ef2954 __wsopen_s 96832->96833 96834 e9fe0b 22 API calls 96833->96834 96835 ef2971 96834->96835 96836 e85722 22 API calls 96835->96836 96837 ef297b 96836->96837 96838 ef274e 27 API calls 96837->96838 96839 ef2986 96838->96839 96840 e8511f 64 API calls 96839->96840 96841 ef299b 96840->96841 96842 ef29bf 96841->96842 96843 ef2a6c 96841->96843 96844 ef2e66 75 API calls 96842->96844 96845 ef2e66 75 API calls 96843->96845 96846 ef29c4 96844->96846 96860 ef2a38 96845->96860 96850 ef2a75 ISource 96846->96850 96911 ead583 26 API calls 96846->96911 96848 e850f5 40 API calls 96849 ef2a91 96848->96849 96851 e850f5 40 API calls 96849->96851 96850->96663 96853 ef2aa1 96851->96853 96852 ef29ed 96912 ead583 26 API calls 96852->96912 96854 e850f5 40 API calls 96853->96854 96856 ef2abc 96854->96856 96857 e850f5 40 API calls 96856->96857 96858 ef2acc 96857->96858 96859 e850f5 40 API calls 96858->96859 96861 ef2ae7 96859->96861 96860->96848 96860->96850 96862 e850f5 40 API calls 96861->96862 96863 ef2af7 96862->96863 96864 e850f5 40 API calls 96863->96864 96865 ef2b07 96864->96865 96866 e850f5 40 API calls 96865->96866 96867 ef2b17 96866->96867 96907 ef3017 GetTempPathW GetTempFileNameW 96867->96907 96869 ef2b22 96870 eae5eb 29 API calls 96869->96870 96881 ef2b33 96870->96881 96871 ef2bed 96872 eae678 67 API calls 96871->96872 96873 ef2bf8 96872->96873 96875 ef2bfe DeleteFileW 96873->96875 96876 ef2c12 96873->96876 96874 e850f5 40 API calls 96874->96881 96875->96850 96877 ef2c91 CopyFileW 96876->96877 96883 ef2c18 96876->96883 96878 ef2cb9 DeleteFileW 96877->96878 96879 ef2ca7 DeleteFileW 96877->96879 96908 ef2fd8 CreateFileW 96878->96908 96879->96850 96881->96850 96881->96871 96881->96874 96882 eadbb3 65 API calls 96881->96882 96882->96881 96884 ef22ce 79 API calls 96883->96884 96885 ef2c7c 96884->96885 96885->96878 96886 ef2c80 DeleteFileW 96885->96886 96886->96850 96887->96590 96888->96623 96889->96636 96891 e86d91 96890->96891 96892 e86d34 96890->96892 96893 e893b2 22 API calls 96891->96893 96892->96891 96894 e86d3f 96892->96894 96900 e86d62 __fread_nolock 96893->96900 96895 ec4c9d 96894->96895 96896 e86d5a 96894->96896 96898 e9fddb 22 API calls 96895->96898 96904 e86f34 22 API calls 96896->96904 96899 ec4ca7 96898->96899 96901 e9fe0b 22 API calls 96899->96901 96900->96757 96902 ec4cda 96901->96902 96903->96771 96904->96900 96905->96816 96906->96818 96907->96869 96909 ef2fff SetFileTime CloseHandle 96908->96909 96910 ef3013 96908->96910 96909->96910 96910->96850 96911->96852 96912->96860 96914 e87510 53 API calls 96913->96914 96915 f07f90 96914->96915 96939 f07fd5 ISource 96915->96939 96951 f08cd3 96915->96951 96917 f08281 96918 f0844f 96917->96918 96922 f0828f 96917->96922 96991 f08ee4 60 API calls 96918->96991 96921 f0845e 96921->96922 96923 f0846a 96921->96923 96964 f07e86 96922->96964 96923->96939 96924 e87510 53 API calls 96941 f08049 96924->96941 96929 f082c8 96979 e9fc70 96929->96979 96932 f08302 96986 e863eb 22 API calls 96932->96986 96933 f082e8 96985 ef359c 82 API calls __wsopen_s 96933->96985 96936 f082f3 GetCurrentProcess TerminateProcess 96936->96932 96937 f08311 96987 e86a50 22 API calls 96937->96987 96939->96667 96940 f0832a 96950 f08352 96940->96950 96988 e904f0 22 API calls 96940->96988 96941->96917 96941->96924 96941->96939 96983 ee417d 22 API calls __fread_nolock 96941->96983 96984 f0851d 42 API calls _strftime 96941->96984 96942 f084c5 96942->96939 96946 f084d9 FreeLibrary 96942->96946 96944 f08341 96989 f08b7b 75 API calls 96944->96989 96946->96939 96949 e8aceb 23 API calls 96949->96950 96950->96942 96950->96949 96990 e904f0 22 API calls 96950->96990 96992 f08b7b 75 API calls 96950->96992 96952 e8aec9 22 API calls 96951->96952 96953 f08cee CharLowerBuffW 96952->96953 96993 ee8e54 96953->96993 96957 e8a961 22 API calls 96958 f08d2a 96957->96958 96959 e86d25 22 API calls 96958->96959 96960 f08d3e 96959->96960 96961 e893b2 22 API calls 96960->96961 96963 f08d48 _wcslen 96961->96963 96962 f08e5e _wcslen 96962->96941 96963->96962 97000 f0851d 42 API calls _strftime 96963->97000 96965 f07ea1 96964->96965 96966 f07eec 96964->96966 96967 e9fe0b 22 API calls 96965->96967 96970 f09096 96966->96970 96968 f07ec3 96967->96968 96968->96966 96969 e9fddb 22 API calls 96968->96969 96969->96968 96971 f092ab ISource 96970->96971 96975 f090ba _strcat _wcslen 96970->96975 96971->96929 96972 e8b6b5 39 API calls 96972->96975 96973 e8b567 39 API calls 96973->96975 96974 e8b38f 39 API calls 96974->96975 96975->96971 96975->96972 96975->96973 96975->96974 96976 e87510 53 API calls 96975->96976 96977 eaea0c 21 API calls ___std_exception_copy 96975->96977 97003 eeefae 24 API calls _wcslen 96975->97003 96976->96975 96977->96975 96981 e9fc85 96979->96981 96980 e9fd1d VirtualProtect 96982 e9fceb 96980->96982 96981->96980 96981->96982 96982->96932 96982->96933 96983->96941 96984->96941 96985->96936 96986->96937 96987->96940 96988->96944 96989->96950 96990->96950 96991->96921 96992->96950 96994 ee8e74 _wcslen 96993->96994 96995 ee8f63 96994->96995 96998 ee8ea9 96994->96998 96999 ee8f68 96994->96999 96995->96957 96995->96963 96998->96995 97001 e9ce60 41 API calls 96998->97001 96999->96995 97002 e9ce60 41 API calls 96999->97002 97000->96962 97001->96998 97002->96999 97003->96975 97004->96676 97006 e8ae01 97005->97006 97009 e8ae1c ISource 97005->97009 97007 e8aec9 22 API calls 97006->97007 97008 e8ae09 CharUpperBuffW 97007->97008 97008->97009 97009->96477 97011 e8acae 97010->97011 97012 e8acd1 97011->97012 97047 ef359c 82 API calls __wsopen_s 97011->97047 97012->96530 97015 ecfadb 97014->97015 97016 e8ad92 97014->97016 97017 e9fddb 22 API calls 97016->97017 97018 e8ad99 97017->97018 97048 e8adcd 97018->97048 97022 ecf86f 97021->97022 97025 e8a718 97021->97025 97023 ecf87f 97022->97023 97067 ee4d4a 22 API calls ISource 97022->97067 97026 e8a746 97025->97026 97027 e8af8a 22 API calls 97025->97027 97029 e8a763 ISource 97025->97029 97028 e8a74c 97026->97028 97055 e8af8a 97026->97055 97027->97026 97028->97029 97063 e8b090 97028->97063 97029->96529 97032->96529 97033->96481 97034->96518 97035->96496 97036->96518 97037->96518 97038->96530 97039->96530 97040->96530 97041->96530 97042->96530 97043->96508 97044->96518 97045->96515 97046->96518 97047->97012 97054 e8addd 97048->97054 97049 e8adb6 97049->96530 97050 e9fddb 22 API calls 97050->97054 97051 e8a961 22 API calls 97051->97054 97052 e8a8c7 22 API calls 97052->97054 97053 e8adcd 22 API calls 97053->97054 97054->97049 97054->97050 97054->97051 97054->97052 97054->97053 97056 e8af98 97055->97056 97062 e8afc0 ISource 97055->97062 97057 e8afa6 97056->97057 97058 e8af8a 22 API calls 97056->97058 97059 e8afac 97057->97059 97060 e8af8a 22 API calls 97057->97060 97058->97057 97061 e8b090 22 API calls 97059->97061 97059->97062 97060->97059 97061->97062 97062->97028 97065 e8b09b ISource 97063->97065 97064 e8b0d6 ISource 97064->97029 97065->97064 97068 e9ce17 22 API calls ISource 97065->97068 97067->97023 97068->97064 97069->96557 97070->96557 97071->96552 97072->96552 97073->96556 97074->96552 97075 e81098 97080 e842de 97075->97080 97079 e810a7 97081 e8a961 22 API calls 97080->97081 97082 e842f5 GetVersionExW 97081->97082 97083 e86b57 22 API calls 97082->97083 97084 e84342 97083->97084 97085 e893b2 22 API calls 97084->97085 97099 e84378 97084->97099 97086 e8436c 97085->97086 97088 e837a0 22 API calls 97086->97088 97087 e8441b GetCurrentProcess IsWow64Process 97089 e84437 97087->97089 97088->97099 97090 e8444f LoadLibraryA 97089->97090 97091 ec3824 GetSystemInfo 97089->97091 97092 e8449c GetSystemInfo 97090->97092 97093 e84460 GetProcAddress 97090->97093 97095 e84476 97092->97095 97093->97092 97094 e84470 GetNativeSystemInfo 97093->97094 97094->97095 97097 e8447a FreeLibrary 97095->97097 97098 e8109d 97095->97098 97096 ec37df 97097->97098 97100 ea00a3 29 API calls __onexit 97098->97100 97099->97087 97099->97096 97100->97079 97101 eb90fa 97102 eb911f 97101->97102 97103 eb9107 97101->97103 97107 eb917a 97102->97107 97115 eb9117 97102->97115 97153 ebfdc4 21 API calls 2 library calls 97102->97153 97151 eaf2d9 20 API calls __dosmaperr 97103->97151 97105 eb910c 97152 eb27ec 26 API calls pre_c_initialization 97105->97152 97109 ead955 __fread_nolock 26 API calls 97107->97109 97110 eb9192 97109->97110 97121 eb8c32 97110->97121 97112 eb9199 97113 ead955 __fread_nolock 26 API calls 97112->97113 97112->97115 97114 eb91c5 97113->97114 97114->97115 97116 ead955 __fread_nolock 26 API calls 97114->97116 97117 eb91d3 97116->97117 97117->97115 97118 ead955 __fread_nolock 26 API calls 97117->97118 97119 eb91e3 97118->97119 97120 ead955 __fread_nolock 26 API calls 97119->97120 97120->97115 97122 eb8c3e ___BuildCatchObject 97121->97122 97123 eb8c5e 97122->97123 97124 eb8c46 97122->97124 97126 eb8d24 97123->97126 97131 eb8c97 97123->97131 97155 eaf2c6 20 API calls __dosmaperr 97124->97155 97162 eaf2c6 20 API calls __dosmaperr 97126->97162 97128 eb8c4b 97156 eaf2d9 20 API calls __dosmaperr 97128->97156 97129 eb8d29 97163 eaf2d9 20 API calls __dosmaperr 97129->97163 97132 eb8cbb 97131->97132 97133 eb8ca6 97131->97133 97154 eb5147 EnterCriticalSection 97132->97154 97157 eaf2c6 20 API calls __dosmaperr 97133->97157 97137 eb8cb3 97164 eb27ec 26 API calls pre_c_initialization 97137->97164 97138 eb8cab 97158 eaf2d9 20 API calls __dosmaperr 97138->97158 97139 eb8cc1 97141 eb8cdd 97139->97141 97142 eb8cf2 97139->97142 97159 eaf2d9 20 API calls __dosmaperr 97141->97159 97146 eb8d45 __fread_nolock 38 API calls 97142->97146 97144 eb8c53 __fread_nolock 97144->97112 97148 eb8ced 97146->97148 97147 eb8ce2 97160 eaf2c6 20 API calls __dosmaperr 97147->97160 97161 eb8d1c LeaveCriticalSection __wsopen_s 97148->97161 97151->97105 97152->97115 97153->97107 97154->97139 97155->97128 97156->97144 97157->97138 97158->97137 97159->97147 97160->97148 97161->97144 97162->97129 97163->97137 97164->97144 97165 ea03fb 97166 ea0407 ___BuildCatchObject 97165->97166 97194 e9feb1 97166->97194 97168 ea040e 97169 ea0561 97168->97169 97172 ea0438 97168->97172 97221 ea083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 97169->97221 97171 ea0568 97222 ea4e52 28 API calls _abort 97171->97222 97183 ea0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 97172->97183 97205 eb247d 97172->97205 97174 ea056e 97223 ea4e04 28 API calls _abort 97174->97223 97178 ea0576 97179 ea0457 97181 ea04d8 97213 ea0959 97181->97213 97183->97181 97217 ea4e1a 38 API calls 3 library calls 97183->97217 97185 ea04de 97186 ea04f3 97185->97186 97218 ea0992 GetModuleHandleW 97186->97218 97188 ea04fa 97188->97171 97189 ea04fe 97188->97189 97190 ea0507 97189->97190 97219 ea4df5 28 API calls _abort 97189->97219 97220 ea0040 13 API calls 2 library calls 97190->97220 97193 ea050f 97193->97179 97195 e9feba 97194->97195 97224 ea0698 IsProcessorFeaturePresent 97195->97224 97197 e9fec6 97225 ea2c94 10 API calls 3 library calls 97197->97225 97199 e9fecb 97200 e9fecf 97199->97200 97226 eb2317 97199->97226 97200->97168 97203 e9fee6 97203->97168 97208 eb2494 97205->97208 97206 ea0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 97207 ea0451 97206->97207 97207->97179 97209 eb2421 97207->97209 97208->97206 97210 eb2450 97209->97210 97211 ea0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 97210->97211 97212 eb2479 97211->97212 97212->97183 97269 ea2340 97213->97269 97216 ea097f 97216->97185 97217->97181 97218->97188 97219->97190 97220->97193 97221->97171 97222->97174 97223->97178 97224->97197 97225->97199 97230 ebd1f6 97226->97230 97229 ea2cbd 8 API calls 3 library calls 97229->97200 97233 ebd213 97230->97233 97234 ebd20f 97230->97234 97231 ea0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 97232 e9fed8 97231->97232 97232->97203 97232->97229 97233->97234 97236 eb4bfb 97233->97236 97234->97231 97237 eb4c07 ___BuildCatchObject 97236->97237 97248 eb2f5e EnterCriticalSection 97237->97248 97239 eb4c0e 97249 eb50af 97239->97249 97241 eb4c1d 97242 eb4c2c 97241->97242 97262 eb4a8f 29 API calls 97241->97262 97264 eb4c48 LeaveCriticalSection _abort 97242->97264 97245 eb4c27 97263 eb4b45 GetStdHandle GetFileType 97245->97263 97247 eb4c3d __fread_nolock 97247->97233 97248->97239 97250 eb50bb ___BuildCatchObject 97249->97250 97251 eb50c8 97250->97251 97252 eb50df 97250->97252 97266 eaf2d9 20 API calls __dosmaperr 97251->97266 97265 eb2f5e EnterCriticalSection 97252->97265 97255 eb50eb 97259 eb5000 __wsopen_s 21 API calls 97255->97259 97261 eb5117 97255->97261 97256 eb50cd 97267 eb27ec 26 API calls pre_c_initialization 97256->97267 97259->97255 97260 eb50d7 __fread_nolock 97260->97241 97268 eb513e LeaveCriticalSection _abort 97261->97268 97262->97245 97263->97242 97264->97247 97265->97255 97266->97256 97267->97260 97268->97260 97270 ea096c GetStartupInfoW 97269->97270 97270->97216 97271 e8105b 97276 e8344d 97271->97276 97273 e8106a 97307 ea00a3 29 API calls __onexit 97273->97307 97275 e81074 97277 e8345d __wsopen_s 97276->97277 97278 e8a961 22 API calls 97277->97278 97279 e83513 97278->97279 97280 e83a5a 24 API calls 97279->97280 97281 e8351c 97280->97281 97308 e83357 97281->97308 97284 e833c6 22 API calls 97285 e83535 97284->97285 97286 e8515f 22 API calls 97285->97286 97287 e83544 97286->97287 97288 e8a961 22 API calls 97287->97288 97289 e8354d 97288->97289 97290 e8a6c3 22 API calls 97289->97290 97291 e83556 RegOpenKeyExW 97290->97291 97292 ec3176 RegQueryValueExW 97291->97292 97296 e83578 97291->97296 97293 ec320c RegCloseKey 97292->97293 97294 ec3193 97292->97294 97293->97296 97302 ec321e _wcslen 97293->97302 97295 e9fe0b 22 API calls 97294->97295 97297 ec31ac 97295->97297 97296->97273 97298 e85722 22 API calls 97297->97298 97299 ec31b7 RegQueryValueExW 97298->97299 97300 ec31d4 97299->97300 97304 ec31ee ISource 97299->97304 97301 e86b57 22 API calls 97300->97301 97301->97304 97302->97296 97303 e84c6d 22 API calls 97302->97303 97305 e89cb3 22 API calls 97302->97305 97306 e8515f 22 API calls 97302->97306 97303->97302 97304->97293 97305->97302 97306->97302 97307->97275 97309 ec1f50 __wsopen_s 97308->97309 97310 e83364 GetFullPathNameW 97309->97310 97311 e83386 97310->97311 97312 e86b57 22 API calls 97311->97312 97313 e833a4 97312->97313 97313->97284 97314 e8f7bf 97315 e8f7d3 97314->97315 97316 e8fcb6 97314->97316 97318 e8fcc2 97315->97318 97319 e9fddb 22 API calls 97315->97319 97317 e8aceb 23 API calls 97316->97317 97317->97318 97320 e8aceb 23 API calls 97318->97320 97321 e8f7e5 97319->97321 97322 e8fd3d 97320->97322 97321->97318 97321->97322 97323 e8f83e 97321->97323 97351 ef1155 22 API calls 97322->97351 97325 e91310 235 API calls 97323->97325 97342 e8ed9d ISource 97323->97342 97348 e8ec76 ISource 97325->97348 97326 ed4beb 97355 ef359c 82 API calls __wsopen_s 97326->97355 97327 e9fddb 22 API calls 97327->97348 97330 e8f3ae ISource 97330->97342 97352 ef359c 82 API calls __wsopen_s 97330->97352 97331 e8fef7 97334 e8a8c7 22 API calls 97331->97334 97331->97342 97332 ed4600 97337 e8a8c7 22 API calls 97332->97337 97332->97342 97333 ed4b0b 97353 ef359c 82 API calls __wsopen_s 97333->97353 97334->97342 97337->97342 97339 e8a8c7 22 API calls 97339->97348 97340 e8fbe3 97340->97330 97340->97342 97343 ed4bdc 97340->97343 97341 e8a961 22 API calls 97341->97348 97354 ef359c 82 API calls __wsopen_s 97343->97354 97344 ea00a3 29 API calls pre_c_initialization 97344->97348 97346 ea0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97346->97348 97347 ea01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97347->97348 97348->97326 97348->97327 97348->97330 97348->97331 97348->97332 97348->97333 97348->97339 97348->97340 97348->97341 97348->97342 97348->97344 97348->97346 97348->97347 97349 e901e0 235 API calls 2 library calls 97348->97349 97350 e906a0 41 API calls ISource 97348->97350 97349->97348 97350->97348 97351->97342 97352->97342 97353->97342 97354->97326 97355->97342 97356 ed3f75 97367 e9ceb1 97356->97367 97358 ed3f8b 97360 ed4006 97358->97360 97376 e9e300 23 API calls 97358->97376 97361 e8bf40 235 API calls 97360->97361 97363 ed4052 97361->97363 97366 ed4a88 97363->97366 97378 ef359c 82 API calls __wsopen_s 97363->97378 97364 ed3fe6 97364->97363 97377 ef1abf 22 API calls 97364->97377 97368 e9cebf 97367->97368 97369 e9ced2 97367->97369 97370 e8aceb 23 API calls 97368->97370 97371 e9cf05 97369->97371 97372 e9ced7 97369->97372 97375 e9cec9 97370->97375 97374 e8aceb 23 API calls 97371->97374 97373 e9fddb 22 API calls 97372->97373 97373->97375 97374->97375 97375->97358 97376->97364 97377->97360 97378->97366 97379 e81033 97384 e84c91 97379->97384 97383 e81042 97385 e8a961 22 API calls 97384->97385 97386 e84cff 97385->97386 97392 e83af0 97386->97392 97389 e84d9c 97390 e81038 97389->97390 97395 e851f7 22 API calls __fread_nolock 97389->97395 97391 ea00a3 29 API calls __onexit 97390->97391 97391->97383 97396 e83b1c 97392->97396 97395->97389 97397 e83b0f 97396->97397 97398 e83b29 97396->97398 97397->97389 97398->97397 97399 e83b30 RegOpenKeyExW 97398->97399 97399->97397 97400 e83b4a RegQueryValueExW 97399->97400 97401 e83b6b 97400->97401 97402 e83b80 RegCloseKey 97400->97402 97401->97402 97402->97397 97403 174f228 97417 174ce78 97403->97417 97405 174f2e3 97420 174f118 97405->97420 97407 174f30c CreateFileW 97409 174f360 97407->97409 97410 174f35b 97407->97410 97409->97410 97411 174f377 VirtualAlloc 97409->97411 97411->97410 97412 174f395 ReadFile 97411->97412 97412->97410 97413 174f3b0 97412->97413 97414 174e118 13 API calls 97413->97414 97415 174f3e3 97414->97415 97416 174f406 ExitProcess 97415->97416 97416->97410 97423 1750308 GetPEB 97417->97423 97419 174d503 97419->97405 97421 174f121 Sleep 97420->97421 97422 174f12f 97421->97422 97424 1750332 97423->97424 97424->97419 97425 e83156 97428 e83170 97425->97428 97429 e83187 97428->97429 97430 e831eb 97429->97430 97431 e8318c 97429->97431 97465 e831e9 97429->97465 97435 ec2dfb 97430->97435 97436 e831f1 97430->97436 97432 e83199 97431->97432 97433 e83265 PostQuitMessage 97431->97433 97438 ec2e7c 97432->97438 97439 e831a4 97432->97439 97470 e8316a 97433->97470 97434 e831d0 DefWindowProcW 97434->97470 97484 e818e2 10 API calls 97435->97484 97440 e831f8 97436->97440 97441 e8321d SetTimer RegisterWindowMessageW 97436->97441 97488 eebf30 34 API calls ___scrt_fastfail 97438->97488 97443 ec2e68 97439->97443 97444 e831ae 97439->97444 97447 ec2d9c 97440->97447 97448 e83201 KillTimer 97440->97448 97445 e83246 CreatePopupMenu 97441->97445 97441->97470 97442 ec2e1c 97485 e9e499 42 API calls 97442->97485 97473 eec161 97443->97473 97451 ec2e4d 97444->97451 97452 e831b9 97444->97452 97445->97470 97454 ec2dd7 MoveWindow 97447->97454 97455 ec2da1 97447->97455 97480 e830f2 Shell_NotifyIconW ___scrt_fastfail 97448->97480 97451->97434 97487 ee0ad7 22 API calls 97451->97487 97458 e83253 97452->97458 97467 e831c4 97452->97467 97453 ec2e8e 97453->97434 97453->97470 97454->97470 97459 ec2dc6 SetFocus 97455->97459 97460 ec2da7 97455->97460 97457 e83214 97481 e83c50 DeleteObject DestroyWindow 97457->97481 97482 e8326f 44 API calls ___scrt_fastfail 97458->97482 97459->97470 97463 ec2db0 97460->97463 97460->97467 97483 e818e2 10 API calls 97463->97483 97465->97434 97466 e83263 97466->97470 97467->97434 97486 e830f2 Shell_NotifyIconW ___scrt_fastfail 97467->97486 97471 ec2e41 97472 e83837 49 API calls 97471->97472 97472->97465 97474 eec179 ___scrt_fastfail 97473->97474 97475 eec276 97473->97475 97476 e83923 24 API calls 97474->97476 97475->97470 97478 eec1a0 97476->97478 97477 eec25f KillTimer SetTimer 97477->97475 97478->97477 97479 eec251 Shell_NotifyIconW 97478->97479 97479->97477 97480->97457 97481->97470 97482->97466 97483->97470 97484->97442 97485->97467 97486->97471 97487->97465 97488->97453 97489 e82e37 97490 e8a961 22 API calls 97489->97490 97491 e82e4d 97490->97491 97568 e84ae3 97491->97568 97493 e82e6b 97494 e83a5a 24 API calls 97493->97494 97495 e82e7f 97494->97495 97496 e89cb3 22 API calls 97495->97496 97497 e82e8c 97496->97497 97498 e84ecb 94 API calls 97497->97498 97499 e82ea5 97498->97499 97500 e82ead 97499->97500 97501 ec2cb0 97499->97501 97504 e8a8c7 22 API calls 97500->97504 97502 ef2cf9 80 API calls 97501->97502 97503 ec2cc3 97502->97503 97505 ec2ccf 97503->97505 97507 e84f39 68 API calls 97503->97507 97506 e82ec3 97504->97506 97509 e84f39 68 API calls 97505->97509 97582 e86f88 22 API calls 97506->97582 97507->97505 97511 ec2ce5 97509->97511 97510 e82ecf 97512 e89cb3 22 API calls 97510->97512 97598 e83084 22 API calls 97511->97598 97513 e82edc 97512->97513 97583 e8a81b 41 API calls 97513->97583 97516 e82eec 97518 e89cb3 22 API calls 97516->97518 97517 ec2d02 97599 e83084 22 API calls 97517->97599 97520 e82f12 97518->97520 97584 e8a81b 41 API calls 97520->97584 97522 ec2d1e 97523 e83a5a 24 API calls 97522->97523 97525 ec2d44 97523->97525 97524 e82f21 97528 e8a961 22 API calls 97524->97528 97600 e83084 22 API calls 97525->97600 97527 ec2d50 97529 e8a8c7 22 API calls 97527->97529 97530 e82f3f 97528->97530 97531 ec2d5e 97529->97531 97585 e83084 22 API calls 97530->97585 97601 e83084 22 API calls 97531->97601 97534 e82f4b 97586 ea4a28 40 API calls 3 library calls 97534->97586 97536 e82f59 97536->97511 97538 e82f63 97536->97538 97537 ec2d6d 97539 e8a8c7 22 API calls 97537->97539 97587 ea4a28 40 API calls 3 library calls 97538->97587 97541 ec2d83 97539->97541 97602 e83084 22 API calls 97541->97602 97542 e82f6e 97542->97517 97544 e82f78 97542->97544 97588 ea4a28 40 API calls 3 library calls 97544->97588 97546 ec2d90 97547 e82f83 97547->97522 97548 e82f8d 97547->97548 97589 ea4a28 40 API calls 3 library calls 97548->97589 97550 e82f98 97551 e82fdc 97550->97551 97590 e83084 22 API calls 97550->97590 97551->97537 97552 e82fe8 97551->97552 97552->97546 97592 e863eb 22 API calls 97552->97592 97555 e82fbf 97557 e8a8c7 22 API calls 97555->97557 97556 e82ff8 97593 e86a50 22 API calls 97556->97593 97559 e82fcd 97557->97559 97591 e83084 22 API calls 97559->97591 97560 e83006 97594 e870b0 23 API calls 97560->97594 97565 e83021 97566 e83065 97565->97566 97595 e86f88 22 API calls 97565->97595 97596 e870b0 23 API calls 97565->97596 97597 e83084 22 API calls 97565->97597 97569 e84af0 __wsopen_s 97568->97569 97570 e86b57 22 API calls 97569->97570 97571 e84b22 97569->97571 97570->97571 97572 e84c6d 22 API calls 97571->97572 97581 e84b58 97571->97581 97572->97571 97573 e84c6d 22 API calls 97573->97581 97574 e89cb3 22 API calls 97576 e84c52 97574->97576 97575 e89cb3 22 API calls 97575->97581 97577 e8515f 22 API calls 97576->97577 97579 e84c5e 97577->97579 97578 e8515f 22 API calls 97578->97581 97579->97493 97580 e84c29 97580->97574 97580->97579 97581->97573 97581->97575 97581->97578 97581->97580 97582->97510 97583->97516 97584->97524 97585->97534 97586->97536 97587->97542 97588->97547 97589->97550 97590->97555 97591->97551 97592->97556 97593->97560 97594->97565 97595->97565 97596->97565 97597->97565 97598->97517 97599->97522 97600->97527 97601->97537 97602->97546

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 235 e842de-e8434d call e8a961 GetVersionExW call e86b57 240 ec3617-ec362a 235->240 241 e84353 235->241 243 ec362b-ec362f 240->243 242 e84355-e84357 241->242 244 e8435d-e843bc call e893b2 call e837a0 242->244 245 ec3656 242->245 246 ec3631 243->246 247 ec3632-ec363e 243->247 263 ec37df-ec37e6 244->263 264 e843c2-e843c4 244->264 250 ec365d-ec3660 245->250 246->247 247->243 249 ec3640-ec3642 247->249 249->242 252 ec3648-ec364f 249->252 253 e8441b-e84435 GetCurrentProcess IsWow64Process 250->253 254 ec3666-ec36a8 250->254 252->240 256 ec3651 252->256 259 e84494-e8449a 253->259 260 e84437 253->260 254->253 257 ec36ae-ec36b1 254->257 256->245 261 ec36db-ec36e5 257->261 262 ec36b3-ec36bd 257->262 265 e8443d-e84449 259->265 260->265 271 ec36f8-ec3702 261->271 272 ec36e7-ec36f3 261->272 268 ec36bf-ec36c5 262->268 269 ec36ca-ec36d6 262->269 273 ec37e8 263->273 274 ec3806-ec3809 263->274 264->250 270 e843ca-e843dd 264->270 266 e8444f-e8445e LoadLibraryA 265->266 267 ec3824-ec3828 GetSystemInfo 265->267 275 e8449c-e844a6 GetSystemInfo 266->275 276 e84460-e8446e GetProcAddress 266->276 268->253 269->253 277 ec3726-ec372f 270->277 278 e843e3-e843e5 270->278 280 ec3704-ec3710 271->280 281 ec3715-ec3721 271->281 272->253 279 ec37ee 273->279 282 ec380b-ec381a 274->282 283 ec37f4-ec37fc 274->283 285 e84476-e84478 275->285 276->275 284 e84470-e84474 GetNativeSystemInfo 276->284 288 ec373c-ec3748 277->288 289 ec3731-ec3737 277->289 286 ec374d-ec3762 278->286 287 e843eb-e843ee 278->287 279->283 280->253 281->253 282->279 290 ec381c-ec3822 282->290 283->274 284->285 293 e8447a-e8447b FreeLibrary 285->293 294 e84481-e84493 285->294 291 ec376f-ec377b 286->291 292 ec3764-ec376a 286->292 295 e843f4-e8440f 287->295 296 ec3791-ec3794 287->296 288->253 289->253 290->283 291->253 292->253 293->294 298 ec3780-ec378c 295->298 299 e84415 295->299 296->253 297 ec379a-ec37c1 296->297 300 ec37ce-ec37da 297->300 301 ec37c3-ec37c9 297->301 298->253 299->253 300->253 301->253
                                                      APIs
                                                      • GetVersionExW.KERNEL32(?), ref: 00E8430D
                                                        • Part of subcall function 00E86B57: _wcslen.LIBCMT ref: 00E86B6A
                                                      • GetCurrentProcess.KERNEL32(?,00F1CB64,00000000,?,?), ref: 00E84422
                                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 00E84429
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00E84454
                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00E84466
                                                      • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00E84474
                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 00E8447B
                                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 00E844A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                      • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                      • API String ID: 3290436268-3101561225
                                                      • Opcode ID: 2bbdddd6a260fb97ff36812543c23a4a1c16860e394ceaac1f3ee122f710e6fa
                                                      • Instruction ID: 7c5143cadead0cc38d8bcb3cc8792a0ab19bf43b6acc153b571e8aa8ebf2278e
                                                      • Opcode Fuzzy Hash: 2bbdddd6a260fb97ff36812543c23a4a1c16860e394ceaac1f3ee122f710e6fa
                                                      • Instruction Fuzzy Hash: E8A109A18093CCCFC711D7B87C607D57FA4BF3634AB08A89DD289B3662D2216509FB61

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 662 e842a2-e842ba CreateStreamOnHGlobal 663 e842da-e842dd 662->663 664 e842bc-e842d3 FindResourceExW 662->664 665 e842d9 664->665 666 ec35ba-ec35c9 LoadResource 664->666 665->663 666->665 667 ec35cf-ec35dd SizeofResource 666->667 667->665 668 ec35e3-ec35ee LockResource 667->668 668->665 669 ec35f4-ec3612 668->669 669->665
                                                      APIs
                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00E850AA,?,?,00000000,00000000), ref: 00E842B2
                                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00E850AA,?,?,00000000,00000000), ref: 00E842C9
                                                      • LoadResource.KERNEL32(?,00000000,?,?,00E850AA,?,?,00000000,00000000,?,?,?,?,?,?,00E84F20), ref: 00EC35BE
                                                      • SizeofResource.KERNEL32(?,00000000,?,?,00E850AA,?,?,00000000,00000000,?,?,?,?,?,?,00E84F20), ref: 00EC35D3
                                                      • LockResource.KERNEL32(00E850AA,?,?,00E850AA,?,?,00000000,00000000,?,?,?,?,?,?,00E84F20,?), ref: 00EC35E6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                      • String ID: SCRIPT
                                                      • API String ID: 3051347437-3967369404
                                                      • Opcode ID: cb8fb15b5493bf404823137f1cdcdfa596574221ca499e106b8b5360be044b52
                                                      • Instruction ID: a171543af4690ed93fd532478b1e9ef21c388951bd311694cd314efe69be315e
                                                      • Opcode Fuzzy Hash: cb8fb15b5493bf404823137f1cdcdfa596574221ca499e106b8b5360be044b52
                                                      • Instruction Fuzzy Hash: 5511ACB0240309BFD722AB65DC48FA77BB9EBC9B55F108169F40AE62A0DB71D8009660

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 811 eedbbe-eedbda lstrlenW 812 eedbdc-eedbe6 GetFileAttributesW 811->812 813 eedc06 811->813 814 eedbe8-eedbf7 FindFirstFileW 812->814 815 eedc09-eedc0d 812->815 813->815 814->813 816 eedbf9-eedc04 FindClose 814->816 816->815
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,"R), ref: 00EEDBCE
                                                      • GetFileAttributesW.KERNELBASE(?), ref: 00EEDBDD
                                                      • FindFirstFileW.KERNELBASE(?,?), ref: 00EEDBEE
                                                      • FindClose.KERNEL32(00000000), ref: 00EEDBFA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: FileFind$AttributesCloseFirstlstrlen
                                                      • String ID: "R
                                                      • API String ID: 2695905019-1746183819
                                                      • Opcode ID: 8f779e0729fe2b9794303380af241f38dce9ae2b41f63c614fe7941d7a3ace93
                                                      • Instruction ID: b2f5408e92280e119150d6d7e8134a50412e47f41f34d281d4f70d6fbc6d5851
                                                      • Opcode Fuzzy Hash: 8f779e0729fe2b9794303380af241f38dce9ae2b41f63c614fe7941d7a3ace93
                                                      • Instruction Fuzzy Hash: 50F0E53085895C6782206B7CAC0D8EAB76C9E01378B219702F836D20F0EBB15D64D6D6
                                                      APIs
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00E82B6B
                                                        • Part of subcall function 00E83A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00F51418,?,00E82E7F,?,?,?,00000000), ref: 00E83A78
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                      • GetForegroundWindow.USER32(runas,?,?,?,?,?,00F42224), ref: 00EC2C10
                                                      • ShellExecuteW.SHELL32(00000000,?,?,00F42224), ref: 00EC2C17
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                      • String ID: runas
                                                      • API String ID: 448630720-4000483414
                                                      • Opcode ID: 40b36b71ae78d840f4d6a33fe3a5ab89635744c13e074bb5edaac9e286efa997
                                                      • Instruction ID: 30f95a4977973a426db68fce03385f2efab597d50af28012a5ab1eec15631c3f
                                                      • Opcode Fuzzy Hash: 40b36b71ae78d840f4d6a33fe3a5ab89635744c13e074bb5edaac9e286efa997
                                                      • Instruction Fuzzy Hash: 1C11D6315083056AC704FF70D851EBEBBE4AB91745F44342DF64E720E3CF259A4AA752
                                                      APIs
                                                      • GetInputState.USER32 ref: 00E8D807
                                                      • timeGetTime.WINMM ref: 00E8DA07
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E8DB28
                                                      • TranslateMessage.USER32(?), ref: 00E8DB7B
                                                      • DispatchMessageW.USER32(?), ref: 00E8DB89
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E8DB9F
                                                      • Sleep.KERNEL32(0000000A), ref: 00E8DBB1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                      • String ID:
                                                      • API String ID: 2189390790-0
                                                      • Opcode ID: 0f4ed526f085a6cea38b2319cb5aaaf59ea706f45e1d1c90ef7795177d5a4c4c
                                                      • Instruction ID: f7aaba9fc0867f717b1e88739617615836d75578b5fc9d80864ad5931e0a2369
                                                      • Opcode Fuzzy Hash: 0f4ed526f085a6cea38b2319cb5aaaf59ea706f45e1d1c90ef7795177d5a4c4c
                                                      • Instruction Fuzzy Hash: F742FF30608341AFD728EB24CC44BAAB7E0FF85318F14A65EE55DA73D1D7B0A845DB82

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00E82D07
                                                      • RegisterClassExW.USER32(00000030), ref: 00E82D31
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E82D42
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00E82D5F
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E82D6F
                                                      • LoadIconW.USER32(000000A9), ref: 00E82D85
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E82D94
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-1005189915
                                                      • Opcode ID: 5a41d85c0a20967af79f75443e99d32f32f061b51e85c65d631131acba0b7d4b
                                                      • Instruction ID: dc9081884853eb00f15e9130fdce910869deb48f24791844c928cafbe381bc09
                                                      • Opcode Fuzzy Hash: 5a41d85c0a20967af79f75443e99d32f32f061b51e85c65d631131acba0b7d4b
                                                      • Instruction Fuzzy Hash: C821C0B594131CAFDB00DFA4E889BDDBBB4FB08701F01811AF611A62A0D7B55544EF91

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 303 eb8d45-eb8d55 304 eb8d6f-eb8d71 303->304 305 eb8d57-eb8d6a call eaf2c6 call eaf2d9 303->305 306 eb90d9-eb90e6 call eaf2c6 call eaf2d9 304->306 307 eb8d77-eb8d7d 304->307 319 eb90f1 305->319 324 eb90ec call eb27ec 306->324 307->306 309 eb8d83-eb8dae 307->309 309->306 312 eb8db4-eb8dbd 309->312 316 eb8dbf-eb8dd2 call eaf2c6 call eaf2d9 312->316 317 eb8dd7-eb8dd9 312->317 316->324 322 eb8ddf-eb8de3 317->322 323 eb90d5-eb90d7 317->323 325 eb90f4-eb90f9 319->325 322->323 327 eb8de9-eb8ded 322->327 323->325 324->319 327->316 330 eb8def-eb8e06 327->330 332 eb8e08-eb8e0b 330->332 333 eb8e23-eb8e2c 330->333 336 eb8e0d-eb8e13 332->336 337 eb8e15-eb8e1e 332->337 334 eb8e4a-eb8e54 333->334 335 eb8e2e-eb8e45 call eaf2c6 call eaf2d9 call eb27ec 333->335 340 eb8e5b-eb8e79 call eb3820 call eb29c8 * 2 334->340 341 eb8e56-eb8e58 334->341 367 eb900c 335->367 336->335 336->337 338 eb8ebf-eb8ed9 337->338 343 eb8edf-eb8eef 338->343 344 eb8fad-eb8fb6 call ebf89b 338->344 371 eb8e7b-eb8e91 call eaf2d9 call eaf2c6 340->371 372 eb8e96-eb8ebc call eb9424 340->372 341->340 343->344 348 eb8ef5-eb8ef7 343->348 355 eb9029 344->355 356 eb8fb8-eb8fca 344->356 348->344 352 eb8efd-eb8f23 348->352 352->344 357 eb8f29-eb8f3c 352->357 359 eb902d-eb9045 ReadFile 355->359 356->355 361 eb8fcc-eb8fdb GetConsoleMode 356->361 357->344 362 eb8f3e-eb8f40 357->362 365 eb90a1-eb90ac GetLastError 359->365 366 eb9047-eb904d 359->366 361->355 368 eb8fdd-eb8fe1 361->368 362->344 369 eb8f42-eb8f6d 362->369 373 eb90ae-eb90c0 call eaf2d9 call eaf2c6 365->373 374 eb90c5-eb90c8 365->374 366->365 375 eb904f 366->375 377 eb900f-eb9019 call eb29c8 367->377 368->359 376 eb8fe3-eb8ffd ReadConsoleW 368->376 369->344 370 eb8f6f-eb8f82 369->370 370->344 379 eb8f84-eb8f86 370->379 371->367 372->338 373->367 386 eb90ce-eb90d0 374->386 387 eb9005-eb900b call eaf2a3 374->387 383 eb9052-eb9064 375->383 384 eb8fff GetLastError 376->384 385 eb901e-eb9027 376->385 377->325 379->344 389 eb8f88-eb8fa8 379->389 383->377 393 eb9066-eb906a 383->393 384->387 385->383 386->377 387->367 389->344 397 eb906c-eb907c call eb8a61 393->397 398 eb9083-eb908e 393->398 410 eb907f-eb9081 397->410 403 eb909a-eb909f call eb88a1 398->403 404 eb9090 call eb8bb1 398->404 408 eb9095-eb9098 403->408 404->408 408->410 410->377
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .
                                                      • API String ID: 0-3963672497
                                                      • Opcode ID: c98949c2988f813fde068a35a0ff9857f8e1c697f2f671bac4f105ad659da3cc
                                                      • Instruction ID: b20468182793d2102172766b4e9e337ac9a1dbf3537024f7e6a116adfc2efae3
                                                      • Opcode Fuzzy Hash: c98949c2988f813fde068a35a0ff9857f8e1c697f2f671bac4f105ad659da3cc
                                                      • Instruction Fuzzy Hash: 5CC1E474A04249AFDB11EFA8D841BEEBBF4AF49314F185159F614BB393CB309941CB61

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 411 ec065b-ec068b call ec042f 414 ec068d-ec0698 call eaf2c6 411->414 415 ec06a6-ec06b2 call eb5221 411->415 420 ec069a-ec06a1 call eaf2d9 414->420 421 ec06cb-ec0714 call ec039a 415->421 422 ec06b4-ec06c9 call eaf2c6 call eaf2d9 415->422 429 ec097d-ec0983 420->429 431 ec0716-ec071f 421->431 432 ec0781-ec078a GetFileType 421->432 422->420 436 ec0756-ec077c GetLastError call eaf2a3 431->436 437 ec0721-ec0725 431->437 433 ec078c-ec07bd GetLastError call eaf2a3 CloseHandle 432->433 434 ec07d3-ec07d6 432->434 433->420 450 ec07c3-ec07ce call eaf2d9 433->450 441 ec07df-ec07e5 434->441 442 ec07d8-ec07dd 434->442 436->420 437->436 438 ec0727-ec0754 call ec039a 437->438 438->432 438->436 443 ec07e9-ec0837 call eb516a 441->443 444 ec07e7 441->444 442->443 453 ec0839-ec0845 call ec05ab 443->453 454 ec0847-ec086b call ec014d 443->454 444->443 450->420 453->454 460 ec086f-ec0879 call eb86ae 453->460 461 ec086d 454->461 462 ec087e-ec08c1 454->462 460->429 461->460 464 ec08e2-ec08f0 462->464 465 ec08c3-ec08c7 462->465 467 ec097b 464->467 468 ec08f6-ec08fa 464->468 465->464 466 ec08c9-ec08dd 465->466 466->464 467->429 468->467 470 ec08fc-ec092f CloseHandle call ec039a 468->470 473 ec0931-ec095d GetLastError call eaf2a3 call eb5333 470->473 474 ec0963-ec0977 470->474 473->474 474->467
                                                      APIs
                                                        • Part of subcall function 00EC039A: CreateFileW.KERNELBASE(00000000,00000000,?,00EC0704,?,?,00000000,?,00EC0704,00000000,0000000C), ref: 00EC03B7
                                                      • GetLastError.KERNEL32 ref: 00EC076F
                                                      • __dosmaperr.LIBCMT ref: 00EC0776
                                                      • GetFileType.KERNELBASE(00000000), ref: 00EC0782
                                                      • GetLastError.KERNEL32 ref: 00EC078C
                                                      • __dosmaperr.LIBCMT ref: 00EC0795
                                                      • CloseHandle.KERNEL32(00000000), ref: 00EC07B5
                                                      • CloseHandle.KERNEL32(?), ref: 00EC08FF
                                                      • GetLastError.KERNEL32 ref: 00EC0931
                                                      • __dosmaperr.LIBCMT ref: 00EC0938
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                      • String ID: H
                                                      • API String ID: 4237864984-2852464175
                                                      • Opcode ID: 65bb2cda94358ff4ddfd7fbd69029cdbf7154b87b6bd089f78db07eef2fcbb9c
                                                      • Instruction ID: df31f2a81efd6d46a08f57eeaa6d9763410f0ea1d985ca42b051cbb0d03fb23b
                                                      • Opcode Fuzzy Hash: 65bb2cda94358ff4ddfd7fbd69029cdbf7154b87b6bd089f78db07eef2fcbb9c
                                                      • Instruction Fuzzy Hash: A0A12532A002088FDF19AF68D951BAE7BE0EB46324F14515DF815AF2A1DB329913DB91

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00E83A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00F51418,?,00E82E7F,?,?,?,00000000), ref: 00E83A78
                                                        • Part of subcall function 00E83357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00E83379
                                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00E8356A
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00EC318D
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00EC31CE
                                                      • RegCloseKey.ADVAPI32(?), ref: 00EC3210
                                                      • _wcslen.LIBCMT ref: 00EC3277
                                                      • _wcslen.LIBCMT ref: 00EC3286
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                      • API String ID: 98802146-2727554177
                                                      • Opcode ID: 494bf31ed9e31790b11ee98d9f88a8434a0977405507fa9b277584168c47dd7f
                                                      • Instruction ID: 35a6cce0efda4fea8ba6e446df9f846f9fffe8dd8ec704996049cd4e62540af1
                                                      • Opcode Fuzzy Hash: 494bf31ed9e31790b11ee98d9f88a8434a0977405507fa9b277584168c47dd7f
                                                      • Instruction Fuzzy Hash: 4F71C0714083059EC704EF65DC819ABBBE8FF8A740F40562EF649A71B1EB319A48DB52

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00E82B8E
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00E82B9D
                                                      • LoadIconW.USER32(00000063), ref: 00E82BB3
                                                      • LoadIconW.USER32(000000A4), ref: 00E82BC5
                                                      • LoadIconW.USER32(000000A2), ref: 00E82BD7
                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00E82BEF
                                                      • RegisterClassExW.USER32(?), ref: 00E82C40
                                                        • Part of subcall function 00E82CD4: GetSysColorBrush.USER32(0000000F), ref: 00E82D07
                                                        • Part of subcall function 00E82CD4: RegisterClassExW.USER32(00000030), ref: 00E82D31
                                                        • Part of subcall function 00E82CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E82D42
                                                        • Part of subcall function 00E82CD4: InitCommonControlsEx.COMCTL32(?), ref: 00E82D5F
                                                        • Part of subcall function 00E82CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E82D6F
                                                        • Part of subcall function 00E82CD4: LoadIconW.USER32(000000A9), ref: 00E82D85
                                                        • Part of subcall function 00E82CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E82D94
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                      • String ID: #$0$AutoIt v3
                                                      • API String ID: 423443420-4155596026
                                                      • Opcode ID: 47e938b6b2a22d40ef605803b839e663e27693cb22c2be5b25310deaaaa5f66d
                                                      • Instruction ID: ca3e3018075aa390411999b7983d1dc80f74e5833b09e457fb344828cfb62086
                                                      • Opcode Fuzzy Hash: 47e938b6b2a22d40ef605803b839e663e27693cb22c2be5b25310deaaaa5f66d
                                                      • Instruction Fuzzy Hash: 41215E70E4031CAFDB109FA5EC65BAE7FB4FB48B51F01415AF604A66A0D3B12940EF90

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 552 e83170-e83185 553 e831e5-e831e7 552->553 554 e83187-e8318a 552->554 553->554 557 e831e9 553->557 555 e831eb 554->555 556 e8318c-e83193 554->556 561 ec2dfb-ec2e23 call e818e2 call e9e499 555->561 562 e831f1-e831f6 555->562 558 e83199-e8319e 556->558 559 e83265-e8326d PostQuitMessage 556->559 560 e831d0-e831d8 DefWindowProcW 557->560 564 ec2e7c-ec2e90 call eebf30 558->564 565 e831a4-e831a8 558->565 567 e83219-e8321b 559->567 566 e831de-e831e4 560->566 596 ec2e28-ec2e2f 561->596 568 e831f8-e831fb 562->568 569 e8321d-e83244 SetTimer RegisterWindowMessageW 562->569 564->567 590 ec2e96 564->590 571 ec2e68-ec2e72 call eec161 565->571 572 e831ae-e831b3 565->572 567->566 575 ec2d9c-ec2d9f 568->575 576 e83201-e83214 KillTimer call e830f2 call e83c50 568->576 569->567 573 e83246-e83251 CreatePopupMenu 569->573 586 ec2e77 571->586 579 ec2e4d-ec2e54 572->579 580 e831b9-e831be 572->580 573->567 582 ec2dd7-ec2df6 MoveWindow 575->582 583 ec2da1-ec2da5 575->583 576->567 579->560 593 ec2e5a-ec2e63 call ee0ad7 579->593 588 e83253-e83263 call e8326f 580->588 589 e831c4-e831ca 580->589 582->567 591 ec2dc6-ec2dd2 SetFocus 583->591 592 ec2da7-ec2daa 583->592 586->567 588->567 589->560 589->596 590->560 591->567 592->589 597 ec2db0-ec2dc1 call e818e2 592->597 593->560 596->560 601 ec2e35-ec2e48 call e830f2 call e83837 596->601 597->567 601->560
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00E8316A,?,?), ref: 00E831D8
                                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,00E8316A,?,?), ref: 00E83204
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E83227
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00E8316A,?,?), ref: 00E83232
                                                      • CreatePopupMenu.USER32 ref: 00E83246
                                                      • PostQuitMessage.USER32(00000000), ref: 00E83267
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                      • String ID: TaskbarCreated
                                                      • API String ID: 129472671-2362178303
                                                      • Opcode ID: 84aa61e52c52440e27c721453dc839d9948cd68b00c56ad3f279b026ce6df10c
                                                      • Instruction ID: e1ea18cc51a4aeaa1f439c50b153dbaddb48b574a8801c999cfaf6372d89279e
                                                      • Opcode Fuzzy Hash: 84aa61e52c52440e27c721453dc839d9948cd68b00c56ad3f279b026ce6df10c
                                                      • Instruction Fuzzy Hash: 8D414B31240308ABDB153B789D1DBFD3A59F706F09F046119FB0EB51E2D7B1AA41A7A1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 608 174f458-174f506 call 174ce78 611 174f50d-174f533 call 1750368 CreateFileW 608->611 614 174f535 611->614 615 174f53a-174f54a 611->615 616 174f685-174f689 614->616 622 174f551-174f56b VirtualAlloc 615->622 623 174f54c 615->623 618 174f6cb-174f6ce 616->618 619 174f68b-174f68f 616->619 624 174f6d1-174f6d8 618->624 620 174f691-174f694 619->620 621 174f69b-174f69f 619->621 620->621 625 174f6a1-174f6ab 621->625 626 174f6af-174f6b3 621->626 627 174f572-174f589 ReadFile 622->627 628 174f56d 622->628 623->616 629 174f72d-174f742 624->629 630 174f6da-174f6e5 624->630 625->626 633 174f6b5-174f6bf 626->633 634 174f6c3 626->634 635 174f590-174f5d0 VirtualAlloc 627->635 636 174f58b 627->636 628->616 631 174f744-174f74f VirtualFree 629->631 632 174f752-174f75a 629->632 637 174f6e7 630->637 638 174f6e9-174f6f5 630->638 631->632 633->634 634->618 639 174f5d7-174f5f2 call 17505b8 635->639 640 174f5d2 635->640 636->616 637->629 641 174f6f7-174f707 638->641 642 174f709-174f715 638->642 648 174f5fd-174f607 639->648 640->616 643 174f72b 641->643 644 174f717-174f720 642->644 645 174f722-174f728 642->645 643->624 644->643 645->643 649 174f609-174f638 call 17505b8 648->649 650 174f63a-174f64e call 17503c8 648->650 649->648 656 174f650 650->656 657 174f652-174f656 650->657 656->616 658 174f662-174f666 657->658 659 174f658-174f65c CloseHandle 657->659 660 174f676-174f67f 658->660 661 174f668-174f673 VirtualFree 658->661 659->658 660->611 660->616 661->660
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0174F529
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0174F74F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1727069683.000000000174C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0174C000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_174c000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CreateFileFreeVirtual
                                                      • String ID:
                                                      • API String ID: 204039940-0
                                                      • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                      • Instruction ID: d93589165188e97dc6094775575c2a24ea4f7e108728dd31b3dbe63f16d79e19
                                                      • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                      • Instruction Fuzzy Hash: 95A1F874E00209EBDB14CFA8C994BAEFBB5FF48304F208199E611BB291D7759A41CF95

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 672 e82c63-e82cd3 CreateWindowExW * 2 ShowWindow * 2
                                                      APIs
                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E82C91
                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E82CB2
                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00E81CAD,?), ref: 00E82CC6
                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00E81CAD,?), ref: 00E82CCF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateShow
                                                      • String ID: AutoIt v3$edit
                                                      • API String ID: 1584632944-3779509399
                                                      • Opcode ID: a648c142c68f59e505f13e4ef55c705515facfd7b8e571af58c41d2bdf56f6c9
                                                      • Instruction ID: 674c4e1776c30cc57da9db59ae40bfa08f8473b7a5152ccbc36402bf0da6746d
                                                      • Opcode Fuzzy Hash: a648c142c68f59e505f13e4ef55c705515facfd7b8e571af58c41d2bdf56f6c9
                                                      • Instruction Fuzzy Hash: CDF0B7755813987AEB211717AC18FB73EBDE7C6F61B02405EFA00A65A0C6626850EAB4

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 787 174f228-174f359 call 174ce78 call 174f118 CreateFileW 794 174f360-174f370 787->794 795 174f35b 787->795 798 174f377-174f391 VirtualAlloc 794->798 799 174f372 794->799 796 174f410-174f415 795->796 800 174f395-174f3ac ReadFile 798->800 801 174f393 798->801 799->796 802 174f3b0-174f3ea call 174f158 call 174e118 800->802 803 174f3ae 800->803 801->796 808 174f406-174f40e ExitProcess 802->808 809 174f3ec-174f401 call 174f1a8 802->809 803->796 808->796 809->808
                                                      APIs
                                                        • Part of subcall function 0174F118: Sleep.KERNELBASE(000001F4), ref: 0174F129
                                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0174F34F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1727069683.000000000174C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0174C000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_174c000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CreateFileSleep
                                                      • String ID: 2RH74DREGKZJA9RKH4WRAI
                                                      • API String ID: 2694422964-2648278133
                                                      • Opcode ID: 1e22f49baacddfc2c86f71f393057abab0ca676b6ee03ac2d206785de90c66fd
                                                      • Instruction ID: be47135d203a22be8b0a294da8a01f199b45571773d91c592ad8bfdeb78081df
                                                      • Opcode Fuzzy Hash: 1e22f49baacddfc2c86f71f393057abab0ca676b6ee03ac2d206785de90c66fd
                                                      • Instruction Fuzzy Hash: A651C370D04289DBEF11DBA8C859BEEFBB4AF19304F004199E2087B2C1D7B91B44CB66

                                                      Control-flow Graph

                                                      APIs
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EF2C05
                                                      • DeleteFileW.KERNEL32(?), ref: 00EF2C87
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00EF2C9D
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EF2CAE
                                                      • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EF2CC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: File$Delete$Copy
                                                      • String ID:
                                                      • API String ID: 3226157194-0
                                                      • Opcode ID: 746b7fd6dc06fbf850a33226e636ce6ba0364cf168a017f5499ff7be5e330cdb
                                                      • Instruction ID: 9e193032a7f88af0b703ba1ff65a8e2b51d1338ec1d70f6879d44e5e29155316
                                                      • Opcode Fuzzy Hash: 746b7fd6dc06fbf850a33226e636ce6ba0364cf168a017f5499ff7be5e330cdb
                                                      • Instruction Fuzzy Hash: 3FB13D7290011DABDF11EBA4CC85EEEBBBDEF49350F1050AAF609F6151EB319A448B61

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 923 eb5aa9-eb5ace 924 eb5ad0-eb5ad2 923->924 925 eb5ad7-eb5ad9 923->925 926 eb5ca5-eb5cb4 call ea0a8c 924->926 927 eb5adb-eb5af5 call eaf2c6 call eaf2d9 call eb27ec 925->927 928 eb5afa-eb5b1f 925->928 927->926 930 eb5b21-eb5b24 928->930 931 eb5b26-eb5b2c 928->931 930->931 934 eb5b4e-eb5b53 930->934 935 eb5b4b 931->935 936 eb5b2e-eb5b46 call eaf2c6 call eaf2d9 call eb27ec 931->936 939 eb5b55-eb5b61 call eb9424 934->939 940 eb5b64-eb5b6d call eb564e 934->940 935->934 969 eb5c9c-eb5c9f 936->969 939->940 951 eb5ba8-eb5bba 940->951 952 eb5b6f-eb5b71 940->952 955 eb5bbc-eb5bc2 951->955 956 eb5c02-eb5c23 WriteFile 951->956 957 eb5b73-eb5b78 952->957 958 eb5b95-eb5b9e call eb542e 952->958 963 eb5bf2-eb5c00 call eb56c4 955->963 964 eb5bc4-eb5bc7 955->964 960 eb5c2e 956->960 961 eb5c25-eb5c2b GetLastError 956->961 965 eb5b7e-eb5b8b call eb55e1 957->965 966 eb5c6c-eb5c7e 957->966 970 eb5ba3-eb5ba6 958->970 971 eb5c31-eb5c3c 960->971 961->960 963->970 972 eb5bc9-eb5bcc 964->972 973 eb5be2-eb5bf0 call eb5891 964->973 978 eb5b8e-eb5b90 965->978 967 eb5c89-eb5c99 call eaf2d9 call eaf2c6 966->967 968 eb5c80-eb5c83 966->968 967->969 968->967 976 eb5c85-eb5c87 968->976 982 eb5ca4 969->982 970->978 979 eb5c3e-eb5c43 971->979 980 eb5ca1 971->980 972->966 981 eb5bd2-eb5be0 call eb57a3 972->981 973->970 976->982 978->971 987 eb5c69 979->987 988 eb5c45-eb5c4a 979->988 980->982 981->970 982->926 987->966 992 eb5c4c-eb5c5e call eaf2d9 call eaf2c6 988->992 993 eb5c60-eb5c67 call eaf2a3 988->993 992->969 993->969
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: JO
                                                      • API String ID: 0-1663374661
                                                      • Opcode ID: a511482d45667dd96f8b332f3eba26e2f2ee7bcbc8ae635dca77e4af467e065d
                                                      • Instruction ID: 7ad9559d7db4585837eec8fa9204c3c6a3369178b62ba129d91d7dc4b937a653
                                                      • Opcode Fuzzy Hash: a511482d45667dd96f8b332f3eba26e2f2ee7bcbc8ae635dca77e4af467e065d
                                                      • Instruction Fuzzy Hash: 8A5191729006099BCB11AFA4C885FEFBFF9AF49314F14215AF405BB291D73199019BA1
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00E83B0F,SwapMouseButtons,00000004,?), ref: 00E83B40
                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00E83B0F,SwapMouseButtons,00000004,?), ref: 00E83B61
                                                      • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00E83B0F,SwapMouseButtons,00000004,?), ref: 00E83B83
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: Control Panel\Mouse
                                                      • API String ID: 3677997916-824357125
                                                      • Opcode ID: 72ca1f873657b8b48de6267b7f6a90a6df0610b3aa15c46a00b60fda8cef1f9e
                                                      • Instruction ID: 1b13d9f4718bbcfc3836fa7c41ca0a910c21bdab0fd455a23e3b0dab9d99d47c
                                                      • Opcode Fuzzy Hash: 72ca1f873657b8b48de6267b7f6a90a6df0610b3aa15c46a00b60fda8cef1f9e
                                                      • Instruction Fuzzy Hash: 67112AB5510208FFDB20DFA5DC44AEEBBB9EF04B84B109459A809E7110E2319F40A7A0
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 0174E945
                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0174E969
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0174E98B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1727069683.000000000174C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0174C000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_174c000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                      • String ID:
                                                      • API String ID: 2438371351-0
                                                      • Opcode ID: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                      • Instruction ID: f6a867bba1f0c2b81a0962b99700d7548835fbe693c7f95eaffb83ad81719f76
                                                      • Opcode Fuzzy Hash: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                      • Instruction Fuzzy Hash: FA62EC30A142589BEB24CFA4C854BDEB776FF58300F1091A9D10DEB394EB799E81CB59
                                                      Strings
                                                      • Variable must be of type 'Object'., xrefs: 00ED32B7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Variable must be of type 'Object'.
                                                      • API String ID: 0-109567571
                                                      • Opcode ID: 473fc311d5e95ddf3bfba15efad96ed795f8628becd8c2277bad7a1ed3747342
                                                      • Instruction ID: e3cac6b98da647a17a67c3b4d940f5d7c64b116869949703aed03598b885400c
                                                      • Opcode Fuzzy Hash: 473fc311d5e95ddf3bfba15efad96ed795f8628becd8c2277bad7a1ed3747342
                                                      • Instruction Fuzzy Hash: 98C26971A00215CFCB24EF68C881AADB7F1FB09314F24956AE919BB3A1D375ED41CB91
                                                      APIs
                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00EC33A2
                                                        • Part of subcall function 00E86B57: _wcslen.LIBCMT ref: 00E86B6A
                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E83A04
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: IconLoadNotifyShell_String_wcslen
                                                      • String ID: Line:
                                                      • API String ID: 2289894680-1585850449
                                                      • Opcode ID: 0de5e720906431fbf2133cd03ddf4239b302456ce7f376ac5c472d8ba4942ba7
                                                      • Instruction ID: 46300efbda7ecdaca63c802952e0c29a8df2890dba7e9cd8ce41fd198ab4c09f
                                                      • Opcode Fuzzy Hash: 0de5e720906431fbf2133cd03ddf4239b302456ce7f376ac5c472d8ba4942ba7
                                                      • Instruction Fuzzy Hash: EF31C371508304AAD725FB20DC45BEBB7D8AB84B14F00692EF69DA2091EB74A649C7C2
                                                      APIs
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00EA0668
                                                        • Part of subcall function 00EA32A4: RaiseException.KERNEL32(?,?,?,00EA068A,?,00F51444,?,?,?,?,?,?,00EA068A,00E81129,00F48738,00E81129), ref: 00EA3304
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00EA0685
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                      • String ID: Unknown exception
                                                      • API String ID: 3476068407-410509341
                                                      • Opcode ID: 2b93c92e630efdb226c1f6836a7389f2ba39191ffce21abaf022da273f54005c
                                                      • Instruction ID: 76a92a9bb0db1e7e346a004267e6f5a2173d4d5a283ddfb80464e4f7e9973dcb
                                                      • Opcode Fuzzy Hash: 2b93c92e630efdb226c1f6836a7389f2ba39191ffce21abaf022da273f54005c
                                                      • Instruction Fuzzy Hash: 1AF0C23490020D778F00B6B4D856DAE7BAC5E4A358B605131F814FE9E2EF71FA66C5D1
                                                      APIs
                                                      • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00EF302F
                                                      • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00EF3044
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Temp$FileNamePath
                                                      • String ID: aut
                                                      • API String ID: 3285503233-3010740371
                                                      • Opcode ID: 485be7ee63fc9e0d1f83b324680a85d4374bb6033cb724bf3775a043ea2fc2a1
                                                      • Instruction ID: b1dae01cee86c5264dfcd6383f3634925e040678e4a6e32d9a6c4b7a5db013ce
                                                      • Opcode Fuzzy Hash: 485be7ee63fc9e0d1f83b324680a85d4374bb6033cb724bf3775a043ea2fc2a1
                                                      • Instruction Fuzzy Hash: 61D05EB254032867DA20A7A4AC0EFCB3A6CDB05750F0002A1BA55E2091DAF4D984CAD1
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00F082F5
                                                      • TerminateProcess.KERNEL32(00000000), ref: 00F082FC
                                                      • FreeLibrary.KERNEL32(?,?,?,?), ref: 00F084DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentFreeLibraryTerminate
                                                      • String ID:
                                                      • API String ID: 146820519-0
                                                      • Opcode ID: f0a84502bc07d791de548810d3df824830b004db7c675684d2f847995c046937
                                                      • Instruction ID: d91c0fce233ded46076ddb35746a47d44266acc6ff0974087c512cbdbbaf715c
                                                      • Opcode Fuzzy Hash: f0a84502bc07d791de548810d3df824830b004db7c675684d2f847995c046937
                                                      • Instruction Fuzzy Hash: 26128D71A083019FC714DF28C484B2ABBE1BF84364F14895DE8899B392CB31ED46DF92
                                                      APIs
                                                        • Part of subcall function 00E81BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E81BF4
                                                        • Part of subcall function 00E81BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00E81BFC
                                                        • Part of subcall function 00E81BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E81C07
                                                        • Part of subcall function 00E81BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E81C12
                                                        • Part of subcall function 00E81BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00E81C1A
                                                        • Part of subcall function 00E81BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00E81C22
                                                        • Part of subcall function 00E81B4A: RegisterWindowMessageW.USER32(00000004,?,00E812C4), ref: 00E81BA2
                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00E8136A
                                                      • OleInitialize.OLE32 ref: 00E81388
                                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 00EC24AB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                      • String ID:
                                                      • API String ID: 1986988660-0
                                                      • Opcode ID: 1077661e27d8df96c015ff05f6f81820fd39fc6403c80547cc1c5844c45aff60
                                                      • Instruction ID: 86abb9199ff8b4ffa4178647cf9fc86db1778f7719c88ff6eb88c8a0a536ab38
                                                      • Opcode Fuzzy Hash: 1077661e27d8df96c015ff05f6f81820fd39fc6403c80547cc1c5844c45aff60
                                                      • Instruction Fuzzy Hash: 3471EDB49013088FC794EF79A9417953AE4BB89347B58962AD60ED7362FB306845EF40
                                                      APIs
                                                        • Part of subcall function 00E83923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E83A04
                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00EEC259
                                                      • KillTimer.USER32(?,00000001,?,?), ref: 00EEC261
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00EEC270
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_Timer$Kill
                                                      • String ID:
                                                      • API String ID: 3500052701-0
                                                      • Opcode ID: 43afb788b6d237f5111a05f0fccf6614704838b9c97f8a42cbeb65e8fc6554fb
                                                      • Instruction ID: 2571cf161b2af8446e86bb491b0fb8dcf4273164e591020ef786d138a0647d99
                                                      • Opcode Fuzzy Hash: 43afb788b6d237f5111a05f0fccf6614704838b9c97f8a42cbeb65e8fc6554fb
                                                      • Instruction Fuzzy Hash: 5631D470904788AFEB229B648855BE6BBECAB0A308F10109DD29EA7251C3745A85CB51
                                                      APIs
                                                      • CloseHandle.KERNELBASE(00000000,00000000,?,?,00EB85CC,?,00F48CC8,0000000C), ref: 00EB8704
                                                      • GetLastError.KERNEL32(?,00EB85CC,?,00F48CC8,0000000C), ref: 00EB870E
                                                      • __dosmaperr.LIBCMT ref: 00EB8739
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLast__dosmaperr
                                                      • String ID:
                                                      • API String ID: 2583163307-0
                                                      • Opcode ID: 3119f523233a74476db04b6e7b21110df89245cd764a72c5e53a8974aa89e1b6
                                                      • Instruction ID: de3054e506043aa4cef2aa8fe58051476163af55b8f9ad8731568ce35111f0d7
                                                      • Opcode Fuzzy Hash: 3119f523233a74476db04b6e7b21110df89245cd764a72c5e53a8974aa89e1b6
                                                      • Instruction Fuzzy Hash: D901083360562026D6647234AA457EF67CD4B8277CF392129E814BB3D6DEA08C81D590
                                                      APIs
                                                      • TranslateMessage.USER32(?), ref: 00E8DB7B
                                                      • DispatchMessageW.USER32(?), ref: 00E8DB89
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E8DB9F
                                                      • Sleep.KERNEL32(0000000A), ref: 00E8DBB1
                                                      • TranslateAcceleratorW.USER32(?,?,?), ref: 00ED1CC9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                      • String ID:
                                                      • API String ID: 3288985973-0
                                                      • Opcode ID: ff59c5bfc061aa99ce71c01a70824f5a6bbdd6d39ed375c22904112d301e3143
                                                      • Instruction ID: 250cdc0129f8819b17eefd01e131e93e7dd9d28f464b3283d12dd95ac4de981b
                                                      • Opcode Fuzzy Hash: ff59c5bfc061aa99ce71c01a70824f5a6bbdd6d39ed375c22904112d301e3143
                                                      • Instruction Fuzzy Hash: 79F082306483449BEB34DB70CC49FEA73ADEB44315F105919E60EE30C0DB70A488DB55
                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00EF2CD4,?,?,?,00000004,00000001), ref: 00EF2FF2
                                                      • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00EF2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00EF3006
                                                      • CloseHandle.KERNEL32(00000000,?,00EF2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00EF300D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleTime
                                                      • String ID:
                                                      • API String ID: 3397143404-0
                                                      • Opcode ID: 1e9bf152af2a17ebd3087ab0c0e48c3adebe604eede22a58e82343c75988b168
                                                      • Instruction ID: 7530d09d6eb2a15fb1f6cb651623b7c1c9bfc27e4cd52ce764b449df6df2e29f
                                                      • Opcode Fuzzy Hash: 1e9bf152af2a17ebd3087ab0c0e48c3adebe604eede22a58e82343c75988b168
                                                      • Instruction Fuzzy Hash: A9E086322C022877E2302765BC0DFDB3A1CD786B75F118210F769750D186A0160152E8
                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 00E917F6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Init_thread_footer
                                                      • String ID: CALL
                                                      • API String ID: 1385522511-4196123274
                                                      • Opcode ID: 1a42ea8a29ad7d601eea231ee9e80e53f18e10602d41d1636254495ee1330564
                                                      • Instruction ID: e997a6c3a35e9588c5e34038ce9ae514bbbd4522c9f23325f40217b875877d48
                                                      • Opcode Fuzzy Hash: 1a42ea8a29ad7d601eea231ee9e80e53f18e10602d41d1636254495ee1330564
                                                      • Instruction Fuzzy Hash: D3226C706083429FCB14DF14C480A6ABBF1FF89314F19999DF496AB3A2D771E845CB92
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 00EF6F6B
                                                        • Part of subcall function 00E84ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00F51418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E84EFD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad_wcslen
                                                      • String ID: >>>AUTOIT SCRIPT<<<
                                                      • API String ID: 3312870042-2806939583
                                                      • Opcode ID: 2d7c5a310ddcbc59c85f861aed8045cf042d37caf4f036693ba95bf8a4ad01ab
                                                      • Instruction ID: 6571c5d8e0acb794d2569c55f638333cea83c1ea789710dd3899ff3c977a151a
                                                      • Opcode Fuzzy Hash: 2d7c5a310ddcbc59c85f861aed8045cf042d37caf4f036693ba95bf8a4ad01ab
                                                      • Instruction Fuzzy Hash: 42B170712082058FDB14FF20C49197EB7E5AF94304F14996DF59EA72A2EB30ED49CB92
                                                      APIs
                                                      • GetOpenFileNameW.COMDLG32(?), ref: 00EC2C8C
                                                        • Part of subcall function 00E83AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E83A97,?,?,00E82E7F,?,?,?,00000000), ref: 00E83AC2
                                                        • Part of subcall function 00E82DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00E82DC4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Name$Path$FileFullLongOpen
                                                      • String ID: X
                                                      • API String ID: 779396738-3081909835
                                                      • Opcode ID: b993dd09a8cf8b36296bec006840525053d4052fe89f664e6c224af7c8c90df4
                                                      • Instruction ID: efc2f9ab7c2c7f2fd95938c4fa48f595b35607ee43d1ef29573aeff78f889c09
                                                      • Opcode Fuzzy Hash: b993dd09a8cf8b36296bec006840525053d4052fe89f664e6c224af7c8c90df4
                                                      • Instruction Fuzzy Hash: F9219371A002589BDF01EF94C845BEE7BF8AF49715F00905DE50DFB241DBB45A498BA1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock
                                                      • String ID: EA06
                                                      • API String ID: 2638373210-3962188686
                                                      • Opcode ID: 17935d170330e1f9ddf7caac1cd7ee639d883e145ae1fa02ad77fc23ecd8c179
                                                      • Instruction ID: e209e487a4c4b156fe1bb6e4847bb70405b2f440b0e37d6d3e87292178ee09b9
                                                      • Opcode Fuzzy Hash: 17935d170330e1f9ddf7caac1cd7ee639d883e145ae1fa02ad77fc23ecd8c179
                                                      • Instruction Fuzzy Hash: F401B5729042587EDF18C7A8C856EFEBBF8DB06305F00459EE652E6181E5B8E7088B61
                                                      APIs
                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E83908
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_
                                                      • String ID:
                                                      • API String ID: 1144537725-0
                                                      • Opcode ID: da28d94d12a4cf1a7099a79998155e9482be22dfc53343313ba0cdfee41f0894
                                                      • Instruction ID: 30e32cd0f1cf04271226eb35720157eef61f8bc352b131d54f697ad7bf9fe6e0
                                                      • Opcode Fuzzy Hash: da28d94d12a4cf1a7099a79998155e9482be22dfc53343313ba0cdfee41f0894
                                                      • Instruction Fuzzy Hash: 6D31C3705047059FD720EF34D895797BBE4FB49709F00092EF69DA3290E771AA44CB52
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 0174E945
                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0174E969
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0174E98B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1727069683.000000000174C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0174C000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_174c000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                      • String ID:
                                                      • API String ID: 2438371351-0
                                                      • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                      • Instruction ID: 523ce152be0e611a9c6b58913641df07a9eda0702e94eb11cfcd7d62b0c41171
                                                      • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                      • Instruction Fuzzy Hash: 7F12CD24E24658C6EB24DF64D8507DEB232FF68300F1094E9910DEB7A5E77A4F81CB5A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID:
                                                      • API String ID: 544645111-0
                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction ID: bc62e59d367e4ba869ffbfcbbe3d5e2c5441d3bb8617ea00b925c2b0208157b0
                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction Fuzzy Hash: 2431D275A00109DBCB18CF59D480AA9FBA6FF49304B24E6A5E809EB756D731EDC1CBC4
                                                      APIs
                                                        • Part of subcall function 00E84E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E84EDD,?,00F51418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E84E9C
                                                        • Part of subcall function 00E84E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E84EAE
                                                        • Part of subcall function 00E84E90: FreeLibrary.KERNEL32(00000000,?,?,00E84EDD,?,00F51418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E84EC0
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00F51418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E84EFD
                                                        • Part of subcall function 00E84E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00EC3CDE,?,00F51418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E84E62
                                                        • Part of subcall function 00E84E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E84E74
                                                        • Part of subcall function 00E84E59: FreeLibrary.KERNEL32(00000000,?,?,00EC3CDE,?,00F51418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E84E87
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Library$Load$AddressFreeProc
                                                      • String ID:
                                                      • API String ID: 2632591731-0
                                                      • Opcode ID: b5883783b95909491c15fc08a091420bc7b26eebab158333dd90ff94ad83e156
                                                      • Instruction ID: 73a944a5fb168e80df535322341807277b19bd43de0a1f24a12dcb35a44aa39d
                                                      • Opcode Fuzzy Hash: b5883783b95909491c15fc08a091420bc7b26eebab158333dd90ff94ad83e156
                                                      • Instruction Fuzzy Hash: 2E11C172700206AACB14BB60D902FAD77E5EF40714F10A42EF64EBA1D1EE719A459790
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: __wsopen_s
                                                      • String ID:
                                                      • API String ID: 3347428461-0
                                                      • Opcode ID: 2c8aade0e153c04de5333c13dc1de2315d20e6ffcecd031c174ef03ec98bfe60
                                                      • Instruction ID: 910ae7e2fef82e891e457a6dcc0bb69edd7d21b5ba129ee7067f7a80830554a1
                                                      • Opcode Fuzzy Hash: 2c8aade0e153c04de5333c13dc1de2315d20e6ffcecd031c174ef03ec98bfe60
                                                      • Instruction Fuzzy Hash: 3211067590420AAFCB05DF58EA41ADF7BF9EF48314F104059F818AB312DA31DA11CBA5
                                                      APIs
                                                        • Part of subcall function 00EB4C7D: RtlAllocateHeap.NTDLL(00000008,00E81129,00000000,?,00EB2E29,00000001,00000364,?,?,?,00EAF2DE,00EB3863,00F51444,?,00E9FDF5,?), ref: 00EB4CBE
                                                      • _free.LIBCMT ref: 00EB506C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap_free
                                                      • String ID:
                                                      • API String ID: 614378929-0
                                                      • Opcode ID: 70ee4adefee6eb26262b39f529bfb094e1f6354ac2554c6942b38d017f4a210d
                                                      • Instruction ID: 0b8e7350566b953dd8bbfcbb1960e1904af0e9459bd2d9117d9b14d59f37ce5e
                                                      • Opcode Fuzzy Hash: 70ee4adefee6eb26262b39f529bfb094e1f6354ac2554c6942b38d017f4a210d
                                                      • Instruction Fuzzy Hash: C50126732047056BE3219E659881ADBFBE8FB89370F25091DE294A32C0EA30A905C6B4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                                                      • Instruction ID: c151f39cc51abbfaac46ae00f63411847774a7ee2b708e64beb2bd52431a7f62
                                                      • Opcode Fuzzy Hash: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                                                      • Instruction Fuzzy Hash: D3F0F432510A14A6D6353A699C05B9B33DC9FD7334F102B59F525BA3D2DB70F80186A5
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000008,00E81129,00000000,?,00EB2E29,00000001,00000364,?,?,?,00EAF2DE,00EB3863,00F51444,?,00E9FDF5,?), ref: 00EB4CBE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 36e75ac671b51678a7ae16d41bb3c4b9d369a486a3c185a00e88b2b96bee8f21
                                                      • Instruction ID: 2d3864af718183b85ffde846d57e2cb58f3ac8139377542b6bd9bcb9618aeef1
                                                      • Opcode Fuzzy Hash: 36e75ac671b51678a7ae16d41bb3c4b9d369a486a3c185a00e88b2b96bee8f21
                                                      • Instruction Fuzzy Hash: AFF0BB7164222866FB215F629C05FD7BFC8BF41B65B196121F919BA1D3CA70EC0059E0
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000000,?,00F51444,?,00E9FDF5,?,?,00E8A976,00000010,00F51440,00E813FC,?,00E813C6,?,00E81129), ref: 00EB3852
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: b125f32be4c55ec52c5bd31bb454ce63861f3df7f419743f4d7f06ba4702d955
                                                      • Instruction ID: f288e896b89ef67e64d087ef2d489cb63d1bcefb2c071f84436bf3451518c7be
                                                      • Opcode Fuzzy Hash: b125f32be4c55ec52c5bd31bb454ce63861f3df7f419743f4d7f06ba4702d955
                                                      • Instruction Fuzzy Hash: 09E0E53114022466D72526BB9C02BDB36C8BF827B4F162230BC04BA4E1DB50ED0181E2
                                                      APIs
                                                      • _free.LIBCMT ref: 00EB4D9C
                                                        • Part of subcall function 00EB29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000), ref: 00EB29DE
                                                        • Part of subcall function 00EB29C8: GetLastError.KERNEL32(00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000,00000000), ref: 00EB29F0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorFreeHeapLast_free
                                                      • String ID:
                                                      • API String ID: 1353095263-0
                                                      • Opcode ID: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                                      • Instruction ID: ad506300b8c279fa2e0f70a75b23349d858882bea1a9c5277d5964c48bb1298e
                                                      • Opcode Fuzzy Hash: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                                      • Instruction Fuzzy Hash: 95E092761003059F8720CF6CD400AC2B7F4EF843247208929E99DE3311D331E812CB80
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,?,00F51418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E84F6D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: ddd9430bf3f331ed71350a80f29c0016836b3c87050f5d8056a8a434fa99f166
                                                      • Instruction ID: 2d0418afe28c06b49a146ad4f6a841081362e8c7508d324bc400e8aa9092f929
                                                      • Opcode Fuzzy Hash: ddd9430bf3f331ed71350a80f29c0016836b3c87050f5d8056a8a434fa99f166
                                                      • Instruction Fuzzy Hash: 0DF030B1205752CFDB34AF64D490852B7E4FF1431D315A97EE2DEA2651C7319844DF50
                                                      APIs
                                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00E82DC4
                                                        • Part of subcall function 00E86B57: _wcslen.LIBCMT ref: 00E86B6A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: LongNamePath_wcslen
                                                      • String ID:
                                                      • API String ID: 541455249-0
                                                      • Opcode ID: 0bfbff7e68eb68b6ea0bb00c12d0a2d92c9f2f13560251695c60ad2b32d3aec1
                                                      • Instruction ID: 38e3dacaa5d581c33be39ccb732d8467556c649c8c1c9b4a26442451110918d5
                                                      • Opcode Fuzzy Hash: 0bfbff7e68eb68b6ea0bb00c12d0a2d92c9f2f13560251695c60ad2b32d3aec1
                                                      • Instruction Fuzzy Hash: 99E0CD726002245BC710A2989C05FDA77DDDFC8794F0540B5FD0DE7248D970ED808690
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock
                                                      • String ID:
                                                      • API String ID: 2638373210-0
                                                      • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                      • Instruction ID: b583fe73eb9ba45501d93193ceb2f316804941ccc733c955bf6c1c82f7220284
                                                      • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                      • Instruction Fuzzy Hash: D7E04FB0609B005FDF3D5A28A8517B677E89F4A304F04186EF79BD2352E67278458A4D
                                                      APIs
                                                        • Part of subcall function 00E83837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E83908
                                                        • Part of subcall function 00E8D730: GetInputState.USER32 ref: 00E8D807
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00E82B6B
                                                        • Part of subcall function 00E830F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00E8314E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                      • String ID:
                                                      • API String ID: 3667716007-0
                                                      • Opcode ID: 2d65a59419c3202283733df99bf1d9adaa1c762b8e13af598bc5709c184d38a7
                                                      • Instruction ID: 156647871b1602c03f113fa5a85847309ebb3d8ffa66e9f2b7e2234ae0beaf16
                                                      • Opcode Fuzzy Hash: 2d65a59419c3202283733df99bf1d9adaa1c762b8e13af598bc5709c184d38a7
                                                      • Instruction Fuzzy Hash: 02E0862170424806CA08BB74A8525BDF7D99BD2756F40353EF64EB71E3CE2549494352
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,00000000,?,00EC0704,?,?,00000000,?,00EC0704,00000000,0000000C), ref: 00EC03B7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: a53b64cbcf100b8a5715fd72bf8ba6f5c62ff87e7c1a7b0047f73aebeb157a6a
                                                      • Instruction ID: 3b91d21c470b8b76c699d12721301452dd52698c001a00d0b7d690470abde19f
                                                      • Opcode Fuzzy Hash: a53b64cbcf100b8a5715fd72bf8ba6f5c62ff87e7c1a7b0047f73aebeb157a6a
                                                      • Instruction Fuzzy Hash: 7BD06C3208010DBBDF028F84DD06EDA3BAAFB48714F018000BE1866020C732E821AB90
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00E81CBC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: InfoParametersSystem
                                                      • String ID:
                                                      • API String ID: 3098949447-0
                                                      • Opcode ID: df33790c980f8244a0b265299ee47125fb353cfc42b698fda71aa558929eda51
                                                      • Instruction ID: a62342313c9bb40367302a4a05cdc849472804e2a971c86240189e5b38af912c
                                                      • Opcode Fuzzy Hash: df33790c980f8244a0b265299ee47125fb353cfc42b698fda71aa558929eda51
                                                      • Instruction Fuzzy Hash: D9C092362C030CAFF2198B80BC5AF507765B349B02F098401F709A95F3D7A22820FA90
                                                      APIs
                                                      • Sleep.KERNELBASE(000001F4), ref: 0174F129
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1727069683.000000000174C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0174C000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_174c000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                      • Instruction ID: 22d679e0bb8ec3984bbb2a73402fcc18e7fdc8ce4999f2cfa775cfdedae1e954
                                                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                      • Instruction Fuzzy Hash: 82E0E67498010DDFDB00EFB8D54969E7BB4EF04301F100161FD01D2281D7309D508A62
                                                      APIs
                                                        • Part of subcall function 00E99BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E99BB2
                                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00F1961A
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F1965B
                                                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00F1969F
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F196C9
                                                      • SendMessageW.USER32 ref: 00F196F2
                                                      • GetKeyState.USER32(00000011), ref: 00F1978B
                                                      • GetKeyState.USER32(00000009), ref: 00F19798
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F197AE
                                                      • GetKeyState.USER32(00000010), ref: 00F197B8
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F197E9
                                                      • SendMessageW.USER32 ref: 00F19810
                                                      • SendMessageW.USER32(?,00001030,?,00F17E95), ref: 00F19918
                                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00F1992E
                                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00F19941
                                                      • SetCapture.USER32(?), ref: 00F1994A
                                                      • ClientToScreen.USER32(?,?), ref: 00F199AF
                                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00F199BC
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F199D6
                                                      • ReleaseCapture.USER32 ref: 00F199E1
                                                      • GetCursorPos.USER32(?), ref: 00F19A19
                                                      • ScreenToClient.USER32(?,?), ref: 00F19A26
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F19A80
                                                      • SendMessageW.USER32 ref: 00F19AAE
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F19AEB
                                                      • SendMessageW.USER32 ref: 00F19B1A
                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00F19B3B
                                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00F19B4A
                                                      • GetCursorPos.USER32(?), ref: 00F19B68
                                                      • ScreenToClient.USER32(?,?), ref: 00F19B75
                                                      • GetParent.USER32(?), ref: 00F19B93
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F19BFA
                                                      • SendMessageW.USER32 ref: 00F19C2B
                                                      • ClientToScreen.USER32(?,?), ref: 00F19C84
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00F19CB4
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F19CDE
                                                      • SendMessageW.USER32 ref: 00F19D01
                                                      • ClientToScreen.USER32(?,?), ref: 00F19D4E
                                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00F19D82
                                                        • Part of subcall function 00E99944: GetWindowLongW.USER32(?,000000EB), ref: 00E99952
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F19E05
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                      • String ID: @GUI_DRAGID$F
                                                      • API String ID: 3429851547-4164748364
                                                      • Opcode ID: c43365b659742c0f02762f67f2adc844d93e5c2b9f3f55c1665f5012b408a424
                                                      • Instruction ID: 25c97b66cfd2952d78dbd0a7b59993272126776a0bf6b2867885fe1f2b65eb0b
                                                      • Opcode Fuzzy Hash: c43365b659742c0f02762f67f2adc844d93e5c2b9f3f55c1665f5012b408a424
                                                      • Instruction Fuzzy Hash: CE429031508205EFD724CF24CC64BEABBE5FF88320F154619F699972A1D7B1E890EB91
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00F148F3
                                                      • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00F14908
                                                      • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00F14927
                                                      • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00F1494B
                                                      • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00F1495C
                                                      • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00F1497B
                                                      • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00F149AE
                                                      • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00F149D4
                                                      • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00F14A0F
                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00F14A56
                                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00F14A7E
                                                      • IsMenu.USER32(?), ref: 00F14A97
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F14AF2
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F14B20
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F14B94
                                                      • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00F14BE3
                                                      • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00F14C82
                                                      • wsprintfW.USER32 ref: 00F14CAE
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F14CC9
                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 00F14CF1
                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00F14D13
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F14D33
                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 00F14D5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                      • String ID: %d/%02d/%02d
                                                      • API String ID: 4054740463-328681919
                                                      • Opcode ID: a4cb6bd72034592f3ce7c566b9cca21659b0e5d630febb6ea1576135f52b1977
                                                      • Instruction ID: 02a5ba752a97b4efba23af09c0814e00eca1ff28326c09b38898c9b770b49a62
                                                      • Opcode Fuzzy Hash: a4cb6bd72034592f3ce7c566b9cca21659b0e5d630febb6ea1576135f52b1977
                                                      • Instruction Fuzzy Hash: 2012E271A40218ABEB248F24CC49FEE7BF8EF85720F144119F519EB2E1D774A981EB50
                                                      APIs
                                                      • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00E9F998
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00EDF474
                                                      • IsIconic.USER32(00000000), ref: 00EDF47D
                                                      • ShowWindow.USER32(00000000,00000009), ref: 00EDF48A
                                                      • SetForegroundWindow.USER32(00000000), ref: 00EDF494
                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00EDF4AA
                                                      • GetCurrentThreadId.KERNEL32 ref: 00EDF4B1
                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00EDF4BD
                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 00EDF4CE
                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 00EDF4D6
                                                      • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00EDF4DE
                                                      • SetForegroundWindow.USER32(00000000), ref: 00EDF4E1
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EDF4F6
                                                      • keybd_event.USER32(00000012,00000000), ref: 00EDF501
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EDF50B
                                                      • keybd_event.USER32(00000012,00000000), ref: 00EDF510
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EDF519
                                                      • keybd_event.USER32(00000012,00000000), ref: 00EDF51E
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EDF528
                                                      • keybd_event.USER32(00000012,00000000), ref: 00EDF52D
                                                      • SetForegroundWindow.USER32(00000000), ref: 00EDF530
                                                      • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00EDF557
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 4125248594-2988720461
                                                      • Opcode ID: 17cbd8ff0e50409cdf148b13b148ccb5969c1374de52032fe300b27f4ec511b3
                                                      • Instruction ID: fd81f19cd94dd1dda75e16e525114354601f3d41c8e45d13657a1498ba837f94
                                                      • Opcode Fuzzy Hash: 17cbd8ff0e50409cdf148b13b148ccb5969c1374de52032fe300b27f4ec511b3
                                                      • Instruction Fuzzy Hash: 56315D71A8021CBEEB216BB55C4AFFF7E6DEB44B50F154026FA05F61D1C6B09D01BAA0
                                                      APIs
                                                        • Part of subcall function 00EE16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00EE170D
                                                        • Part of subcall function 00EE16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00EE173A
                                                        • Part of subcall function 00EE16C3: GetLastError.KERNEL32 ref: 00EE174A
                                                      • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00EE1286
                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00EE12A8
                                                      • CloseHandle.KERNEL32(?), ref: 00EE12B9
                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00EE12D1
                                                      • GetProcessWindowStation.USER32 ref: 00EE12EA
                                                      • SetProcessWindowStation.USER32(00000000), ref: 00EE12F4
                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00EE1310
                                                        • Part of subcall function 00EE10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00EE11FC), ref: 00EE10D4
                                                        • Part of subcall function 00EE10BF: CloseHandle.KERNEL32(?,?,00EE11FC), ref: 00EE10E9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                      • String ID: $default$winsta0
                                                      • API String ID: 22674027-1027155976
                                                      • Opcode ID: 856fc6050188c437fd0009e081919bbd04981192018428333c6ceefd45c2282e
                                                      • Instruction ID: ae03c043973e2d6c4db039a10cde9aa4eaf90974f333e2c3619a81056cef361a
                                                      • Opcode Fuzzy Hash: 856fc6050188c437fd0009e081919bbd04981192018428333c6ceefd45c2282e
                                                      • Instruction Fuzzy Hash: 03819D7190028DAFDF219FA5DC49FEE7BB9EF08704F149169F920B62A0D7708984DB61
                                                      APIs
                                                        • Part of subcall function 00EE10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00EE1114
                                                        • Part of subcall function 00EE10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00EE0B9B,?,?,?), ref: 00EE1120
                                                        • Part of subcall function 00EE10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00EE0B9B,?,?,?), ref: 00EE112F
                                                        • Part of subcall function 00EE10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00EE0B9B,?,?,?), ref: 00EE1136
                                                        • Part of subcall function 00EE10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00EE114D
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00EE0BCC
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00EE0C00
                                                      • GetLengthSid.ADVAPI32(?), ref: 00EE0C17
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00EE0C51
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00EE0C6D
                                                      • GetLengthSid.ADVAPI32(?), ref: 00EE0C84
                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00EE0C8C
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00EE0C93
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00EE0CB4
                                                      • CopySid.ADVAPI32(00000000), ref: 00EE0CBB
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00EE0CEA
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00EE0D0C
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00EE0D1E
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EE0D45
                                                      • HeapFree.KERNEL32(00000000), ref: 00EE0D4C
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EE0D55
                                                      • HeapFree.KERNEL32(00000000), ref: 00EE0D5C
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EE0D65
                                                      • HeapFree.KERNEL32(00000000), ref: 00EE0D6C
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00EE0D78
                                                      • HeapFree.KERNEL32(00000000), ref: 00EE0D7F
                                                        • Part of subcall function 00EE1193: GetProcessHeap.KERNEL32(00000008,00EE0BB1,?,00000000,?,00EE0BB1,?), ref: 00EE11A1
                                                        • Part of subcall function 00EE1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00EE0BB1,?), ref: 00EE11A8
                                                        • Part of subcall function 00EE1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00EE0BB1,?), ref: 00EE11B7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                      • String ID:
                                                      • API String ID: 4175595110-0
                                                      • Opcode ID: 1995b1140a89b59f5463be17c4eb62022f4c5b16b8462a2c371522e2b4760e8b
                                                      • Instruction ID: be2ab79495d98e2c47f607b48b80bbf737f1498d4f6c8f8caf6d51ed91956c4b
                                                      • Opcode Fuzzy Hash: 1995b1140a89b59f5463be17c4eb62022f4c5b16b8462a2c371522e2b4760e8b
                                                      • Instruction Fuzzy Hash: C871777294024EAFDF10DFA6DC44BEEBBB8AF08304F158115E914F6291D7B5AA45CBA0
                                                      APIs
                                                      • OpenClipboard.USER32(00F1CC08), ref: 00EFEB29
                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 00EFEB37
                                                      • GetClipboardData.USER32(0000000D), ref: 00EFEB43
                                                      • CloseClipboard.USER32 ref: 00EFEB4F
                                                      • GlobalLock.KERNEL32(00000000), ref: 00EFEB87
                                                      • CloseClipboard.USER32 ref: 00EFEB91
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00EFEBBC
                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 00EFEBC9
                                                      • GetClipboardData.USER32(00000001), ref: 00EFEBD1
                                                      • GlobalLock.KERNEL32(00000000), ref: 00EFEBE2
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00EFEC22
                                                      • IsClipboardFormatAvailable.USER32(0000000F), ref: 00EFEC38
                                                      • GetClipboardData.USER32(0000000F), ref: 00EFEC44
                                                      • GlobalLock.KERNEL32(00000000), ref: 00EFEC55
                                                      • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00EFEC77
                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00EFEC94
                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00EFECD2
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00EFECF3
                                                      • CountClipboardFormats.USER32 ref: 00EFED14
                                                      • CloseClipboard.USER32 ref: 00EFED59
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                      • String ID:
                                                      • API String ID: 420908878-0
                                                      • Opcode ID: 121ee79edffe0212cded4040c945465c16eb7bcebf66d2de754f714565960703
                                                      • Instruction ID: 9e1b3448ef11e20916e188f0aee668f65578004a5644456f536a0f3e09277a1f
                                                      • Opcode Fuzzy Hash: 121ee79edffe0212cded4040c945465c16eb7bcebf66d2de754f714565960703
                                                      • Instruction Fuzzy Hash: 0161D1342043099FD310EF24C884FBA77E4AF84708F15951DF55AA72A2DB31E905DBA2
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00EF69BE
                                                      • FindClose.KERNEL32(00000000), ref: 00EF6A12
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00EF6A4E
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00EF6A75
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00EF6AB2
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00EF6ADF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                      • API String ID: 3830820486-3289030164
                                                      • Opcode ID: 31150759839fe6d9335886d39a930826ece12d32eb5e98a173f9512d5c25a11a
                                                      • Instruction ID: 7e3559e19b7767146a3885c46c01ae423b673c606282ae9e3ae8f76b0c1ae974
                                                      • Opcode Fuzzy Hash: 31150759839fe6d9335886d39a930826ece12d32eb5e98a173f9512d5c25a11a
                                                      • Instruction Fuzzy Hash: 07D15E72908304AFC714EBA0C891EBBB7ECAF98704F04591DF589E6191EB74DA44CB62
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00EF9663
                                                      • GetFileAttributesW.KERNEL32(?), ref: 00EF96A1
                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 00EF96BB
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00EF96D3
                                                      • FindClose.KERNEL32(00000000), ref: 00EF96DE
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00EF96FA
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00EF974A
                                                      • SetCurrentDirectoryW.KERNEL32(00F46B7C), ref: 00EF9768
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EF9772
                                                      • FindClose.KERNEL32(00000000), ref: 00EF977F
                                                      • FindClose.KERNEL32(00000000), ref: 00EF978F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                      • String ID: *.*
                                                      • API String ID: 1409584000-438819550
                                                      • Opcode ID: dc8b01e93705825d6520f4764b707fd5755359b043b55c2af7d2e44bd8d9b95f
                                                      • Instruction ID: f07da18c1e3b13b682ad32f4d48238657ead9f0fbcc53e663bc42654d8a00457
                                                      • Opcode Fuzzy Hash: dc8b01e93705825d6520f4764b707fd5755359b043b55c2af7d2e44bd8d9b95f
                                                      • Instruction Fuzzy Hash: 8931F13258021D6BCB14AFB4DC08BEE37ACAF49325F118056FA54F20E1EB35DE409AA1
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00EF97BE
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00EF9819
                                                      • FindClose.KERNEL32(00000000), ref: 00EF9824
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00EF9840
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00EF9890
                                                      • SetCurrentDirectoryW.KERNEL32(00F46B7C), ref: 00EF98AE
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EF98B8
                                                      • FindClose.KERNEL32(00000000), ref: 00EF98C5
                                                      • FindClose.KERNEL32(00000000), ref: 00EF98D5
                                                        • Part of subcall function 00EEDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00EEDB00
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                      • String ID: *.*
                                                      • API String ID: 2640511053-438819550
                                                      • Opcode ID: 4833a210d43e8a5f0b3879539da3b380d5489029eeb4e03388d5646a6ab2bf4a
                                                      • Instruction ID: b6d4cf9a320d0dd5594b0363b239bc004218f415f89594922c56aa97fa5b7f6c
                                                      • Opcode Fuzzy Hash: 4833a210d43e8a5f0b3879539da3b380d5489029eeb4e03388d5646a6ab2bf4a
                                                      • Instruction Fuzzy Hash: 5731033254029D6ADB18AFB4DC48BEE37AC9F4A364F108056F990F20A1DB31DE849B60
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?), ref: 00EF8257
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00EF8267
                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00EF8273
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00EF8310
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00EF8324
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00EF8356
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00EF838C
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00EF8395
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectoryTime$File$Local$System
                                                      • String ID: *.*
                                                      • API String ID: 1464919966-438819550
                                                      • Opcode ID: da7a21c86fd7d352316a034b1ff2c0ea71ef54170fdf9f320ffb0a8a97d8b26d
                                                      • Instruction ID: e0435a21387a94a44464f2b5e164976c9bc7f8ff5d818a1d35c4d6672ae9930b
                                                      • Opcode Fuzzy Hash: da7a21c86fd7d352316a034b1ff2c0ea71ef54170fdf9f320ffb0a8a97d8b26d
                                                      • Instruction Fuzzy Hash: 1B616E725043499FD710EF60C8409AFB3E9FF89314F04991EFA99A7261DB31E945CB92
                                                      APIs
                                                        • Part of subcall function 00E83AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E83A97,?,?,00E82E7F,?,?,?,00000000), ref: 00E83AC2
                                                        • Part of subcall function 00EEE199: GetFileAttributesW.KERNEL32(?,00EECF95), ref: 00EEE19A
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00EED122
                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00EED1DD
                                                      • MoveFileW.KERNEL32(?,?), ref: 00EED1F0
                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 00EED20D
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EED237
                                                        • Part of subcall function 00EED29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00EED21C,?,?), ref: 00EED2B2
                                                      • FindClose.KERNEL32(00000000,?,?,?), ref: 00EED253
                                                      • FindClose.KERNEL32(00000000), ref: 00EED264
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 1946585618-1173974218
                                                      • Opcode ID: d594b0e0fbfa88780329cc24b311433cbca0759574df421abefd613c8444a8dd
                                                      • Instruction ID: 5f41002ea4d4dd1509c4d6c219ab7c6805489e6c73ced5c36a37658a91f0ab52
                                                      • Opcode Fuzzy Hash: d594b0e0fbfa88780329cc24b311433cbca0759574df421abefd613c8444a8dd
                                                      • Instruction Fuzzy Hash: 3661793180918D9BCF05EBE1DE829FDB7B5AF54304F249065E40A731A2EB316F09DB60
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                      • String ID:
                                                      • API String ID: 1737998785-0
                                                      • Opcode ID: abef708485b1f9b8a420f0add5eeb85b271ee8165cad3db0b89e2cb543dbcb35
                                                      • Instruction ID: 20cf7a5cfbbf7d0d70f2c5756d9e69e0442e8a6da95cbf3d2b58afeee70f21bb
                                                      • Opcode Fuzzy Hash: abef708485b1f9b8a420f0add5eeb85b271ee8165cad3db0b89e2cb543dbcb35
                                                      • Instruction Fuzzy Hash: CA41AB31204215AFE320DF25E888B69BBE1AF44318F15D099E559ABB72C736FC41DBD0
                                                      APIs
                                                        • Part of subcall function 00EE16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00EE170D
                                                        • Part of subcall function 00EE16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00EE173A
                                                        • Part of subcall function 00EE16C3: GetLastError.KERNEL32 ref: 00EE174A
                                                      • ExitWindowsEx.USER32(?,00000000), ref: 00EEE932
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                      • String ID: $ $@$SeShutdownPrivilege
                                                      • API String ID: 2234035333-3163812486
                                                      • Opcode ID: 1730d38af81eeb2e2bd948742d5261513c54c1c67c1519f34ef6e4a7b84ec414
                                                      • Instruction ID: c017533923f6ab3562377ae55df284e377a3055e16a9096791ddd8691d0b103e
                                                      • Opcode Fuzzy Hash: 1730d38af81eeb2e2bd948742d5261513c54c1c67c1519f34ef6e4a7b84ec414
                                                      • Instruction Fuzzy Hash: 9401267261025DABEB1462B6AC86FFB72DC9B44744F155461FC02F32D3E6A29C4491A0
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00F01276
                                                      • WSAGetLastError.WSOCK32 ref: 00F01283
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00F012BA
                                                      • WSAGetLastError.WSOCK32 ref: 00F012C5
                                                      • closesocket.WSOCK32(00000000), ref: 00F012F4
                                                      • listen.WSOCK32(00000000,00000005), ref: 00F01303
                                                      • WSAGetLastError.WSOCK32 ref: 00F0130D
                                                      • closesocket.WSOCK32(00000000), ref: 00F0133C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$closesocket$bindlistensocket
                                                      • String ID:
                                                      • API String ID: 540024437-0
                                                      • Opcode ID: 3f9d4ea21b84a1b7f467d127aefa06456ba8b2251d670db5f139d52194d641c2
                                                      • Instruction ID: 6abee52d0251eb45ae38b02c1e7c170a83a879d5f788f781c2c28ca8dbf8e906
                                                      • Opcode Fuzzy Hash: 3f9d4ea21b84a1b7f467d127aefa06456ba8b2251d670db5f139d52194d641c2
                                                      • Instruction Fuzzy Hash: 01417271A001049FD710DF68C484B69BBE6BF46328F19819CE85A9F2D2C771ED81EBE1
                                                      APIs
                                                        • Part of subcall function 00E83AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E83A97,?,?,00E82E7F,?,?,?,00000000), ref: 00E83AC2
                                                        • Part of subcall function 00EEE199: GetFileAttributesW.KERNEL32(?,00EECF95), ref: 00EEE19A
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00EED420
                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 00EED470
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EED481
                                                      • FindClose.KERNEL32(00000000), ref: 00EED498
                                                      • FindClose.KERNEL32(00000000), ref: 00EED4A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 2649000838-1173974218
                                                      • Opcode ID: 42e16697ae19414089b986e7123380a6e692db30e36ee8ef1c1c9d905789463e
                                                      • Instruction ID: 51d283b23fc7306229d80379b280cd94e4ab2578799922a7e59c0b0242d0b751
                                                      • Opcode Fuzzy Hash: 42e16697ae19414089b986e7123380a6e692db30e36ee8ef1c1c9d905789463e
                                                      • Instruction Fuzzy Hash: 9F31703100C3899BC305FF64D8518EF77E8AEA1314F446A2DF4E9A3191EB30AA09D763
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: __floor_pentium4
                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                      • API String ID: 4168288129-2761157908
                                                      • Opcode ID: c2ee4bc664117fbbe9b732e329b8dcd05c20c79d0df2af2ed591a7258ac65abe
                                                      • Instruction ID: 3785b77bba91a86b9d9bf3489ff9052c890031790b1f45412a9e32ad43939319
                                                      • Opcode Fuzzy Hash: c2ee4bc664117fbbe9b732e329b8dcd05c20c79d0df2af2ed591a7258ac65abe
                                                      • Instruction Fuzzy Hash: 6EC23972E086298FDB29CE28DD407EAB7B5EB49305F1451EAD84DF7241E774AE818F40
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 00EF64DC
                                                      • CoInitialize.OLE32(00000000), ref: 00EF6639
                                                      • CoCreateInstance.OLE32(00F1FCF8,00000000,00000001,00F1FB68,?), ref: 00EF6650
                                                      • CoUninitialize.OLE32 ref: 00EF68D4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                      • String ID: .lnk
                                                      • API String ID: 886957087-24824748
                                                      • Opcode ID: 9566d42eecdafc81248f6bef985b47590c9151239b79a5d950c0b4c1d83d72ad
                                                      • Instruction ID: a9ec2e64228b0a15f1cadd2d502bda30e02961624994ab82e8f664c27693be8b
                                                      • Opcode Fuzzy Hash: 9566d42eecdafc81248f6bef985b47590c9151239b79a5d950c0b4c1d83d72ad
                                                      • Instruction Fuzzy Hash: 18D16B71608305AFC304EF24C88196BB7E8FF95308F14596DF599AB292DB71ED05CB92
                                                      APIs
                                                      • GetForegroundWindow.USER32(?,?,00000000), ref: 00F022E8
                                                        • Part of subcall function 00EFE4EC: GetWindowRect.USER32(?,?), ref: 00EFE504
                                                      • GetDesktopWindow.USER32 ref: 00F02312
                                                      • GetWindowRect.USER32(00000000), ref: 00F02319
                                                      • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00F02355
                                                      • GetCursorPos.USER32(?), ref: 00F02381
                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00F023DF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                      • String ID:
                                                      • API String ID: 2387181109-0
                                                      • Opcode ID: 10fdd29d134368f3a1e0faf9c83b118d9b983eb30af3f8a755254409aca918f8
                                                      • Instruction ID: e121a8c984f9ff1d007d5d804bfc35441f6b44c74e7b4e98e2e0315a046f0bc1
                                                      • Opcode Fuzzy Hash: 10fdd29d134368f3a1e0faf9c83b118d9b983eb30af3f8a755254409aca918f8
                                                      • Instruction Fuzzy Hash: 1D31C272504319AFD720DF55C849B9BBBEAFF84314F004919F985A7191DB34E908DBE2
                                                      APIs
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                      • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00EF9B78
                                                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00EF9C8B
                                                        • Part of subcall function 00EF3874: GetInputState.USER32 ref: 00EF38CB
                                                        • Part of subcall function 00EF3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EF3966
                                                      • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00EF9BA8
                                                      • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00EF9C75
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                      • String ID: *.*
                                                      • API String ID: 1972594611-438819550
                                                      • Opcode ID: 425f6430b880de2b839f95f4328b958d74dc8db519e797ca32b4d4418ceeeec3
                                                      • Instruction ID: c221c77514fef94ffbf6b174d4cb5d265e9a709a6d1b89c36fa54d0562ae5a10
                                                      • Opcode Fuzzy Hash: 425f6430b880de2b839f95f4328b958d74dc8db519e797ca32b4d4418ceeeec3
                                                      • Instruction Fuzzy Hash: 04415E7194420E9BCF14EF64C845BEEBBF4EF05314F245055E959B2192EB319E84CFA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ERCP$VUUU$VUUU$VUUU$VUUU$ixcftuixc8tuixcftuixcftuixc7tuixc5tuixc0tuixc7tuixc3tuixc3tuixcctuixc0tuixcetuixc9tuixcbtuixc8tuixc0tuixc0tuixc0tuixc0tuixc0tuixc0
                                                      • API String ID: 0-2588434273
                                                      • Opcode ID: 2d200e978b8de8b86d04c711091cc8074e930fd5491bdd7173f224d8d409e899
                                                      • Instruction ID: c883a702ff3b46e730e0fd21acf26b3f7e1771f5ed32f6530f399d6801b94165
                                                      • Opcode Fuzzy Hash: 2d200e978b8de8b86d04c711091cc8074e930fd5491bdd7173f224d8d409e899
                                                      • Instruction Fuzzy Hash: FFA27E71A0061ACBDF24DF58CA40BEEB7B1BF54314F6491AADC19B7281EB319D82DB50
                                                      APIs
                                                        • Part of subcall function 00E99BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E99BB2
                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 00E99A4E
                                                      • GetSysColor.USER32(0000000F), ref: 00E99B23
                                                      • SetBkColor.GDI32(?,00000000), ref: 00E99B36
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Color$LongProcWindow
                                                      • String ID:
                                                      • API String ID: 3131106179-0
                                                      • Opcode ID: 525d5c49e10aa83a35507fd483f89490ae7f3ce5b48f1a6fea706e6961582acb
                                                      • Instruction ID: 9316d78f3b546d21bb0b11813cfbb126ec829c74b8773d4da863e88bfce48416
                                                      • Opcode Fuzzy Hash: 525d5c49e10aa83a35507fd483f89490ae7f3ce5b48f1a6fea706e6961582acb
                                                      • Instruction Fuzzy Hash: 1CA12870108504BFEB289B2C8C58EFF369DEB42349B15210EF552F6793EA65DD42E272
                                                      APIs
                                                        • Part of subcall function 00F0304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F0307A
                                                        • Part of subcall function 00F0304E: _wcslen.LIBCMT ref: 00F0309B
                                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00F0185D
                                                      • WSAGetLastError.WSOCK32 ref: 00F01884
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00F018DB
                                                      • WSAGetLastError.WSOCK32 ref: 00F018E6
                                                      • closesocket.WSOCK32(00000000), ref: 00F01915
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 1601658205-0
                                                      • Opcode ID: 6f433edd84c2398d12ac1ce3d6a1b043fb0009abb500760e302bde49a32ce262
                                                      • Instruction ID: b9cd8a232a19bb27a4843591ea0f5d07d953aab902752881edb4f6cf561ee0b6
                                                      • Opcode Fuzzy Hash: 6f433edd84c2398d12ac1ce3d6a1b043fb0009abb500760e302bde49a32ce262
                                                      • Instruction Fuzzy Hash: 75519171A40200AFEB10AF24C886F6A77E5AB45718F58C098FA596F2D3C771AD41DBA1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                      • String ID:
                                                      • API String ID: 292994002-0
                                                      • Opcode ID: 2f2fb696af3dbad703979c483d9af521bfbe175201e8c2bfcfcee40ef5b3cf2a
                                                      • Instruction ID: 9541e190c4101ef1c9d533c8c2ff777879624f81539783d1fe679040370e3e45
                                                      • Opcode Fuzzy Hash: 2f2fb696af3dbad703979c483d9af521bfbe175201e8c2bfcfcee40ef5b3cf2a
                                                      • Instruction Fuzzy Hash: 0D21D631B802155FD7208F1AD844BDA7BE5FF85324B198058E9498B351CB71DC82EBD0
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00EB28E9,(,00EA4CBE,00000000,00F488B8,0000000C,00EA4E15,(,00000002,00000000,?,00EB28E9,00000003,00EB2DF7,?,?), ref: 00EA4D09
                                                      • TerminateProcess.KERNEL32(00000000,?,00EB28E9,00000003,00EB2DF7,?,?,?,00EAE6D1,?,00F48A48,00000010,00E84F4A,?,?,00000000), ref: 00EA4D10
                                                      • ExitProcess.KERNEL32 ref: 00EA4D22
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID: (
                                                      • API String ID: 1703294689-2063206799
                                                      • Opcode ID: 3d90856dc74c9d00fc399c1c3b7ed73c98fa235cba5bccbc1a8235030783c6fa
                                                      • Instruction ID: c5a47610bc3bf693330f48a32b753aabe93f6e6693a0f044598becc8ce804ec7
                                                      • Opcode Fuzzy Hash: 3d90856dc74c9d00fc399c1c3b7ed73c98fa235cba5bccbc1a8235030783c6fa
                                                      • Instruction Fuzzy Hash: 34E046B1040108ABCF11AF24DD0AA883B69EB86785F018014FD14AA162CB75EE42EA80
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00F0A6AC
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00F0A6BA
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00F0A79C
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F0A7AB
                                                        • Part of subcall function 00E9CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00EC3303,?), ref: 00E9CE8A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                      • String ID:
                                                      • API String ID: 1991900642-0
                                                      • Opcode ID: a47a78850c98d3057d12a211fd1612edb9b7954af9ae05155dfa58edd2d30055
                                                      • Instruction ID: 7b146743f9bc791d617b12bde52b0f05e6d6f1af55e94e201a197a80dd9765ce
                                                      • Opcode Fuzzy Hash: a47a78850c98d3057d12a211fd1612edb9b7954af9ae05155dfa58edd2d30055
                                                      • Instruction Fuzzy Hash: 08518F71508300AFD714EF24C885E6BBBE8FF89754F04991DF589A7292EB30D904DB92
                                                      APIs
                                                      • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00EEAAAC
                                                      • SetKeyboardState.USER32(00000080), ref: 00EEAAC8
                                                      • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00EEAB36
                                                      • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00EEAB88
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: 44455814dce26ff860e2c7d37a639c5197d7e6159d53009e9c9d090811ee20de
                                                      • Instruction ID: c9723d0041a603ed385dd9f980320331274cc82ffbc0ce0a229642d320e528e6
                                                      • Opcode Fuzzy Hash: 44455814dce26ff860e2c7d37a639c5197d7e6159d53009e9c9d090811ee20de
                                                      • Instruction Fuzzy Hash: 98312A30A4028CAEFB348A66CC05BFA77E6AB54314F0C522EF185B61D1D375A985D7A2
                                                      APIs
                                                      • _free.LIBCMT ref: 00EBBB7F
                                                        • Part of subcall function 00EB29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000), ref: 00EB29DE
                                                        • Part of subcall function 00EB29C8: GetLastError.KERNEL32(00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000,00000000), ref: 00EB29F0
                                                      • GetTimeZoneInformation.KERNEL32 ref: 00EBBB91
                                                      • WideCharToMultiByte.KERNEL32(00000000,?,00F5121C,000000FF,?,0000003F,?,?), ref: 00EBBC09
                                                      • WideCharToMultiByte.KERNEL32(00000000,?,00F51270,000000FF,?,0000003F,?,?,?,00F5121C,000000FF,?,0000003F,?,?), ref: 00EBBC36
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                      • String ID:
                                                      • API String ID: 806657224-0
                                                      • Opcode ID: 56015b7c28deb701a20f3bcc0200420c0910740f90f7fc837f30c617ea965fb4
                                                      • Instruction ID: eccb6559cb813640ce1923227aaec2aed45235af348abdbf997b40df93c43611
                                                      • Opcode Fuzzy Hash: 56015b7c28deb701a20f3bcc0200420c0910740f90f7fc837f30c617ea965fb4
                                                      • Instruction Fuzzy Hash: AC31C070944209EFCB10DF68DC809AEBBB8BF45310B14566AE150EB2A1D7B0AE41EB50
                                                      APIs
                                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 00EFCE89
                                                      • GetLastError.KERNEL32(?,00000000), ref: 00EFCEEA
                                                      • SetEvent.KERNEL32(?,?,00000000), ref: 00EFCEFE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorEventFileInternetLastRead
                                                      • String ID:
                                                      • API String ID: 234945975-0
                                                      • Opcode ID: 763a683aae17e16754289925b9c9393efc21a869975b02376d398fd98b77ef5a
                                                      • Instruction ID: 6d14b896b8c0dc6924b0392ef32e3b63cc536cba2f229f9a08d2a08b3eb77b00
                                                      • Opcode Fuzzy Hash: 763a683aae17e16754289925b9c9393efc21a869975b02376d398fd98b77ef5a
                                                      • Instruction Fuzzy Hash: CE21BD7164030D9BDB20CF65CA48BB6B7F8EF40318F30941EE646E2151E770EE049BA0
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00EE82AA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID: ($|
                                                      • API String ID: 1659193697-1631851259
                                                      • Opcode ID: 1a2bd3279d770a7d999b6a1dc77e3ff75d1f7865c53d37a88112d4fab060d4fd
                                                      • Instruction ID: cbe9c6409d12d672991cd77f7df0203cc33ec8a9eefd5259ab6d82fcae699fe2
                                                      • Opcode Fuzzy Hash: 1a2bd3279d770a7d999b6a1dc77e3ff75d1f7865c53d37a88112d4fab060d4fd
                                                      • Instruction Fuzzy Hash: 63324774A007459FCB28CF19C580AAAB7F0FF48714B15D56EE49AEB3A1EB70E941CB40
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00EF5CC1
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00EF5D17
                                                      • FindClose.KERNEL32(?), ref: 00EF5D5F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstNext
                                                      • String ID:
                                                      • API String ID: 3541575487-0
                                                      • Opcode ID: f4828c7b541407e2bb82b6eb01835744f9ab7afb1b0b424da6b0a9924b24ce96
                                                      • Instruction ID: 98f5071b9f616d207d3fc691bbb1d8578282508f3d92f788d7a06e28fbf282d3
                                                      • Opcode Fuzzy Hash: f4828c7b541407e2bb82b6eb01835744f9ab7afb1b0b424da6b0a9924b24ce96
                                                      • Instruction Fuzzy Hash: C151BA35604A059FC704DF28C484AA6B7E4FF4A318F14955EEA5A9B3A1CB31ED00CBA1
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32 ref: 00EB271A
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00EB2724
                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 00EB2731
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                      • String ID:
                                                      • API String ID: 3906539128-0
                                                      • Opcode ID: f918bafef36be527b0f005c0a452ef1acad2de2fc0cedefc074dd9dbeaeaef69
                                                      • Instruction ID: 1c39e16b3e98c97b084ddc2f181aadb02aa3963e686fa382f22ec344eb06033c
                                                      • Opcode Fuzzy Hash: f918bafef36be527b0f005c0a452ef1acad2de2fc0cedefc074dd9dbeaeaef69
                                                      • Instruction Fuzzy Hash: 0631C47494122C9BCB21DF68DC887D9B7B8AF08310F5051EAE91CA6260EB309F858F44
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00EF51DA
                                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00EF5238
                                                      • SetErrorMode.KERNEL32(00000000), ref: 00EF52A1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DiskFreeSpace
                                                      • String ID:
                                                      • API String ID: 1682464887-0
                                                      • Opcode ID: de88d1498a6733c9b63c5ed1a9c045e26595c2e69966c9a844e332bd22dfe425
                                                      • Instruction ID: 0dd49143572d1a0b9a4747a5135035c238f2eb0bac13de2618b8244564a28a58
                                                      • Opcode Fuzzy Hash: de88d1498a6733c9b63c5ed1a9c045e26595c2e69966c9a844e332bd22dfe425
                                                      • Instruction Fuzzy Hash: D3313E75A00518DFDB00DF54D884EADBBF5FF49318F198099E909AB362DB31E856CBA0
                                                      APIs
                                                        • Part of subcall function 00E9FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00EA0668
                                                        • Part of subcall function 00E9FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00EA0685
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00EE170D
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00EE173A
                                                      • GetLastError.KERNEL32 ref: 00EE174A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                      • String ID:
                                                      • API String ID: 577356006-0
                                                      • Opcode ID: 1935d9b251b5871bacc6c056651a770d1255e0db6137dff1ea50044d929fe9c1
                                                      • Instruction ID: 82051b837072e179718a16ba927e14fc19607ac1fc4ab202bc40ad9850895467
                                                      • Opcode Fuzzy Hash: 1935d9b251b5871bacc6c056651a770d1255e0db6137dff1ea50044d929fe9c1
                                                      • Instruction Fuzzy Hash: 1911C1B2410308AFD7189F54DC86EAAB7F9EB04714B20956EE056A7241EB70BC81CA60
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00EED608
                                                      • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00EED645
                                                      • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00EED650
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CloseControlCreateDeviceFileHandle
                                                      • String ID:
                                                      • API String ID: 33631002-0
                                                      • Opcode ID: 9485b91224298285cb38b90cc6a85e0d3ee7ae5d373eb91b52bac40fd75cb5dc
                                                      • Instruction ID: 35c86952bf9042dcda955f22a179845d755c6252a7f5b1f624118eb2650fea03
                                                      • Opcode Fuzzy Hash: 9485b91224298285cb38b90cc6a85e0d3ee7ae5d373eb91b52bac40fd75cb5dc
                                                      • Instruction Fuzzy Hash: 54117CB1E45228BBDB108F95AC44FEFBBBCEB45B50F108111F914F7290C2704A018BE1
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00EE168C
                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00EE16A1
                                                      • FreeSid.ADVAPI32(?), ref: 00EE16B1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                      • String ID:
                                                      • API String ID: 3429775523-0
                                                      • Opcode ID: d33b5b275e1a4f9072fbf452dac10a75df4a7ed521c720415280385d4e679849
                                                      • Instruction ID: 14d552d19965e33dae89ec394d0e3eb4ab442e653d2ce850637209af871a3f6a
                                                      • Opcode Fuzzy Hash: d33b5b275e1a4f9072fbf452dac10a75df4a7ed521c720415280385d4e679849
                                                      • Instruction Fuzzy Hash: 0AF0F47199030DFBDB00DFE49C89EAEBBBCEB08604F5085A5E501E2181E774AA449A90
                                                      APIs
                                                      • GetUserNameW.ADVAPI32(?,?), ref: 00EDD28C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: NameUser
                                                      • String ID: X64
                                                      • API String ID: 2645101109-893830106
                                                      • Opcode ID: a0f853ff5b96f3478080f650d3bb88214ccc620ad334b0380b4bdaaf3b94a7ca
                                                      • Instruction ID: 7b22138190abef8c32ea2f605a068f7d0993faed6343b88b38196f68f376a1b4
                                                      • Opcode Fuzzy Hash: a0f853ff5b96f3478080f650d3bb88214ccc620ad334b0380b4bdaaf3b94a7ca
                                                      • Instruction Fuzzy Hash: 38D0CAB480922DEACF94CBA0EC88DDAB3BCFB08345F105292F546F2100DB3096499F20
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                      • Instruction ID: 1e71b40a1cfbb33dc88290d822204e8fc1b06e524a6539c2b7e37303f0407acc
                                                      • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                      • Instruction Fuzzy Hash: 47020A71E002199FDF14CFA9C9806ADFBF1EF49324F25916AD819FB280D731AA41CB94
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00EF6918
                                                      • FindClose.KERNEL32(00000000), ref: 00EF6961
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID:
                                                      • API String ID: 2295610775-0
                                                      • Opcode ID: 089cd1df342759593fb9f1b9e588712875b8421327454854aabb51a6ce5cecfd
                                                      • Instruction ID: 06ff71a191ac7afeeef5ce922fb1e2681fa90089c83643d492ecd9e289ec559e
                                                      • Opcode Fuzzy Hash: 089cd1df342759593fb9f1b9e588712875b8421327454854aabb51a6ce5cecfd
                                                      • Instruction Fuzzy Hash: DC11D0316042049FD710DF29D484A26BBE1FF85328F15C699E5699F2A2C770EC05CB90
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00F04891,?,?,00000035,?), ref: 00EF37E4
                                                      • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00F04891,?,?,00000035,?), ref: 00EF37F4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorFormatLastMessage
                                                      • String ID:
                                                      • API String ID: 3479602957-0
                                                      • Opcode ID: cdafbc39ae490badc5cdcda63ab18d20084593eaa4d28738aba46dccbdc5819e
                                                      • Instruction ID: 3e95d6a9a992053f6d6b30381b1808349b4dd7df1b5f1ed911586915181e3fd5
                                                      • Opcode Fuzzy Hash: cdafbc39ae490badc5cdcda63ab18d20084593eaa4d28738aba46dccbdc5819e
                                                      • Instruction Fuzzy Hash: 7FF0E5B070422C2AE72027769C4DFEB7AAEEFC5761F0001A6F609E22C1D9A09944C7F0
                                                      APIs
                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00EEB25D
                                                      • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00EEB270
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: InputSendkeybd_event
                                                      • String ID:
                                                      • API String ID: 3536248340-0
                                                      • Opcode ID: 0d56755e0f50b2917cab9b5587f6b92d2ec1d005da504b4e4913aaeb5513e680
                                                      • Instruction ID: 9d318b921a1419f40347280234ca1d3011c2524f6f0954bfc7ffd36fe0588e3d
                                                      • Opcode Fuzzy Hash: 0d56755e0f50b2917cab9b5587f6b92d2ec1d005da504b4e4913aaeb5513e680
                                                      • Instruction Fuzzy Hash: 94F01D7184428DABDB059FA1C805BEE7BB4FF08309F049009F955A51A1C77986119F94
                                                      APIs
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00EE11FC), ref: 00EE10D4
                                                      • CloseHandle.KERNEL32(?,?,00EE11FC), ref: 00EE10E9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                      • String ID:
                                                      • API String ID: 81990902-0
                                                      • Opcode ID: 5e755c1c002cacd39e10c4a9cf1ef79be204d74117102f4260016079a6c40cec
                                                      • Instruction ID: cc54777f5b15d65292a4e57716aed9b3b1a865baff452651615c18f4a8f90c86
                                                      • Opcode Fuzzy Hash: 5e755c1c002cacd39e10c4a9cf1ef79be204d74117102f4260016079a6c40cec
                                                      • Instruction Fuzzy Hash: 3FE0BF72058614AFFB252B51FC05EB777E9EB04320F25D82DF5A5D04B1DB626C90EB50
                                                      Strings
                                                      • Variable is not of type 'Object'., xrefs: 00ED0C40
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Variable is not of type 'Object'.
                                                      • API String ID: 0-1840281001
                                                      • Opcode ID: 870c291054c2520f3d0f85bd4c8915bd20c7d13e78be74df7cbca26c61b60a92
                                                      • Instruction ID: 50be15c066e839033dd1234602775ec8625569b1ad2a1fc7bcde6b634c900b88
                                                      • Opcode Fuzzy Hash: 870c291054c2520f3d0f85bd4c8915bd20c7d13e78be74df7cbca26c61b60a92
                                                      • Instruction Fuzzy Hash: B2326E709002189BDF14EF90D981BEDB7B5FF06308F28605AE90EBB291D775AD46CB61
                                                      APIs
                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00EB6766,?,?,00000008,?,?,00EBFEFE,00000000), ref: 00EB6998
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ExceptionRaise
                                                      • String ID:
                                                      • API String ID: 3997070919-0
                                                      • Opcode ID: bb9be40ae88e2e5908989610216440ab03b2d7afe8eb1cb01c883d573b16d636
                                                      • Instruction ID: 356af82c5a5cc5dd723fe91474da706cce09f9e8fc79d7f940638158b911c00d
                                                      • Opcode Fuzzy Hash: bb9be40ae88e2e5908989610216440ab03b2d7afe8eb1cb01c883d573b16d636
                                                      • Instruction Fuzzy Hash: 2FB16E31510609DFDB19CF28C486BA67BE0FF45368F259658E899DF2A1C739D981CB40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: f2567e3282913a43dc99c6325c6a67254825a5bfb2fba13839b088178a4dd2e8
                                                      • Instruction ID: 461fc6031b69b7d6359308a73d0042447152a2710dc6f946b54e46fa53260d96
                                                      • Opcode Fuzzy Hash: f2567e3282913a43dc99c6325c6a67254825a5bfb2fba13839b088178a4dd2e8
                                                      • Instruction Fuzzy Hash: 81125C719002299BCF24CF58D9816EEB7F5FF48710F1491AAE849FB251EB309E81DB90
                                                      APIs
                                                      • BlockInput.USER32(00000001), ref: 00EFEABD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: BlockInput
                                                      • String ID:
                                                      • API String ID: 3456056419-0
                                                      • Opcode ID: f505187f4da11b7f395f0096eb797c8e349f9698e4ae1b0d2857c4266fd3d40f
                                                      • Instruction ID: c66d2cf3b7a901e7e4c1a54ce98d7e4882b09cf31d3df63c818ac3fef088bdea
                                                      • Opcode Fuzzy Hash: f505187f4da11b7f395f0096eb797c8e349f9698e4ae1b0d2857c4266fd3d40f
                                                      • Instruction Fuzzy Hash: B5E01A312002089FD710EF59D804E9ABBE9AF997A4F009416FD4DE7361DA70A8408BA0
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00EA03EE), ref: 00EA09DA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 4eab8b112c6a99fa05bc2ce36af79dd347f6b3e981549fcefe0c299c25921a4a
                                                      • Instruction ID: ac866a93df09ee54d1d6616d06794de1e56d0242e63ae79d0facbfe78babb7a6
                                                      • Opcode Fuzzy Hash: 4eab8b112c6a99fa05bc2ce36af79dd347f6b3e981549fcefe0c299c25921a4a
                                                      • Instruction Fuzzy Hash:
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                      • Instruction ID: 96a4f67583ffa95e072c4ba21c3d865360fb2e5336c26c0cc0839c3537e35ae3
                                                      • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                      • Instruction Fuzzy Hash: A051436260C6156ADB3CC5288D5A7BF67D99B8F308F18350AD8C2FF282C619FE45D352
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2f8b8f68ef44b8ffb5b897009495af20389a7ee8a3193c81c5c23216c696753e
                                                      • Instruction ID: b2657488f37fc72974b64d1171bd9d6b8e3407b15ae251721ac4443f0a76bcba
                                                      • Opcode Fuzzy Hash: 2f8b8f68ef44b8ffb5b897009495af20389a7ee8a3193c81c5c23216c696753e
                                                      • Instruction Fuzzy Hash: 3B322222D29F014DD7739634CC22376A289AFB73C5F15E737E86AB5DA9EB28C4835100
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bb9bd739e36719f30ad77f53a632cd879de1a4e9d4f84d55df17b407266d3be2
                                                      • Instruction ID: e563c62d3b35f5ac498ccafd9e4f4152f9168647154e5e7799246f89172f9f27
                                                      • Opcode Fuzzy Hash: bb9bd739e36719f30ad77f53a632cd879de1a4e9d4f84d55df17b407266d3be2
                                                      • Instruction Fuzzy Hash: E4320831A401078BCF24DA68C4906BDBBA1EB45388F38A967D95AFB391D230DD83DB41
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 977964617864b263a55e65a5d13b8341fa2c89beaeb32e62eca5fbd8c68cce42
                                                      • Instruction ID: 3769f9ca82d9bd39b7f6c1011459592abc1cb6bb4b817830e87be9c8e855a544
                                                      • Opcode Fuzzy Hash: 977964617864b263a55e65a5d13b8341fa2c89beaeb32e62eca5fbd8c68cce42
                                                      • Instruction Fuzzy Hash: 4222BE71A046099FDF14DF64C941AAEB3F2FF48304F246129E85AB7291EB36E951CB50
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 20400b1ebc79c5a2d7603b4d40308f1967bc0f56abf48a8093918fc070e5c0aa
                                                      • Instruction ID: 758dc4e25ad4ef77c7a8b25ee8fae9e64468c43aa98ac37e0dce859e3b23b58b
                                                      • Opcode Fuzzy Hash: 20400b1ebc79c5a2d7603b4d40308f1967bc0f56abf48a8093918fc070e5c0aa
                                                      • Instruction Fuzzy Hash: 900282B0E00209EBDF14DF64D981BADB7F1FF54304F159169E81AAB391EB31AA11CB91
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8bd868e8557ec1ad01e8de25fb289feeafeba3b405a55bc679bb3a83aa03c912
                                                      • Instruction ID: 2e0fd37f3c6e1cb234e9bf986eb39e293c6c3e16346c165de47c7cce0f86ba9c
                                                      • Opcode Fuzzy Hash: 8bd868e8557ec1ad01e8de25fb289feeafeba3b405a55bc679bb3a83aa03c912
                                                      • Instruction Fuzzy Hash: 20B12460D2AF444DC72396398831336B74CAFBB2C5F91D71BFC2674D22EB268A835140
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                      • Instruction ID: 7af11f8247339c38701cee4ab28ad94b688b4f0bd6b4191e93dae62808d30367
                                                      • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                      • Instruction Fuzzy Hash: 209167722080E34ADB2D4639857407EFFE15A973B6B1A17DDD4F2EE1C1FE20A954D620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                      • Instruction ID: 9dd0e684476f1395a0f2d2ef844faf5ed375e3da0affb8a4aabbac401e676237
                                                      • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                      • Instruction Fuzzy Hash: 0891B4322090A34EDB2D427A857407EFFE14A973A6B1A17DDD4F2EE1C1FD24E554D620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9c8f924fa14035ea9dc808f6acb6e84f64abafb6ee69225ae822a2ca312a4300
                                                      • Instruction ID: 7aa9786640288d54b2e974fa75089aa5a464e4273d946f0ef71fccda3dc462de
                                                      • Opcode Fuzzy Hash: 9c8f924fa14035ea9dc808f6acb6e84f64abafb6ee69225ae822a2ca312a4300
                                                      • Instruction Fuzzy Hash: C26158B120870966DA34DA288D95BFF63D6DF8F708F143919E8C2FF281D611BE428365
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f187afd4c7d570bfd0dc3580005d0877652f89a424ed931f68b4a47ebf2f1ed7
                                                      • Instruction ID: d983c8e516a79ea74182eb3834417905e93937d0d34eb50336eaf2e2ab2a8403
                                                      • Opcode Fuzzy Hash: f187afd4c7d570bfd0dc3580005d0877652f89a424ed931f68b4a47ebf2f1ed7
                                                      • Instruction Fuzzy Hash: 2261577160870956DE38CA284DA5BBF23D4AF4F708F14795DE9C3FF281EA12BD428255
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                      • Instruction ID: e83a88d21180a7683f52268cc95f84444d19215dcd46a8c6faef8d4fdc4d84f9
                                                      • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                      • Instruction Fuzzy Hash: FC8185326080A30DDB6D423A853407EFFE15A973A5B1A27DEE4F2DF1C1EE24E554E620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1727069683.000000000174C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0174C000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_174c000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                      • Instruction ID: 08f788a89c043e841a67db8c7d2839992e85bdc4e847fb314291b59decc0b049
                                                      • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                      • Instruction Fuzzy Hash: 1B41C471D1051CDBDF48CFADC991AAEFBF2AF88201F548299D516AB345D730AB41DB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f7bf723f9a3c92f3d16638302ff49e0a26796a1d8b33d6b3a1350720856ae0fa
                                                      • Instruction ID: 8564b1720c0d8ef5fa79e731ae127ecdc18c36da3dff850a87b9d6aeee54dceb
                                                      • Opcode Fuzzy Hash: f7bf723f9a3c92f3d16638302ff49e0a26796a1d8b33d6b3a1350720856ae0fa
                                                      • Instruction Fuzzy Hash: 6A21E7323206158BDB28CF79C82367E73E5A764310F14862EE5A7D73D0DE39A904DB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2279f33e6fc92b13980bfeb94ac58b6175621d3adc6e95f2a867b317778a5135
                                                      • Instruction ID: c45181b31fd6ad21836f885c3b6c83bd4b38d521cb84f01a31c8deb5347d3d8c
                                                      • Opcode Fuzzy Hash: 2279f33e6fc92b13980bfeb94ac58b6175621d3adc6e95f2a867b317778a5135
                                                      • Instruction Fuzzy Hash: 2A11835208DFEBABDB4292B90CBE588BF70881602079847EFC5C446EC7EB8C405BD756
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1727069683.000000000174C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0174C000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_174c000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                      • Instruction ID: 0a7976559691b72424d29560802fba7154afbc20398247121ffd7d7370da01fc
                                                      • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                      • Instruction Fuzzy Hash: 4A019278A11109EFCB84DF98C5909AEF7B5FF48310F208599EC19A7306D730AE51DB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1727069683.000000000174C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0174C000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_174c000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                      • Instruction ID: 5527038ad8de5753a783f2c98c56f686d3116f5d8b95978b72810742df02c708
                                                      • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                      • Instruction Fuzzy Hash: CF014278A01109EFCB84DF98C5909AEF7F5FB48310F208599ED19A7746D770AE41DB90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1727069683.000000000174C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0174C000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_174c000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                      • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                      • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                      • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 00F02B30
                                                      • DeleteObject.GDI32(00000000), ref: 00F02B43
                                                      • DestroyWindow.USER32 ref: 00F02B52
                                                      • GetDesktopWindow.USER32 ref: 00F02B6D
                                                      • GetWindowRect.USER32(00000000), ref: 00F02B74
                                                      • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00F02CA3
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00F02CB1
                                                      • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F02CF8
                                                      • GetClientRect.USER32(00000000,?), ref: 00F02D04
                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00F02D40
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F02D62
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F02D75
                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F02D80
                                                      • GlobalLock.KERNEL32(00000000), ref: 00F02D89
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F02D98
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00F02DA1
                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F02DA8
                                                      • GlobalFree.KERNEL32(00000000), ref: 00F02DB3
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F02DC5
                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00F1FC38,00000000), ref: 00F02DDB
                                                      • GlobalFree.KERNEL32(00000000), ref: 00F02DEB
                                                      • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00F02E11
                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00F02E30
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F02E52
                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F0303F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                      • String ID: $AutoIt v3$DISPLAY$static
                                                      • API String ID: 2211948467-2373415609
                                                      • Opcode ID: a36f4c915e468581435d8fefa2e60cb687bbfb3eb346ae3f51a2adeae56e084b
                                                      • Instruction ID: a250e71c8861fde0a47e05e8562e92984947b408f334881c5c918d6e3217d701
                                                      • Opcode Fuzzy Hash: a36f4c915e468581435d8fefa2e60cb687bbfb3eb346ae3f51a2adeae56e084b
                                                      • Instruction Fuzzy Hash: 9A027F71940209AFDB14DF64CC89EAE7BB9FF49711F118158F919AB2A1C770ED01EBA0
                                                      APIs
                                                      • SetTextColor.GDI32(?,00000000), ref: 00F1712F
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00F17160
                                                      • GetSysColor.USER32(0000000F), ref: 00F1716C
                                                      • SetBkColor.GDI32(?,000000FF), ref: 00F17186
                                                      • SelectObject.GDI32(?,?), ref: 00F17195
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00F171C0
                                                      • GetSysColor.USER32(00000010), ref: 00F171C8
                                                      • CreateSolidBrush.GDI32(00000000), ref: 00F171CF
                                                      • FrameRect.USER32(?,?,00000000), ref: 00F171DE
                                                      • DeleteObject.GDI32(00000000), ref: 00F171E5
                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 00F17230
                                                      • FillRect.USER32(?,?,?), ref: 00F17262
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F17284
                                                        • Part of subcall function 00F173E8: GetSysColor.USER32(00000012), ref: 00F17421
                                                        • Part of subcall function 00F173E8: SetTextColor.GDI32(?,?), ref: 00F17425
                                                        • Part of subcall function 00F173E8: GetSysColorBrush.USER32(0000000F), ref: 00F1743B
                                                        • Part of subcall function 00F173E8: GetSysColor.USER32(0000000F), ref: 00F17446
                                                        • Part of subcall function 00F173E8: GetSysColor.USER32(00000011), ref: 00F17463
                                                        • Part of subcall function 00F173E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F17471
                                                        • Part of subcall function 00F173E8: SelectObject.GDI32(?,00000000), ref: 00F17482
                                                        • Part of subcall function 00F173E8: SetBkColor.GDI32(?,00000000), ref: 00F1748B
                                                        • Part of subcall function 00F173E8: SelectObject.GDI32(?,?), ref: 00F17498
                                                        • Part of subcall function 00F173E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00F174B7
                                                        • Part of subcall function 00F173E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F174CE
                                                        • Part of subcall function 00F173E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00F174DB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                      • String ID:
                                                      • API String ID: 4124339563-0
                                                      • Opcode ID: d19b9298f7c9dd9b9df66f2819596236b5d30f07210a4564e9e81fe1f50a9aad
                                                      • Instruction ID: 1c635f4732394e9cf36632859ff69f17ddaedd6bce1edf8dff4818a195d6a58a
                                                      • Opcode Fuzzy Hash: d19b9298f7c9dd9b9df66f2819596236b5d30f07210a4564e9e81fe1f50a9aad
                                                      • Instruction Fuzzy Hash: 91A1BF72448305BFDB00AF60DC48A9B7BB9FB49320F144A19F966A61E0D730E940EF91
                                                      APIs
                                                      • DestroyWindow.USER32(?,?), ref: 00E98E14
                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 00ED6AC5
                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00ED6AFE
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00ED6F43
                                                        • Part of subcall function 00E98F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E98BE8,?,00000000,?,?,?,?,00E98BBA,00000000,?), ref: 00E98FC5
                                                      • SendMessageW.USER32(?,00001053), ref: 00ED6F7F
                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00ED6F96
                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00ED6FAC
                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00ED6FB7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                      • String ID: 0
                                                      • API String ID: 2760611726-4108050209
                                                      • Opcode ID: 0c0778d27c4d3ade43b56b73cccc335d7416e5d32d8429c26cf1f04b850cf22d
                                                      • Instruction ID: ef9d22b2d2ec2fb79674b5a39713de829583835e297e91c10fef68dc207c7cff
                                                      • Opcode Fuzzy Hash: 0c0778d27c4d3ade43b56b73cccc335d7416e5d32d8429c26cf1f04b850cf22d
                                                      • Instruction Fuzzy Hash: C112CC30200205DFDB25CF24C954BAAB7F1FB49308F14A46AF599EB261CB31EC52EB91
                                                      APIs
                                                      • DestroyWindow.USER32(00000000), ref: 00F0273E
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00F0286A
                                                      • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00F028A9
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00F028B9
                                                      • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00F02900
                                                      • GetClientRect.USER32(00000000,?), ref: 00F0290C
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00F02955
                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00F02964
                                                      • GetStockObject.GDI32(00000011), ref: 00F02974
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00F02978
                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00F02988
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F02991
                                                      • DeleteDC.GDI32(00000000), ref: 00F0299A
                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00F029C6
                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 00F029DD
                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00F02A1D
                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00F02A31
                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 00F02A42
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00F02A77
                                                      • GetStockObject.GDI32(00000011), ref: 00F02A82
                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00F02A8D
                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00F02A97
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                      • API String ID: 2910397461-517079104
                                                      • Opcode ID: 710e730317a7a86c3f7f4bda50593d30741d41f08bafe56d8b3ab89f73636b60
                                                      • Instruction ID: eeacaa49f431ac5e5f6a97abb1aa40c1d309d62ee126e2c8ff683bc29d0066f1
                                                      • Opcode Fuzzy Hash: 710e730317a7a86c3f7f4bda50593d30741d41f08bafe56d8b3ab89f73636b60
                                                      • Instruction Fuzzy Hash: 50B14971A40219AFEB14DFA8CC49FAA7BA9FB48711F108115FA18E72D0D770ED40DBA0
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00EF4AED
                                                      • GetDriveTypeW.KERNEL32(?,00F1CB68,?,\\.\,00F1CC08), ref: 00EF4BCA
                                                      • SetErrorMode.KERNEL32(00000000,00F1CB68,?,\\.\,00F1CC08), ref: 00EF4D36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DriveType
                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                      • API String ID: 2907320926-4222207086
                                                      • Opcode ID: 77d61d0204948aedf09393397abd55602f46f34f152844d8f79e9c164c7695de
                                                      • Instruction ID: a06b5a3b4c400a46b71bddafab982a0d7d8c78dde5699adfa1b86ea3e34ec21d
                                                      • Opcode Fuzzy Hash: 77d61d0204948aedf09393397abd55602f46f34f152844d8f79e9c164c7695de
                                                      • Instruction Fuzzy Hash: 7161E6B1A0520D9BDB04DF14C981ABABBB0AB45714B247015FE0AFB2D2DB36DD41EB53
                                                      APIs
                                                      • GetSysColor.USER32(00000012), ref: 00F17421
                                                      • SetTextColor.GDI32(?,?), ref: 00F17425
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00F1743B
                                                      • GetSysColor.USER32(0000000F), ref: 00F17446
                                                      • CreateSolidBrush.GDI32(?), ref: 00F1744B
                                                      • GetSysColor.USER32(00000011), ref: 00F17463
                                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F17471
                                                      • SelectObject.GDI32(?,00000000), ref: 00F17482
                                                      • SetBkColor.GDI32(?,00000000), ref: 00F1748B
                                                      • SelectObject.GDI32(?,?), ref: 00F17498
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00F174B7
                                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F174CE
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00F174DB
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F1752A
                                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00F17554
                                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 00F17572
                                                      • DrawFocusRect.USER32(?,?), ref: 00F1757D
                                                      • GetSysColor.USER32(00000011), ref: 00F1758E
                                                      • SetTextColor.GDI32(?,00000000), ref: 00F17596
                                                      • DrawTextW.USER32(?,00F170F5,000000FF,?,00000000), ref: 00F175A8
                                                      • SelectObject.GDI32(?,?), ref: 00F175BF
                                                      • DeleteObject.GDI32(?), ref: 00F175CA
                                                      • SelectObject.GDI32(?,?), ref: 00F175D0
                                                      • DeleteObject.GDI32(?), ref: 00F175D5
                                                      • SetTextColor.GDI32(?,?), ref: 00F175DB
                                                      • SetBkColor.GDI32(?,?), ref: 00F175E5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                      • String ID:
                                                      • API String ID: 1996641542-0
                                                      • Opcode ID: 4bc031b7976a0be69ec902bd96d35843a9319b8469c50caeae6aec92aafe2525
                                                      • Instruction ID: cdbf0abcdbc58a3db01a3c73cd6e580fd89d9c71554e5a0c8d9377eaa3bf9345
                                                      • Opcode Fuzzy Hash: 4bc031b7976a0be69ec902bd96d35843a9319b8469c50caeae6aec92aafe2525
                                                      • Instruction Fuzzy Hash: F7615C72D44218BFDF019FA4DC49AEEBFB9EB08320F158115F915BB2A1D7719940EB90
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 00F11128
                                                      • GetDesktopWindow.USER32 ref: 00F1113D
                                                      • GetWindowRect.USER32(00000000), ref: 00F11144
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F11199
                                                      • DestroyWindow.USER32(?), ref: 00F111B9
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00F111ED
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F1120B
                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F1121D
                                                      • SendMessageW.USER32(00000000,00000421,?,?), ref: 00F11232
                                                      • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00F11245
                                                      • IsWindowVisible.USER32(00000000), ref: 00F112A1
                                                      • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00F112BC
                                                      • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00F112D0
                                                      • GetWindowRect.USER32(00000000,?), ref: 00F112E8
                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00F1130E
                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 00F11328
                                                      • CopyRect.USER32(?,?), ref: 00F1133F
                                                      • SendMessageW.USER32(00000000,00000412,00000000), ref: 00F113AA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                      • String ID: ($0$tooltips_class32
                                                      • API String ID: 698492251-4156429822
                                                      • Opcode ID: 136dc6032fd23a209604891834b65777ad066a0e7a914529b770687c0e64b18f
                                                      • Instruction ID: bf683c02e1915530f34a85d730cefe7ece555aa4914eada41d3c6e1539989696
                                                      • Opcode Fuzzy Hash: 136dc6032fd23a209604891834b65777ad066a0e7a914529b770687c0e64b18f
                                                      • Instruction Fuzzy Hash: 42B16F71A04341AFD714DF64C885BAABBE5FF88750F00891CFA9DAB2A1C771D844DB91
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E98968
                                                      • GetSystemMetrics.USER32(00000007), ref: 00E98970
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E9899B
                                                      • GetSystemMetrics.USER32(00000008), ref: 00E989A3
                                                      • GetSystemMetrics.USER32(00000004), ref: 00E989C8
                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00E989E5
                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00E989F5
                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00E98A28
                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00E98A3C
                                                      • GetClientRect.USER32(00000000,000000FF), ref: 00E98A5A
                                                      • GetStockObject.GDI32(00000011), ref: 00E98A76
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E98A81
                                                        • Part of subcall function 00E9912D: GetCursorPos.USER32(?), ref: 00E99141
                                                        • Part of subcall function 00E9912D: ScreenToClient.USER32(00000000,?), ref: 00E9915E
                                                        • Part of subcall function 00E9912D: GetAsyncKeyState.USER32(00000001), ref: 00E99183
                                                        • Part of subcall function 00E9912D: GetAsyncKeyState.USER32(00000002), ref: 00E9919D
                                                      • SetTimer.USER32(00000000,00000000,00000028,00E990FC), ref: 00E98AA8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                      • String ID: AutoIt v3 GUI
                                                      • API String ID: 1458621304-248962490
                                                      • Opcode ID: 0f1df2212a7e09c2741a809d5b451cbd2be7c35e283e28c83050ada94472dfba
                                                      • Instruction ID: 0f850a8c1a684748289678ea149977c8dfeb178d167652a6f66328da7dac70a2
                                                      • Opcode Fuzzy Hash: 0f1df2212a7e09c2741a809d5b451cbd2be7c35e283e28c83050ada94472dfba
                                                      • Instruction Fuzzy Hash: 73B18C31A402099FDF14DFA8CD45BEE3BB5FB48315F11522AFA15AB2A0DB74E841DB90
                                                      APIs
                                                        • Part of subcall function 00EE10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00EE1114
                                                        • Part of subcall function 00EE10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00EE0B9B,?,?,?), ref: 00EE1120
                                                        • Part of subcall function 00EE10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00EE0B9B,?,?,?), ref: 00EE112F
                                                        • Part of subcall function 00EE10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00EE0B9B,?,?,?), ref: 00EE1136
                                                        • Part of subcall function 00EE10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00EE114D
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00EE0DF5
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00EE0E29
                                                      • GetLengthSid.ADVAPI32(?), ref: 00EE0E40
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00EE0E7A
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00EE0E96
                                                      • GetLengthSid.ADVAPI32(?), ref: 00EE0EAD
                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00EE0EB5
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00EE0EBC
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00EE0EDD
                                                      • CopySid.ADVAPI32(00000000), ref: 00EE0EE4
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00EE0F13
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00EE0F35
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00EE0F47
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EE0F6E
                                                      • HeapFree.KERNEL32(00000000), ref: 00EE0F75
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EE0F7E
                                                      • HeapFree.KERNEL32(00000000), ref: 00EE0F85
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EE0F8E
                                                      • HeapFree.KERNEL32(00000000), ref: 00EE0F95
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00EE0FA1
                                                      • HeapFree.KERNEL32(00000000), ref: 00EE0FA8
                                                        • Part of subcall function 00EE1193: GetProcessHeap.KERNEL32(00000008,00EE0BB1,?,00000000,?,00EE0BB1,?), ref: 00EE11A1
                                                        • Part of subcall function 00EE1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00EE0BB1,?), ref: 00EE11A8
                                                        • Part of subcall function 00EE1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00EE0BB1,?), ref: 00EE11B7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                      • String ID:
                                                      • API String ID: 4175595110-0
                                                      • Opcode ID: 7fb8805db076c21629c5762cd0369cf183a2b548b8768f4bef1b22015ced24de
                                                      • Instruction ID: aac8de64b3d74f253462dd9912c77dccc816422c4701a4393be23e2c033fa14e
                                                      • Opcode Fuzzy Hash: 7fb8805db076c21629c5762cd0369cf183a2b548b8768f4bef1b22015ced24de
                                                      • Instruction Fuzzy Hash: 72717B72A4024EABDF209FA6DC44BEEBBB8BF08304F058115F959F6191D7709E55CBA0
                                                      APIs
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F0C4BD
                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00F1CC08,00000000,?,00000000,?,?), ref: 00F0C544
                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00F0C5A4
                                                      • _wcslen.LIBCMT ref: 00F0C5F4
                                                      • _wcslen.LIBCMT ref: 00F0C66F
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00F0C6B2
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00F0C7C1
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00F0C84D
                                                      • RegCloseKey.ADVAPI32(?), ref: 00F0C881
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00F0C88E
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00F0C960
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                      • API String ID: 9721498-966354055
                                                      • Opcode ID: 4fafcc7824d02ea443e5377d352a558e35e44ffd85e2e44d4706fe1df4efbb7c
                                                      • Instruction ID: 4576173ac8d5c82f432a0fc919ac9d5ecbe0f51ed466067f0081f925557769e4
                                                      • Opcode Fuzzy Hash: 4fafcc7824d02ea443e5377d352a558e35e44ffd85e2e44d4706fe1df4efbb7c
                                                      • Instruction Fuzzy Hash: 48126A356042019FD714EF14C881A2AB7E5FF88724F19895CF89EAB3A2DB31ED41DB91
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 00F109C6
                                                      • _wcslen.LIBCMT ref: 00F10A01
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F10A54
                                                      • _wcslen.LIBCMT ref: 00F10A8A
                                                      • _wcslen.LIBCMT ref: 00F10B06
                                                      • _wcslen.LIBCMT ref: 00F10B81
                                                        • Part of subcall function 00E9F9F2: _wcslen.LIBCMT ref: 00E9F9FD
                                                        • Part of subcall function 00EE2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00EE2BFA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                      • API String ID: 1103490817-4258414348
                                                      • Opcode ID: 1814247841c76698b6ec4e36fe5b5bdcead8600fa57426e5eb5f8e825a94da50
                                                      • Instruction ID: 56a5e9542fae7b6f196ab5b8e0680aed2d98f47f95d21df4f185352ba2d4894e
                                                      • Opcode Fuzzy Hash: 1814247841c76698b6ec4e36fe5b5bdcead8600fa57426e5eb5f8e825a94da50
                                                      • Instruction Fuzzy Hash: E7E1AD326083419FC714EF24C45096AB7E2BFD8314B14895CF89AAB3A2DB71EDC5DB91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharUpper
                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                      • API String ID: 1256254125-909552448
                                                      • Opcode ID: a6bfcf23fa3613b266022ace5067df7b650e789528ea652c131c2f048a91137a
                                                      • Instruction ID: c9f651fdb2e4794d7d0f69c3b3ba2478a3a07fa7546187f49953fba17498f485
                                                      • Opcode Fuzzy Hash: a6bfcf23fa3613b266022ace5067df7b650e789528ea652c131c2f048a91137a
                                                      • Instruction Fuzzy Hash: D5710473A0016A8BCB20EF6CCC516BB3791ABA1760B654724FC56AB2C5E734DD44B3E0
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 00F1835A
                                                      • _wcslen.LIBCMT ref: 00F1836E
                                                      • _wcslen.LIBCMT ref: 00F18391
                                                      • _wcslen.LIBCMT ref: 00F183B4
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00F183F2
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00F1361A,?), ref: 00F1844E
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F18487
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00F184CA
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F18501
                                                      • FreeLibrary.KERNEL32(?), ref: 00F1850D
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F1851D
                                                      • DestroyIcon.USER32(?), ref: 00F1852C
                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00F18549
                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00F18555
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                      • String ID: .dll$.exe$.icl
                                                      • API String ID: 799131459-1154884017
                                                      • Opcode ID: b6eb51a06825f529ea9bfdca1013c5e2a4963368870fd17ec9971c04d9588583
                                                      • Instruction ID: 832693c603a1e862b37c3ff45812b26cb7c56d2d79c5642f6ce0c477bc356519
                                                      • Opcode Fuzzy Hash: b6eb51a06825f529ea9bfdca1013c5e2a4963368870fd17ec9971c04d9588583
                                                      • Instruction Fuzzy Hash: 1A61D171940209BAEB14DF64CD41BFE77A8FF48761F108609F815EA0D1DFB4A991E7A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                      • API String ID: 0-1645009161
                                                      • Opcode ID: 331647051a6af73314e381cce07a79c2dd9e7e596863c61a80fb885bc48a124d
                                                      • Instruction ID: 0dd8919f1db7979dcd660e1e2706312f124f963039a23bf3363d85203c6849c2
                                                      • Opcode Fuzzy Hash: 331647051a6af73314e381cce07a79c2dd9e7e596863c61a80fb885bc48a124d
                                                      • Instruction Fuzzy Hash: 9281F271A44605ABDB20BF60CD42FEE77F8AF15300F146029F84CBA196EB72E951D7A1
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?), ref: 00EF3EF8
                                                      • _wcslen.LIBCMT ref: 00EF3F03
                                                      • _wcslen.LIBCMT ref: 00EF3F5A
                                                      • _wcslen.LIBCMT ref: 00EF3F98
                                                      • GetDriveTypeW.KERNEL32(?), ref: 00EF3FD6
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EF401E
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EF4059
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EF4087
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                      • API String ID: 1839972693-4113822522
                                                      • Opcode ID: fbdb9541488c651befb48f0851d2588aa0c7c29833694a235fe16a501b134b48
                                                      • Instruction ID: 607196999970730444681aecae85de1b6d958f4d4471371eef7ab22bb52980d7
                                                      • Opcode Fuzzy Hash: fbdb9541488c651befb48f0851d2588aa0c7c29833694a235fe16a501b134b48
                                                      • Instruction Fuzzy Hash: F37190726042069FC310EF34C8818BBB7E4EF95758F10592DFA99A7291EB31DE45CB52
                                                      APIs
                                                      • LoadIconW.USER32(00000063), ref: 00EE5A2E
                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00EE5A40
                                                      • SetWindowTextW.USER32(?,?), ref: 00EE5A57
                                                      • GetDlgItem.USER32(?,000003EA), ref: 00EE5A6C
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00EE5A72
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00EE5A82
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00EE5A88
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00EE5AA9
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00EE5AC3
                                                      • GetWindowRect.USER32(?,?), ref: 00EE5ACC
                                                      • _wcslen.LIBCMT ref: 00EE5B33
                                                      • SetWindowTextW.USER32(?,?), ref: 00EE5B6F
                                                      • GetDesktopWindow.USER32 ref: 00EE5B75
                                                      • GetWindowRect.USER32(00000000), ref: 00EE5B7C
                                                      • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00EE5BD3
                                                      • GetClientRect.USER32(?,?), ref: 00EE5BE0
                                                      • PostMessageW.USER32(?,00000005,00000000,?), ref: 00EE5C05
                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00EE5C2F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                      • String ID:
                                                      • API String ID: 895679908-0
                                                      • Opcode ID: b14a00c3c9758462aae766fcb85f2f76efd90b0da5ceba728699d9041f52c647
                                                      • Instruction ID: 4dd6764e77ca8b2561ac5130962f2b1dcfeaa62bcfa0f5c5fa60e6fc6a59e4aa
                                                      • Opcode Fuzzy Hash: b14a00c3c9758462aae766fcb85f2f76efd90b0da5ceba728699d9041f52c647
                                                      • Instruction Fuzzy Hash: 37717C32900B49AFDB20DFA9CE85AAEBBF5FF48708F105518E146B35A0D775E940DB50
                                                      APIs
                                                      • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00EA00C6
                                                        • Part of subcall function 00EA00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00F5070C,00000FA0,5ECDC24C,?,?,?,?,00EC23B3,000000FF), ref: 00EA011C
                                                        • Part of subcall function 00EA00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00EC23B3,000000FF), ref: 00EA0127
                                                        • Part of subcall function 00EA00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00EC23B3,000000FF), ref: 00EA0138
                                                        • Part of subcall function 00EA00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00EA014E
                                                        • Part of subcall function 00EA00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00EA015C
                                                        • Part of subcall function 00EA00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00EA016A
                                                        • Part of subcall function 00EA00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00EA0195
                                                        • Part of subcall function 00EA00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00EA01A0
                                                      • ___scrt_fastfail.LIBCMT ref: 00EA00E7
                                                        • Part of subcall function 00EA00A3: __onexit.LIBCMT ref: 00EA00A9
                                                      Strings
                                                      • kernel32.dll, xrefs: 00EA0133
                                                      • WakeAllConditionVariable, xrefs: 00EA0162
                                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00EA0122
                                                      • SleepConditionVariableCS, xrefs: 00EA0154
                                                      • InitializeConditionVariable, xrefs: 00EA0148
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                      • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                      • API String ID: 66158676-1714406822
                                                      • Opcode ID: 53ace4fe6217860530e074f69ac18997f2d12ae959375877db81533d1fde4654
                                                      • Instruction ID: edc2012803edf273d4f751db3280fdd1f84e65f8e0e1db0d74293c126e911e57
                                                      • Opcode Fuzzy Hash: 53ace4fe6217860530e074f69ac18997f2d12ae959375877db81533d1fde4654
                                                      • Instruction Fuzzy Hash: 7B212632A857156BE7105B64BC46BEA37E4EB0EB61F01512AFD01FB291DF60E800AA91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                      • API String ID: 176396367-1603158881
                                                      • Opcode ID: 72a0dad7c4805bf0e857dcb67ea7c69a7e5fb29656d218b1d8740e377e35dcff
                                                      • Instruction ID: 0666854599ba77fa66e6620aa9160e5e1763e9284115f90b109af9fe1e1d8280
                                                      • Opcode Fuzzy Hash: 72a0dad7c4805bf0e857dcb67ea7c69a7e5fb29656d218b1d8740e377e35dcff
                                                      • Instruction Fuzzy Hash: 5EE13A31A0055AABCB18DFB5C449BEEFBB0FF44714F54A129E466F7281DB30AE858790
                                                      APIs
                                                      • CharLowerBuffW.USER32(00000000,00000000,00F1CC08), ref: 00EF4527
                                                      • _wcslen.LIBCMT ref: 00EF453B
                                                      • _wcslen.LIBCMT ref: 00EF4599
                                                      • _wcslen.LIBCMT ref: 00EF45F4
                                                      • _wcslen.LIBCMT ref: 00EF463F
                                                      • _wcslen.LIBCMT ref: 00EF46A7
                                                        • Part of subcall function 00E9F9F2: _wcslen.LIBCMT ref: 00E9F9FD
                                                      • GetDriveTypeW.KERNEL32(?,00F46BF0,00000061), ref: 00EF4743
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharDriveLowerType
                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                      • API String ID: 2055661098-1000479233
                                                      • Opcode ID: ffc1eaa3d1c701c7f5832859676886974c0218f7e27ba343bb395188a74b2ce7
                                                      • Instruction ID: 0796e59135ab7fbe18b9f646085574d58d1b7f7dd6aac9c0063d99ada643b2af
                                                      • Opcode Fuzzy Hash: ffc1eaa3d1c701c7f5832859676886974c0218f7e27ba343bb395188a74b2ce7
                                                      • Instruction Fuzzy Hash: 04B123B16083069BC710EF28C89097BB7E4AFD6724F50691DF69AE72D1D730D944CB52
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 00F0B198
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F0B1B0
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F0B1D4
                                                      • _wcslen.LIBCMT ref: 00F0B200
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F0B214
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F0B236
                                                      • _wcslen.LIBCMT ref: 00F0B332
                                                        • Part of subcall function 00EF05A7: GetStdHandle.KERNEL32(000000F6), ref: 00EF05C6
                                                      • _wcslen.LIBCMT ref: 00F0B34B
                                                      • _wcslen.LIBCMT ref: 00F0B366
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F0B3B6
                                                      • GetLastError.KERNEL32(00000000), ref: 00F0B407
                                                      • CloseHandle.KERNEL32(?), ref: 00F0B439
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F0B44A
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F0B45C
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F0B46E
                                                      • CloseHandle.KERNEL32(?), ref: 00F0B4E3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 2178637699-0
                                                      • Opcode ID: 3e5996d8bb41d1d7d8866402ba710a0e092427d68364b738e6a6cded769546ec
                                                      • Instruction ID: f97f58c3ad29e7062be0653d74edceb421c98e1de1c5ee726c0ea5451b242c5f
                                                      • Opcode Fuzzy Hash: 3e5996d8bb41d1d7d8866402ba710a0e092427d68364b738e6a6cded769546ec
                                                      • Instruction Fuzzy Hash: 92F1A071A043409FC715EF24C881B6EBBE5AF85724F14855DF8999B2E2DB31EC40EB52
                                                      APIs
                                                      • GetMenuItemCount.USER32(00F51990), ref: 00EC2F8D
                                                      • GetMenuItemCount.USER32(00F51990), ref: 00EC303D
                                                      • GetCursorPos.USER32(?), ref: 00EC3081
                                                      • SetForegroundWindow.USER32(00000000), ref: 00EC308A
                                                      • TrackPopupMenuEx.USER32(00F51990,00000000,?,00000000,00000000,00000000), ref: 00EC309D
                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00EC30A9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                      • String ID: 0
                                                      • API String ID: 36266755-4108050209
                                                      • Opcode ID: cf9ef4a5ddaeedd4d5bc60e354806213126cdaab65a4391fb1eb1e1b806d455b
                                                      • Instruction ID: 7361cdbfdab9a4f5a182631032c92c89dd92f5b655ad84c545f429f38a346883
                                                      • Opcode Fuzzy Hash: cf9ef4a5ddaeedd4d5bc60e354806213126cdaab65a4391fb1eb1e1b806d455b
                                                      • Instruction Fuzzy Hash: CC711A71644249BEEB219F28CD49FDABF69FF05724F20421EF618761E0C7B2A911D790
                                                      APIs
                                                      • DestroyWindow.USER32(?,?), ref: 00F16DEB
                                                        • Part of subcall function 00E86B57: _wcslen.LIBCMT ref: 00E86B6A
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00F16E5F
                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00F16E81
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F16E94
                                                      • DestroyWindow.USER32(?), ref: 00F16EB5
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00E80000,00000000), ref: 00F16EE4
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F16EFD
                                                      • GetDesktopWindow.USER32 ref: 00F16F16
                                                      • GetWindowRect.USER32(00000000), ref: 00F16F1D
                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F16F35
                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00F16F4D
                                                        • Part of subcall function 00E99944: GetWindowLongW.USER32(?,000000EB), ref: 00E99952
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                      • String ID: 0$tooltips_class32
                                                      • API String ID: 2429346358-3619404913
                                                      • Opcode ID: f5f8fff5b03ec2770cf1c28c205b3ee45d89be793f0a941a65f42691b08f61d3
                                                      • Instruction ID: 409871da581dc3a9bfe09e268741608a3a00f4c48861acb16e96ef4318a9ed97
                                                      • Opcode Fuzzy Hash: f5f8fff5b03ec2770cf1c28c205b3ee45d89be793f0a941a65f42691b08f61d3
                                                      • Instruction Fuzzy Hash: 3D718670644348AFEB21CF18D848BAABBE9FB88314F04451DF999C7260D770E946EF52
                                                      APIs
                                                        • Part of subcall function 00E99BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E99BB2
                                                      • DragQueryPoint.SHELL32(?,?), ref: 00F19147
                                                        • Part of subcall function 00F17674: ClientToScreen.USER32(?,?), ref: 00F1769A
                                                        • Part of subcall function 00F17674: GetWindowRect.USER32(?,?), ref: 00F17710
                                                        • Part of subcall function 00F17674: PtInRect.USER32(?,?,00F18B89), ref: 00F17720
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00F191B0
                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00F191BB
                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00F191DE
                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00F19225
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00F1923E
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00F19255
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00F19277
                                                      • DragFinish.SHELL32(?), ref: 00F1927E
                                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00F19371
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                      • API String ID: 221274066-3440237614
                                                      • Opcode ID: 86a8d7225b311414213eb48c5a241c135d50049f7ffe9eb78d430a8fc035c675
                                                      • Instruction ID: ccf13c29ba4d2d31158e7f46158bbc40577a65b1722473807741359a2a2d89ce
                                                      • Opcode Fuzzy Hash: 86a8d7225b311414213eb48c5a241c135d50049f7ffe9eb78d430a8fc035c675
                                                      • Instruction Fuzzy Hash: 8861AC71108305AFD701EF60DC95DAFBBE8EF89350F04092EF599A31A1DB709A48DB92
                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00EFC4B0
                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00EFC4C3
                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00EFC4D7
                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00EFC4F0
                                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00EFC533
                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00EFC549
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00EFC554
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00EFC584
                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00EFC5DC
                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00EFC5F0
                                                      • InternetCloseHandle.WININET(00000000), ref: 00EFC5FB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                      • String ID:
                                                      • API String ID: 3800310941-3916222277
                                                      • Opcode ID: 3701b00c0b4566cf30dc16632df2c6fd8cb2dd9e3d0b8dfde94c6e200c534439
                                                      • Instruction ID: 554f4cdda617792b0b815191ee9674bf7b7be9d0792175788398363035f4bb04
                                                      • Opcode Fuzzy Hash: 3701b00c0b4566cf30dc16632df2c6fd8cb2dd9e3d0b8dfde94c6e200c534439
                                                      • Instruction Fuzzy Hash: 84514EB154020DBFDB218F60CA48ABB7BFCFF08758F209419FA45A6150DB74E944EBA0
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00F18592
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00F185A2
                                                      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00F185AD
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F185BA
                                                      • GlobalLock.KERNEL32(00000000), ref: 00F185C8
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00F185D7
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00F185E0
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F185E7
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00F185F8
                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00F1FC38,?), ref: 00F18611
                                                      • GlobalFree.KERNEL32(00000000), ref: 00F18621
                                                      • GetObjectW.GDI32(?,00000018,000000FF), ref: 00F18641
                                                      • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00F18671
                                                      • DeleteObject.GDI32(00000000), ref: 00F18699
                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00F186AF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                      • String ID:
                                                      • API String ID: 3840717409-0
                                                      • Opcode ID: fe4dde5608e8a9a3b1793f742cd0d14f0c14d659eb5abf9ad098fb9ddef6a7e5
                                                      • Instruction ID: df1dde1c9ccefc2827b136aaf460e4c568556cf94e43706bdea0295a116ba91a
                                                      • Opcode Fuzzy Hash: fe4dde5608e8a9a3b1793f742cd0d14f0c14d659eb5abf9ad098fb9ddef6a7e5
                                                      • Instruction Fuzzy Hash: 42413971640208AFDB118FA5CD48EEA7BB9EF89761F158058F909E7260DB309D41EB60
                                                      APIs
                                                      • VariantInit.OLEAUT32(00000000), ref: 00EF1502
                                                      • VariantCopy.OLEAUT32(?,?), ref: 00EF150B
                                                      • VariantClear.OLEAUT32(?), ref: 00EF1517
                                                      • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00EF15FB
                                                      • VarR8FromDec.OLEAUT32(?,?), ref: 00EF1657
                                                      • VariantInit.OLEAUT32(?), ref: 00EF1708
                                                      • SysFreeString.OLEAUT32(?), ref: 00EF178C
                                                      • VariantClear.OLEAUT32(?), ref: 00EF17D8
                                                      • VariantClear.OLEAUT32(?), ref: 00EF17E7
                                                      • VariantInit.OLEAUT32(00000000), ref: 00EF1823
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                      • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                      • API String ID: 1234038744-3931177956
                                                      • Opcode ID: 4882c0b1afecb6c3c48fc43c7c8d8aa1eb5e1512401030b22fe64ade6a788dac
                                                      • Instruction ID: aa88a01a2d0c7a1d62eaedd215342d4a3250c2a361726398768639696b2c0b8b
                                                      • Opcode Fuzzy Hash: 4882c0b1afecb6c3c48fc43c7c8d8aa1eb5e1512401030b22fe64ade6a788dac
                                                      • Instruction Fuzzy Hash: 30D1D031A0421DDBDF04AF65D885BB9B7F6BF45700F14909AEA4ABB181DB30DC41DBA2
                                                      APIs
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                        • Part of subcall function 00F0C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F0B6AE,?,?), ref: 00F0C9B5
                                                        • Part of subcall function 00F0C998: _wcslen.LIBCMT ref: 00F0C9F1
                                                        • Part of subcall function 00F0C998: _wcslen.LIBCMT ref: 00F0CA68
                                                        • Part of subcall function 00F0C998: _wcslen.LIBCMT ref: 00F0CA9E
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F0B6F4
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F0B772
                                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 00F0B80A
                                                      • RegCloseKey.ADVAPI32(?), ref: 00F0B87E
                                                      • RegCloseKey.ADVAPI32(?), ref: 00F0B89C
                                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00F0B8F2
                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F0B904
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F0B922
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00F0B983
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00F0B994
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                      • API String ID: 146587525-4033151799
                                                      • Opcode ID: 380dfeb00884f15c0eefd92785894764198e03b47ab7a9698f0a8b3bc5a02651
                                                      • Instruction ID: bf7c59b1931484d0ce6533eef08b60179bda2e1d0d3beb64579ce846fd28b8a1
                                                      • Opcode Fuzzy Hash: 380dfeb00884f15c0eefd92785894764198e03b47ab7a9698f0a8b3bc5a02651
                                                      • Instruction Fuzzy Hash: 41C1AD31608201AFD714DF14C494F2ABBE5FF84318F18859CF59A9B2A2CB75EC46EB91
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 00F025D8
                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00F025E8
                                                      • CreateCompatibleDC.GDI32(?), ref: 00F025F4
                                                      • SelectObject.GDI32(00000000,?), ref: 00F02601
                                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00F0266D
                                                      • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00F026AC
                                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00F026D0
                                                      • SelectObject.GDI32(?,?), ref: 00F026D8
                                                      • DeleteObject.GDI32(?), ref: 00F026E1
                                                      • DeleteDC.GDI32(?), ref: 00F026E8
                                                      • ReleaseDC.USER32(00000000,?), ref: 00F026F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                      • String ID: (
                                                      • API String ID: 2598888154-3887548279
                                                      • Opcode ID: 3381684c9bde3116be3e2d6f1f3b1c02b252aa043f674ebf946f874dee52e33c
                                                      • Instruction ID: e75d547ca76ecbb5ab1cc844e2a3ef0161dcc3ea0be15a3cceb5056602503c70
                                                      • Opcode Fuzzy Hash: 3381684c9bde3116be3e2d6f1f3b1c02b252aa043f674ebf946f874dee52e33c
                                                      • Instruction Fuzzy Hash: FE61D275D00219EFCF04CFA4DC84AAEBBB5FF48310F248529E959A7250D775A941EFA0
                                                      APIs
                                                      • ___free_lconv_mon.LIBCMT ref: 00EBDAA1
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD659
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD66B
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD67D
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD68F
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD6A1
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD6B3
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD6C5
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD6D7
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD6E9
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD6FB
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD70D
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD71F
                                                        • Part of subcall function 00EBD63C: _free.LIBCMT ref: 00EBD731
                                                      • _free.LIBCMT ref: 00EBDA96
                                                        • Part of subcall function 00EB29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000), ref: 00EB29DE
                                                        • Part of subcall function 00EB29C8: GetLastError.KERNEL32(00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000,00000000), ref: 00EB29F0
                                                      • _free.LIBCMT ref: 00EBDAB8
                                                      • _free.LIBCMT ref: 00EBDACD
                                                      • _free.LIBCMT ref: 00EBDAD8
                                                      • _free.LIBCMT ref: 00EBDAFA
                                                      • _free.LIBCMT ref: 00EBDB0D
                                                      • _free.LIBCMT ref: 00EBDB1B
                                                      • _free.LIBCMT ref: 00EBDB26
                                                      • _free.LIBCMT ref: 00EBDB5E
                                                      • _free.LIBCMT ref: 00EBDB65
                                                      • _free.LIBCMT ref: 00EBDB82
                                                      • _free.LIBCMT ref: 00EBDB9A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                      • String ID:
                                                      • API String ID: 161543041-0
                                                      • Opcode ID: a1ae2dd21dbbea5f58c9de608ef49d8bbfd0451138eb8444615682589a741f73
                                                      • Instruction ID: cb69b2dff3487c4c8bb0b8f9fdab21ffc1bf143fee6eb52e029d5616423c5323
                                                      • Opcode Fuzzy Hash: a1ae2dd21dbbea5f58c9de608ef49d8bbfd0451138eb8444615682589a741f73
                                                      • Instruction Fuzzy Hash: A3316D31608704AFEB22AA38EC85BD7B7E8FF40314F156819E548F7191EF31AC408720
                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00EE369C
                                                      • _wcslen.LIBCMT ref: 00EE36A7
                                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00EE3797
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00EE380C
                                                      • GetDlgCtrlID.USER32(?), ref: 00EE385D
                                                      • GetWindowRect.USER32(?,?), ref: 00EE3882
                                                      • GetParent.USER32(?), ref: 00EE38A0
                                                      • ScreenToClient.USER32(00000000), ref: 00EE38A7
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00EE3921
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00EE395D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                      • String ID: %s%u
                                                      • API String ID: 4010501982-679674701
                                                      • Opcode ID: 1124c6e0e070bf42526acf04fbb3c01b12fd157a582279497c29bb0474498b81
                                                      • Instruction ID: 589c05424b8c5bddd15046319e1e904b205b1b2150225e07af058e09cc2a6f54
                                                      • Opcode Fuzzy Hash: 1124c6e0e070bf42526acf04fbb3c01b12fd157a582279497c29bb0474498b81
                                                      • Instruction Fuzzy Hash: 9B91D27120064AAFD708DF36C889BEAB7E8FF84314F009519F999E3191DB31EA45CB91
                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00EE4994
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00EE49DA
                                                      • _wcslen.LIBCMT ref: 00EE49EB
                                                      • CharUpperBuffW.USER32(?,00000000), ref: 00EE49F7
                                                      • _wcsstr.LIBVCRUNTIME ref: 00EE4A2C
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00EE4A64
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00EE4A9D
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00EE4AE6
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00EE4B20
                                                      • GetWindowRect.USER32(?,?), ref: 00EE4B8B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                      • String ID: ThumbnailClass
                                                      • API String ID: 1311036022-1241985126
                                                      • Opcode ID: ad005fb8d370309149c6a39ff88c2d2da16a06dbc29b37a5abda447dd0229bfd
                                                      • Instruction ID: 3dade7433127bb047e73be435848defe56e682f6496fb588042019fc0048216d
                                                      • Opcode Fuzzy Hash: ad005fb8d370309149c6a39ff88c2d2da16a06dbc29b37a5abda447dd0229bfd
                                                      • Instruction Fuzzy Hash: 6391A4B10042499FDB04DF16C985BAA77E8FF84318F049469FD89AA0D6EB34ED45CBA1
                                                      APIs
                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00F0CC64
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00F0CC8D
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00F0CD48
                                                        • Part of subcall function 00F0CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00F0CCAA
                                                        • Part of subcall function 00F0CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00F0CCBD
                                                        • Part of subcall function 00F0CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F0CCCF
                                                        • Part of subcall function 00F0CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00F0CD05
                                                        • Part of subcall function 00F0CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00F0CD28
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F0CCF3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                      • API String ID: 2734957052-4033151799
                                                      • Opcode ID: 43de736e869db5f6004937be9ec32e5b52aaee046e60cf14eb08faef8a683a21
                                                      • Instruction ID: 06d76154d3b4cf39562af43eff1b00df2cef3b748ba71819da497c0b52b6aa18
                                                      • Opcode Fuzzy Hash: 43de736e869db5f6004937be9ec32e5b52aaee046e60cf14eb08faef8a683a21
                                                      • Instruction Fuzzy Hash: 92317C71E4212CBBDB209B50DC88EFFBB7CEF05750F014265E915E2280DB349A45BAE0
                                                      APIs
                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00EF3D40
                                                      • _wcslen.LIBCMT ref: 00EF3D6D
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00EF3D9D
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00EF3DBE
                                                      • RemoveDirectoryW.KERNEL32(?), ref: 00EF3DCE
                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00EF3E55
                                                      • CloseHandle.KERNEL32(00000000), ref: 00EF3E60
                                                      • CloseHandle.KERNEL32(00000000), ref: 00EF3E6B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                      • String ID: :$\$\??\%s
                                                      • API String ID: 1149970189-3457252023
                                                      • Opcode ID: 75db0b16a6cea772dea37b4bc03cd5edf2ba2f97f155800f4fc858dfd55a4357
                                                      • Instruction ID: 7e780797bfc33b306351743cee9a7bb5ca6b4ada26d129f1b7f755bc89be4867
                                                      • Opcode Fuzzy Hash: 75db0b16a6cea772dea37b4bc03cd5edf2ba2f97f155800f4fc858dfd55a4357
                                                      • Instruction Fuzzy Hash: 6F31A17194025DABDB209FA0DC49FEF37BDEF89744F1050A9F605E6060EB7097448B64
                                                      APIs
                                                      • timeGetTime.WINMM ref: 00EEE6B4
                                                        • Part of subcall function 00E9E551: timeGetTime.WINMM(?,?,00EEE6D4), ref: 00E9E555
                                                      • Sleep.KERNEL32(0000000A), ref: 00EEE6E1
                                                      • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00EEE705
                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00EEE727
                                                      • SetActiveWindow.USER32 ref: 00EEE746
                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00EEE754
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00EEE773
                                                      • Sleep.KERNEL32(000000FA), ref: 00EEE77E
                                                      • IsWindow.USER32 ref: 00EEE78A
                                                      • EndDialog.USER32(00000000), ref: 00EEE79B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                      • String ID: BUTTON
                                                      • API String ID: 1194449130-3405671355
                                                      • Opcode ID: 966e3491e531ae3e60ff1fd084b7a58fa1e92402d537a0adc1942ea40e120e04
                                                      • Instruction ID: d34c1bc952492fd4ee07f9740ff74e540eecb4ffada131b67abff97863c017ea
                                                      • Opcode Fuzzy Hash: 966e3491e531ae3e60ff1fd084b7a58fa1e92402d537a0adc1942ea40e120e04
                                                      • Instruction Fuzzy Hash: E521A87024038DAFEB005F32EC89B653B69F75674EF116425F609A22B1DB71AC01BB55
                                                      APIs
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00EEEA5D
                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00EEEA73
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EEEA84
                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00EEEA96
                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00EEEAA7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: SendString$_wcslen
                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                      • API String ID: 2420728520-1007645807
                                                      • Opcode ID: c895cd1aa00567edda7358cc1e81a92c625fd4f61a9f8d20bb8b02e1a9df3186
                                                      • Instruction ID: 92c6a11c2e2bfcdb92517d1da7b31e42bea7feffc1f8561e2759f5342b1921c1
                                                      • Opcode Fuzzy Hash: c895cd1aa00567edda7358cc1e81a92c625fd4f61a9f8d20bb8b02e1a9df3186
                                                      • Instruction Fuzzy Hash: 41114271A5025979D720B762DC4ADFB7ABCEBD2B04F001429B819F21D1EAB04945C6B2
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000001), ref: 00EE5CE2
                                                      • GetWindowRect.USER32(00000000,?), ref: 00EE5CFB
                                                      • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00EE5D59
                                                      • GetDlgItem.USER32(?,00000002), ref: 00EE5D69
                                                      • GetWindowRect.USER32(00000000,?), ref: 00EE5D7B
                                                      • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00EE5DCF
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00EE5DDD
                                                      • GetWindowRect.USER32(00000000,?), ref: 00EE5DEF
                                                      • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00EE5E31
                                                      • GetDlgItem.USER32(?,000003EA), ref: 00EE5E44
                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00EE5E5A
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00EE5E67
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                      • String ID:
                                                      • API String ID: 3096461208-0
                                                      • Opcode ID: 7eecec60a8ec50532260493010543a69d6440be9e8f8669e51890c06ed56355c
                                                      • Instruction ID: 9c4fca5011ebf02ebf04154111ad8ed9525578d1d76685b4adaba6186c5d0c1e
                                                      • Opcode Fuzzy Hash: 7eecec60a8ec50532260493010543a69d6440be9e8f8669e51890c06ed56355c
                                                      • Instruction Fuzzy Hash: 37512F71B40609AFDF18CF69DD89AAEBBB5FB48314F158129F519E7290D7709E00CB90
                                                      APIs
                                                        • Part of subcall function 00E98F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E98BE8,?,00000000,?,?,?,?,00E98BBA,00000000,?), ref: 00E98FC5
                                                      • DestroyWindow.USER32(?), ref: 00E98C81
                                                      • KillTimer.USER32(00000000,?,?,?,?,00E98BBA,00000000,?), ref: 00E98D1B
                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 00ED6973
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00E98BBA,00000000,?), ref: 00ED69A1
                                                      • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00E98BBA,00000000,?), ref: 00ED69B8
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00E98BBA,00000000), ref: 00ED69D4
                                                      • DeleteObject.GDI32(00000000), ref: 00ED69E6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                      • String ID:
                                                      • API String ID: 641708696-0
                                                      • Opcode ID: 232ab1cf66081559ce5e938f9a32d43651ee7c92b58770aaf0fa43301e253b18
                                                      • Instruction ID: 5409aa8d43f43e10cab98db0a91874c280b7eac288908625c354fbd53927932a
                                                      • Opcode Fuzzy Hash: 232ab1cf66081559ce5e938f9a32d43651ee7c92b58770aaf0fa43301e253b18
                                                      • Instruction Fuzzy Hash: 7C619C30502708DFDF259F14CA58B69B7F1FB4131AF14A51AE182AB6B0CB71BD81EB91
                                                      APIs
                                                        • Part of subcall function 00E99944: GetWindowLongW.USER32(?,000000EB), ref: 00E99952
                                                      • GetSysColor.USER32(0000000F), ref: 00E99862
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ColorLongWindow
                                                      • String ID:
                                                      • API String ID: 259745315-0
                                                      • Opcode ID: a84659da984bf2fbdbb0ae607840d1af85f9a0b2a289bac8c537803fe85d8f61
                                                      • Instruction ID: dd223bab938b471153a013caa64386ebd4f2f369545820670178058f462b9a7b
                                                      • Opcode Fuzzy Hash: a84659da984bf2fbdbb0ae607840d1af85f9a0b2a289bac8c537803fe85d8f61
                                                      • Instruction Fuzzy Hash: EE41BF31140604AFDF345B3C9C84BB93BA5EB06324F15560EE9A2A72E2E7319C42EB51
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00ECF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00EE9717
                                                      • LoadStringW.USER32(00000000,?,00ECF7F8,00000001), ref: 00EE9720
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00ECF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00EE9742
                                                      • LoadStringW.USER32(00000000,?,00ECF7F8,00000001), ref: 00EE9745
                                                      • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00EE9866
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message_wcslen
                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                      • API String ID: 747408836-2268648507
                                                      • Opcode ID: db13ad3fe9c083fc3e38e665c6ed990037969d4dfbd4decc362293df9b440157
                                                      • Instruction ID: 7b1c9a7588c3f81e56ee3cd16a294936fddc735fa90882f37f72ae0d21be44d9
                                                      • Opcode Fuzzy Hash: db13ad3fe9c083fc3e38e665c6ed990037969d4dfbd4decc362293df9b440157
                                                      • Instruction Fuzzy Hash: 57414D7290024DAACF04FBE0DD46DEEB7B8AF55740F141065F609B2092EB356F49DBA1
                                                      APIs
                                                        • Part of subcall function 00E86B57: _wcslen.LIBCMT ref: 00E86B6A
                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00EE07A2
                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00EE07BE
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00EE07DA
                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00EE0804
                                                      • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00EE082C
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00EE0837
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00EE083C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                      • API String ID: 323675364-22481851
                                                      • Opcode ID: 4b7e810881e57e67eb948dff8834a401999626fc00fa4c4d070ce9cd0f52e4e6
                                                      • Instruction ID: c3007cd0acde4d131b158d4b13c581614fe5022d8c8fdb4401f8fe3fe51bd3fa
                                                      • Opcode Fuzzy Hash: 4b7e810881e57e67eb948dff8834a401999626fc00fa4c4d070ce9cd0f52e4e6
                                                      • Instruction Fuzzy Hash: C3412672C1022DABDF15FBA4DC858EDB7B8BF04754B05512AE909B3161EB749E44CBA0
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00F03C5C
                                                      • CoInitialize.OLE32(00000000), ref: 00F03C8A
                                                      • CoUninitialize.OLE32 ref: 00F03C94
                                                      • _wcslen.LIBCMT ref: 00F03D2D
                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00F03DB1
                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00F03ED5
                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00F03F0E
                                                      • CoGetObject.OLE32(?,00000000,00F1FB98,?), ref: 00F03F2D
                                                      • SetErrorMode.KERNEL32(00000000), ref: 00F03F40
                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00F03FC4
                                                      • VariantClear.OLEAUT32(?), ref: 00F03FD8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                      • String ID:
                                                      • API String ID: 429561992-0
                                                      • Opcode ID: 4ab59db31495bf070a6ea579ad0b260fa84a7f1770794d042a1bfcaa66ac53ad
                                                      • Instruction ID: 7eae4e635aceccf00a35f5ca5c495e2c11253a823f972fac83540498a9b84f30
                                                      • Opcode Fuzzy Hash: 4ab59db31495bf070a6ea579ad0b260fa84a7f1770794d042a1bfcaa66ac53ad
                                                      • Instruction Fuzzy Hash: 17C15671A083059FD700DF68C88492BBBE9FF89754F00491DF98A9B291D731EE05EB92
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00EF7AF3
                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00EF7B8F
                                                      • SHGetDesktopFolder.SHELL32(?), ref: 00EF7BA3
                                                      • CoCreateInstance.OLE32(00F1FD08,00000000,00000001,00F46E6C,?), ref: 00EF7BEF
                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00EF7C74
                                                      • CoTaskMemFree.OLE32(?,?), ref: 00EF7CCC
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00EF7D57
                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00EF7D7A
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00EF7D81
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00EF7DD6
                                                      • CoUninitialize.OLE32 ref: 00EF7DDC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                      • String ID:
                                                      • API String ID: 2762341140-0
                                                      • Opcode ID: 2e056e842ef689003a8a65fd2fe502da44009ec1f4eb011533a9f6017f9b603f
                                                      • Instruction ID: cf53b48ae2c8a952e13f1d3a9d6b50f3f61a20b34fc156f1d284b09cc1474ca8
                                                      • Opcode Fuzzy Hash: 2e056e842ef689003a8a65fd2fe502da44009ec1f4eb011533a9f6017f9b603f
                                                      • Instruction Fuzzy Hash: BFC14B75A04109AFCB14DFA4C884DAEBBF9FF49304B149498E95AEB361D731EE41CB90
                                                      APIs
                                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00F15504
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F15515
                                                      • CharNextW.USER32(00000158), ref: 00F15544
                                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00F15585
                                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00F1559B
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F155AC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CharNext
                                                      • String ID:
                                                      • API String ID: 1350042424-0
                                                      • Opcode ID: c5909dc50ebe54e16d5e7a9561d03b5fcf3f124aa54dc7cdf95cbe2c6e76b940
                                                      • Instruction ID: e2fac1761c1310ecb3c5ae657368f4abe8844929ff0da7e27fa133d0a1f73c87
                                                      • Opcode Fuzzy Hash: c5909dc50ebe54e16d5e7a9561d03b5fcf3f124aa54dc7cdf95cbe2c6e76b940
                                                      • Instruction Fuzzy Hash: 7461B031900608EFDF10DF50CC94AFE3BB9EB89B35F108145F925AA290D7748AC0EBA1
                                                      APIs
                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00EDFAAF
                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 00EDFB08
                                                      • VariantInit.OLEAUT32(?), ref: 00EDFB1A
                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00EDFB3A
                                                      • VariantCopy.OLEAUT32(?,?), ref: 00EDFB8D
                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00EDFBA1
                                                      • VariantClear.OLEAUT32(?), ref: 00EDFBB6
                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 00EDFBC3
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00EDFBCC
                                                      • VariantClear.OLEAUT32(?), ref: 00EDFBDE
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00EDFBE9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                      • String ID:
                                                      • API String ID: 2706829360-0
                                                      • Opcode ID: 12cde59f1beb919855eab79c7148980a700b2c9c06b5fbbb3fb117ce3d13f423
                                                      • Instruction ID: 3e00e63a7b968abbd52a3baef460e10655d0e59689d94bd7afd87a38396396e3
                                                      • Opcode Fuzzy Hash: 12cde59f1beb919855eab79c7148980a700b2c9c06b5fbbb3fb117ce3d13f423
                                                      • Instruction Fuzzy Hash: 05416235A04219DFDF04DFA4D8549EDBBB9FF08344F01906AE946A7361C730A946CFA0
                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 00EE9CA1
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00EE9D22
                                                      • GetKeyState.USER32(000000A0), ref: 00EE9D3D
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00EE9D57
                                                      • GetKeyState.USER32(000000A1), ref: 00EE9D6C
                                                      • GetAsyncKeyState.USER32(00000011), ref: 00EE9D84
                                                      • GetKeyState.USER32(00000011), ref: 00EE9D96
                                                      • GetAsyncKeyState.USER32(00000012), ref: 00EE9DAE
                                                      • GetKeyState.USER32(00000012), ref: 00EE9DC0
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00EE9DD8
                                                      • GetKeyState.USER32(0000005B), ref: 00EE9DEA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: 0e35682423230cde1dcdc0ecb7a016b045888ad6c2fc641ed00efe196ee492f1
                                                      • Instruction ID: 9fd22c762e4ac96c35ad72fda0a98476f9f0793b0f9c97de6bd2eebe9baf0785
                                                      • Opcode Fuzzy Hash: 0e35682423230cde1dcdc0ecb7a016b045888ad6c2fc641ed00efe196ee492f1
                                                      • Instruction Fuzzy Hash: 8441D5345047DD69FF34966288043F5FEE16B1134CF08A05ADAC66A5C3DBA599C8C7A2
                                                      APIs
                                                      • WSAStartup.WSOCK32(00000101,?), ref: 00F005BC
                                                      • inet_addr.WSOCK32(?), ref: 00F0061C
                                                      • gethostbyname.WSOCK32(?), ref: 00F00628
                                                      • IcmpCreateFile.IPHLPAPI ref: 00F00636
                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00F006C6
                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00F006E5
                                                      • IcmpCloseHandle.IPHLPAPI(?), ref: 00F007B9
                                                      • WSACleanup.WSOCK32 ref: 00F007BF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                      • String ID: Ping
                                                      • API String ID: 1028309954-2246546115
                                                      • Opcode ID: 6d38c72487f4d86de96c4e332ee4f66d177f5247708cbe317f477fe98928431a
                                                      • Instruction ID: 2573323ff0aea23ea7dda9fd25c8bd0c778506c45438566d58eadee70c64d0fb
                                                      • Opcode Fuzzy Hash: 6d38c72487f4d86de96c4e332ee4f66d177f5247708cbe317f477fe98928431a
                                                      • Instruction Fuzzy Hash: 2591C235A042019FD720DF15C888F1ABBE1AF45328F1885A9F4699B7A2CB34FD41EF91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharLower
                                                      • String ID: cdecl$none$stdcall$winapi
                                                      • API String ID: 707087890-567219261
                                                      • Opcode ID: 7ceeb6d2af318a14dec9455a686e84b389924a8e69cef1bfc08faeeaa2942ecd
                                                      • Instruction ID: 107aae7f8fa5fbd68ae5101ea62fa8837304074c3bd088f94ea78775c836321a
                                                      • Opcode Fuzzy Hash: 7ceeb6d2af318a14dec9455a686e84b389924a8e69cef1bfc08faeeaa2942ecd
                                                      • Instruction Fuzzy Hash: 7E51B431E005169BCF14DFA8C9405BEB7E5BF65360B254229E89AE72C5DB30DD41F790
                                                      APIs
                                                      • CoInitialize.OLE32 ref: 00F03774
                                                      • CoUninitialize.OLE32 ref: 00F0377F
                                                      • CoCreateInstance.OLE32(?,00000000,00000017,00F1FB78,?), ref: 00F037D9
                                                      • IIDFromString.OLE32(?,?), ref: 00F0384C
                                                      • VariantInit.OLEAUT32(?), ref: 00F038E4
                                                      • VariantClear.OLEAUT32(?), ref: 00F03936
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                      • API String ID: 636576611-1287834457
                                                      • Opcode ID: 5bb5b9053332fca6105eb1e7f1d8f30a79252e9fa771cdb6ef1f0a628d46e491
                                                      • Instruction ID: 7d203c5de864816c6e44be6af9aa5942b03d0c82120d932edf3a24c5682d5ca7
                                                      • Opcode Fuzzy Hash: 5bb5b9053332fca6105eb1e7f1d8f30a79252e9fa771cdb6ef1f0a628d46e491
                                                      • Instruction Fuzzy Hash: 2961B072608301AFD310DF54C888F6ABBE8EF49710F104949F985AB2D1D770EE48EB92
                                                      APIs
                                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00EF33CF
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                      • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00EF33F0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: LoadString$_wcslen
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 4099089115-3080491070
                                                      • Opcode ID: f13fd167f2100125de1002dd983a38ae05e724a98013563e918a13f8a132981b
                                                      • Instruction ID: 63b0b3272715781a9ce94cb76562ec3b760c3a0a8cbb3b06da11ca9889dd3198
                                                      • Opcode Fuzzy Hash: f13fd167f2100125de1002dd983a38ae05e724a98013563e918a13f8a132981b
                                                      • Instruction Fuzzy Hash: 94518B71D0020AAADF15FBE0CD46EFEB7B9AF04740F245065F509B20A2EB256F58DB61
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharUpper
                                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                      • API String ID: 1256254125-769500911
                                                      • Opcode ID: 8573a5a7784b8ce8623229028a058be500775f7dc501e6f8977bad311435f5a1
                                                      • Instruction ID: 99345bd97da0aefa4990c35bf4debc256be792597ec25f336d78acae5aacfce7
                                                      • Opcode Fuzzy Hash: 8573a5a7784b8ce8623229028a058be500775f7dc501e6f8977bad311435f5a1
                                                      • Instruction Fuzzy Hash: A541DD72A0016B9BCB105F7EC8905BF77A5AFA1758B245129E465FB284F731CD81C790
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00EF53A0
                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00EF5416
                                                      • GetLastError.KERNEL32 ref: 00EF5420
                                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 00EF54A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Error$Mode$DiskFreeLastSpace
                                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                      • API String ID: 4194297153-14809454
                                                      • Opcode ID: 1a1cd8e8cc5153ae0771db3c435a1343d970b37a15562b05cc9bc269487b4667
                                                      • Instruction ID: 528f3120e2bc03c9d63fd1032e6618f4845f537237692c0319628406aff92c51
                                                      • Opcode Fuzzy Hash: 1a1cd8e8cc5153ae0771db3c435a1343d970b37a15562b05cc9bc269487b4667
                                                      • Instruction Fuzzy Hash: 7A31B536A005099FD710DF68C484AF9BBF4EF15309F149056EA16EB292D731DD82CBA1
                                                      APIs
                                                      • CreateMenu.USER32 ref: 00F13C79
                                                      • SetMenu.USER32(?,00000000), ref: 00F13C88
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F13D10
                                                      • IsMenu.USER32(?), ref: 00F13D24
                                                      • CreatePopupMenu.USER32 ref: 00F13D2E
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F13D5B
                                                      • DrawMenuBar.USER32 ref: 00F13D63
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                      • String ID: 0$F
                                                      • API String ID: 161812096-3044882817
                                                      • Opcode ID: b4e59989165d235e7924d278d92ce76895049f1d274e4d9c57a1cb6dc43f2ebf
                                                      • Instruction ID: fece29bd83db75fd547cd6937fe988f18ec02388940fff7a455bd2af40c69e42
                                                      • Opcode Fuzzy Hash: b4e59989165d235e7924d278d92ce76895049f1d274e4d9c57a1cb6dc43f2ebf
                                                      • Instruction Fuzzy Hash: 4E416879A01209AFDB14CF64E844BEA7BB6FF49354F144029EA46A7360D770AA10EB94
                                                      APIs
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                        • Part of subcall function 00EE3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EE3CCA
                                                      • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00EE1F64
                                                      • GetDlgCtrlID.USER32 ref: 00EE1F6F
                                                      • GetParent.USER32 ref: 00EE1F8B
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00EE1F8E
                                                      • GetDlgCtrlID.USER32(?), ref: 00EE1F97
                                                      • GetParent.USER32(?), ref: 00EE1FAB
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00EE1FAE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 711023334-1403004172
                                                      • Opcode ID: 259dcf9061880ba999de24ddf98f93a03d49a309e5ddc12a5f035925436cc2f5
                                                      • Instruction ID: cab6c30531c2c06c10f34076bce74ed099ff7b39cd04ec5895ac90557026f544
                                                      • Opcode Fuzzy Hash: 259dcf9061880ba999de24ddf98f93a03d49a309e5ddc12a5f035925436cc2f5
                                                      • Instruction Fuzzy Hash: F421B070E40218BFCF04AFA1CC95DFEBBB8EF05310B105155B96977292DB399948DBA0
                                                      APIs
                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00F13A9D
                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00F13AA0
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F13AC7
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F13AEA
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00F13B62
                                                      • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00F13BAC
                                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00F13BC7
                                                      • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00F13BE2
                                                      • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00F13BF6
                                                      • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00F13C13
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$LongWindow
                                                      • String ID:
                                                      • API String ID: 312131281-0
                                                      • Opcode ID: baa22df319c1f90c4990387de54f48da4bf38a5d78aaa5aca51ec9b3a1142ef2
                                                      • Instruction ID: e3cb1e1e3af52112ce7ba6faf92b7b3517e977a45dc8edfe505301ae04393729
                                                      • Opcode Fuzzy Hash: baa22df319c1f90c4990387de54f48da4bf38a5d78aaa5aca51ec9b3a1142ef2
                                                      • Instruction Fuzzy Hash: DD618A75A00248AFDB10DFA8CC81FEE77F8EB49710F104099FA15A72A1D774AE85EB50
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00EEB151
                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00EEA1E1,?,00000001), ref: 00EEB165
                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 00EEB16C
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00EEA1E1,?,00000001), ref: 00EEB17B
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00EEB18D
                                                      • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00EEA1E1,?,00000001), ref: 00EEB1A6
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00EEA1E1,?,00000001), ref: 00EEB1B8
                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00EEA1E1,?,00000001), ref: 00EEB1FD
                                                      • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00EEA1E1,?,00000001), ref: 00EEB212
                                                      • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00EEA1E1,?,00000001), ref: 00EEB21D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                      • String ID:
                                                      • API String ID: 2156557900-0
                                                      • Opcode ID: b59627b86fbeb130438dc50cdcc036069ecd9455dd12103c3384e4e8d55ed61a
                                                      • Instruction ID: 035401eb02a3f13a2a866d634ae53d1dffa574d72c4bb934fd25e062a4c4cef0
                                                      • Opcode Fuzzy Hash: b59627b86fbeb130438dc50cdcc036069ecd9455dd12103c3384e4e8d55ed61a
                                                      • Instruction Fuzzy Hash: 8B31CE7554034CBFDB109F2ADC48BAF7BA9BF5435AF119004FB04E61A0D7B49A009FA4
                                                      APIs
                                                      • _free.LIBCMT ref: 00EB2C94
                                                        • Part of subcall function 00EB29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000), ref: 00EB29DE
                                                        • Part of subcall function 00EB29C8: GetLastError.KERNEL32(00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000,00000000), ref: 00EB29F0
                                                      • _free.LIBCMT ref: 00EB2CA0
                                                      • _free.LIBCMT ref: 00EB2CAB
                                                      • _free.LIBCMT ref: 00EB2CB6
                                                      • _free.LIBCMT ref: 00EB2CC1
                                                      • _free.LIBCMT ref: 00EB2CCC
                                                      • _free.LIBCMT ref: 00EB2CD7
                                                      • _free.LIBCMT ref: 00EB2CE2
                                                      • _free.LIBCMT ref: 00EB2CED
                                                      • _free.LIBCMT ref: 00EB2CFB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 4c54fc4edcba8cb4772cf4d1b30d7c1597c016e17b6a5fd96ffe82b33365f5c1
                                                      • Instruction ID: 7b743ac391e0ff3df73cc629b8362886047f8e18ffe957e77af4b7d337f37b29
                                                      • Opcode Fuzzy Hash: 4c54fc4edcba8cb4772cf4d1b30d7c1597c016e17b6a5fd96ffe82b33365f5c1
                                                      • Instruction Fuzzy Hash: DF117476500108BFCB02EF54D982CDE3BA5FF49350F5159A9FA48AF222DA31EE509B90
                                                      APIs
                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00E81459
                                                      • OleUninitialize.OLE32(?,00000000), ref: 00E814F8
                                                      • UnregisterHotKey.USER32(?), ref: 00E816DD
                                                      • DestroyWindow.USER32(?), ref: 00EC24B9
                                                      • FreeLibrary.KERNEL32(?), ref: 00EC251E
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00EC254B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                      • String ID: close all
                                                      • API String ID: 469580280-3243417748
                                                      • Opcode ID: fad322aaa70f357a37d908fe7a6e0d884fe4f26fe4d0ac6b3d60ab2135e61a11
                                                      • Instruction ID: c6ea14f8e73b686974b7ba6c90739461d3f0119a873c9ac717e76ded717f6c79
                                                      • Opcode Fuzzy Hash: fad322aaa70f357a37d908fe7a6e0d884fe4f26fe4d0ac6b3d60ab2135e61a11
                                                      • Instruction Fuzzy Hash: 1ED145316012128FCB19EF14C995B69F7A4BF05714F2462ADE54EBB262DB32AC13CF91
                                                      APIs
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00EF7FAD
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00EF7FC1
                                                      • GetFileAttributesW.KERNEL32(?), ref: 00EF7FEB
                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00EF8005
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00EF8017
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00EF8060
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00EF80B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory$AttributesFile
                                                      • String ID: *.*
                                                      • API String ID: 769691225-438819550
                                                      • Opcode ID: c0c79db50b4e7df3d9fce1e830d132909dab58e323782650491e805d5dac14ae
                                                      • Instruction ID: 6e3f59ee597647687d66d5263f1fb61c20985313a578e2557dbafffbe00e9783
                                                      • Opcode Fuzzy Hash: c0c79db50b4e7df3d9fce1e830d132909dab58e323782650491e805d5dac14ae
                                                      • Instruction Fuzzy Hash: 1881D1725082099BDB20EF14C8449BEB3E8BF89318F54685EFAC9E7250EB34DD45CB52
                                                      APIs
                                                      • SetWindowLongW.USER32(?,000000EB), ref: 00E85C7A
                                                        • Part of subcall function 00E85D0A: GetClientRect.USER32(?,?), ref: 00E85D30
                                                        • Part of subcall function 00E85D0A: GetWindowRect.USER32(?,?), ref: 00E85D71
                                                        • Part of subcall function 00E85D0A: ScreenToClient.USER32(?,?), ref: 00E85D99
                                                      • GetDC.USER32 ref: 00EC46F5
                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00EC4708
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00EC4716
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00EC472B
                                                      • ReleaseDC.USER32(?,00000000), ref: 00EC4733
                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00EC47C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                      • String ID: U
                                                      • API String ID: 4009187628-3372436214
                                                      • Opcode ID: d372e91147aa827a3d26ff736b77624caf52f6b56ea4de42427d313b42ca6519
                                                      • Instruction ID: 6323038511778019afdc18bc709b034b2193a13e8a777e0f821854a8d3adc6b8
                                                      • Opcode Fuzzy Hash: d372e91147aa827a3d26ff736b77624caf52f6b56ea4de42427d313b42ca6519
                                                      • Instruction Fuzzy Hash: 8571D171400209DFCF219F64CA94FEA7BB1FF46318F14626AED596A1A6C7329842DF50
                                                      APIs
                                                      • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00EF35E4
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                      • LoadStringW.USER32(00F52390,?,00000FFF,?), ref: 00EF360A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: LoadString$_wcslen
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 4099089115-2391861430
                                                      • Opcode ID: f03f6e1e2f9fe88d97ac8c4dab56fbc084bf814bff7eda87e68b55977f305537
                                                      • Instruction ID: 8778be548c4df85369126ad3a3507e2d691e1ba7599fc7bc9916ab5859d58c7b
                                                      • Opcode Fuzzy Hash: f03f6e1e2f9fe88d97ac8c4dab56fbc084bf814bff7eda87e68b55977f305537
                                                      • Instruction Fuzzy Hash: 29513E71D00209AADF15FBA0DC42EFEBBB4AF04704F146125F609721A2EB356B95DBA1
                                                      APIs
                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00EFC272
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00EFC29A
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00EFC2CA
                                                      • GetLastError.KERNEL32 ref: 00EFC322
                                                      • SetEvent.KERNEL32(?), ref: 00EFC336
                                                      • InternetCloseHandle.WININET(00000000), ref: 00EFC341
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                      • String ID:
                                                      • API String ID: 3113390036-3916222277
                                                      • Opcode ID: 1720e8646db7cec01d57e3026813fe9de653f7e47d3d5782273ae1463c5adb97
                                                      • Instruction ID: ffab49baf1452239b0a7e997a4b815bad17bccc6f7734371200d19dadcc61cb4
                                                      • Opcode Fuzzy Hash: 1720e8646db7cec01d57e3026813fe9de653f7e47d3d5782273ae1463c5adb97
                                                      • Instruction Fuzzy Hash: F731BFB160160CAFD7219F648E88ABB7BFCEB49784F34951EF546A2200DB30DD059BA0
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00EC3AAF,?,?,Bad directive syntax error,00F1CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00EE98BC
                                                      • LoadStringW.USER32(00000000,?,00EC3AAF,?), ref: 00EE98C3
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00EE9987
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadMessageModuleString_wcslen
                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                      • API String ID: 858772685-4153970271
                                                      • Opcode ID: 7cc2414a4eb9c6a1c90ee23febdd53b243fa8699e28c0cdec3819029d49a8c89
                                                      • Instruction ID: 41fe636feabd483e7bafa58975cd4318019ef0a83132b60222db573fa76f8129
                                                      • Opcode Fuzzy Hash: 7cc2414a4eb9c6a1c90ee23febdd53b243fa8699e28c0cdec3819029d49a8c89
                                                      • Instruction Fuzzy Hash: F7218D31D4025EABCF15AF90CC06EEE77B5BF18700F045429F519720A2EB369618DB51
                                                      APIs
                                                      • GetParent.USER32 ref: 00EE20AB
                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00EE20C0
                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00EE214D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameParentSend
                                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                      • API String ID: 1290815626-3381328864
                                                      • Opcode ID: 7d41eb4e0951cf257257ea408ae03ae699dc3997d9c86b99f0b083518da8fd56
                                                      • Instruction ID: f02af724245bcec6b153a52a70656a350479fc706a0b2e4aafdbfe27a5631f79
                                                      • Opcode Fuzzy Hash: 7d41eb4e0951cf257257ea408ae03ae699dc3997d9c86b99f0b083518da8fd56
                                                      • Instruction Fuzzy Hash: 07112C766C470EBAF6013A21DC07DE637DCCB49728B20201AFB04B90E2FEB1A9016555
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                      • String ID:
                                                      • API String ID: 1282221369-0
                                                      • Opcode ID: 2799a6caf621f487253fa6f534aeb2c3d6e77523f68a6867a48672334d73d09e
                                                      • Instruction ID: b8cf40785291db921f68d670909bfa01431b08195e19451824f014210d9c9d8e
                                                      • Opcode Fuzzy Hash: 2799a6caf621f487253fa6f534aeb2c3d6e77523f68a6867a48672334d73d09e
                                                      • Instruction Fuzzy Hash: 32616A71A08304AFDF21AFB49C81AFB7BE6EF05324F2451ADFA44B7281EA319D019750
                                                      APIs
                                                      • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00F15186
                                                      • ShowWindow.USER32(?,00000000), ref: 00F151C7
                                                      • ShowWindow.USER32(?,00000005,?,00000000), ref: 00F151CD
                                                      • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00F151D1
                                                        • Part of subcall function 00F16FBA: DeleteObject.GDI32(00000000), ref: 00F16FE6
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F1520D
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F1521A
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00F1524D
                                                      • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00F15287
                                                      • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00F15296
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                      • String ID:
                                                      • API String ID: 3210457359-0
                                                      • Opcode ID: f4a772f61799041f3c32e32db4943f22a4b6e15961aa1ed64dfbbbe9050e6a59
                                                      • Instruction ID: adf3a7565b2fc687ef2ec97972573e9fcb459b1cc04b82a1d3f704f20fba006c
                                                      • Opcode Fuzzy Hash: f4a772f61799041f3c32e32db4943f22a4b6e15961aa1ed64dfbbbe9050e6a59
                                                      • Instruction Fuzzy Hash: F651B432A50A08FEEF219F64CC45BD83B65FB85B21F148115F615A62E1C7B5A9C0FF40
                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00ED6890
                                                      • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00ED68A9
                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00ED68B9
                                                      • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00ED68D1
                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00ED68F2
                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00E98874,00000000,00000000,00000000,000000FF,00000000), ref: 00ED6901
                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00ED691E
                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00E98874,00000000,00000000,00000000,000000FF,00000000), ref: 00ED692D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                      • String ID:
                                                      • API String ID: 1268354404-0
                                                      • Opcode ID: 576073ead9d9e0077996a81a38ba2d5f8adc90f6bdfa192c5843974a5a461b60
                                                      • Instruction ID: 8ef36cdf8359450b57c0b1035ae01c8c4c72220a47012f24130e8068a5178c40
                                                      • Opcode Fuzzy Hash: 576073ead9d9e0077996a81a38ba2d5f8adc90f6bdfa192c5843974a5a461b60
                                                      • Instruction Fuzzy Hash: 6B518874600209EFDF24CF24CC55FAA7BB6FB48354F145519FA46A72A0EB70E991EB80
                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00EFC182
                                                      • GetLastError.KERNEL32 ref: 00EFC195
                                                      • SetEvent.KERNEL32(?), ref: 00EFC1A9
                                                        • Part of subcall function 00EFC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00EFC272
                                                        • Part of subcall function 00EFC253: GetLastError.KERNEL32 ref: 00EFC322
                                                        • Part of subcall function 00EFC253: SetEvent.KERNEL32(?), ref: 00EFC336
                                                        • Part of subcall function 00EFC253: InternetCloseHandle.WININET(00000000), ref: 00EFC341
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                      • String ID:
                                                      • API String ID: 337547030-0
                                                      • Opcode ID: 6ed11a7df4445dc17aba44ed788a9bc6e0bd7df1bd9259e573df270c404825f8
                                                      • Instruction ID: 346529988c9bb43d1bab77124032545192a4308bb8e6284b77fc916638b0ea88
                                                      • Opcode Fuzzy Hash: 6ed11a7df4445dc17aba44ed788a9bc6e0bd7df1bd9259e573df270c404825f8
                                                      • Instruction Fuzzy Hash: EC31A471240A0DAFEB219FA5DE44AB67BF8FF14300B30941DF65692620D730D814EBA0
                                                      APIs
                                                        • Part of subcall function 00EE3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00EE3A57
                                                        • Part of subcall function 00EE3A3D: GetCurrentThreadId.KERNEL32 ref: 00EE3A5E
                                                        • Part of subcall function 00EE3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00EE25B3), ref: 00EE3A65
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00EE25BD
                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00EE25DB
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00EE25DF
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00EE25E9
                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00EE2601
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00EE2605
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00EE260F
                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00EE2623
                                                      • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00EE2627
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                      • String ID:
                                                      • API String ID: 2014098862-0
                                                      • Opcode ID: 1df4b23449a5435b97cd77bbc3926fbba47c668d66327ca46d9bd9da383662c9
                                                      • Instruction ID: 8f7823f2cb78a7ccd05330ed627fd1bead2726a88ffc0b2cba4abbc62f87fb7f
                                                      • Opcode Fuzzy Hash: 1df4b23449a5435b97cd77bbc3926fbba47c668d66327ca46d9bd9da383662c9
                                                      • Instruction Fuzzy Hash: 3101D8303D0358BBFB10676A9C8EF997F99DB4EB11F115015F318BF0D1C9E114449AA9
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00EE1449,?,?,00000000), ref: 00EE180C
                                                      • HeapAlloc.KERNEL32(00000000,?,00EE1449,?,?,00000000), ref: 00EE1813
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00EE1449,?,?,00000000), ref: 00EE1828
                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00EE1449,?,?,00000000), ref: 00EE1830
                                                      • DuplicateHandle.KERNEL32(00000000,?,00EE1449,?,?,00000000), ref: 00EE1833
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00EE1449,?,?,00000000), ref: 00EE1843
                                                      • GetCurrentProcess.KERNEL32(00EE1449,00000000,?,00EE1449,?,?,00000000), ref: 00EE184B
                                                      • DuplicateHandle.KERNEL32(00000000,?,00EE1449,?,?,00000000), ref: 00EE184E
                                                      • CreateThread.KERNEL32(00000000,00000000,00EE1874,00000000,00000000,00000000), ref: 00EE1868
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                      • String ID:
                                                      • API String ID: 1957940570-0
                                                      • Opcode ID: a441594fb693bb1822fa0304a2b71de4230bbb48a430473fd77dad3f14720ab3
                                                      • Instruction ID: 61f99da41efbe8c21e0c269615f441bc6ec60d61e58860279ddad4d27a494938
                                                      • Opcode Fuzzy Hash: a441594fb693bb1822fa0304a2b71de4230bbb48a430473fd77dad3f14720ab3
                                                      • Instruction Fuzzy Hash: 2701BFB52C0348BFE710AB65DC4DF977B6CEB89B11F018411FA05DB192C6709800DB60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: __alldvrm$_strrchr
                                                      • String ID: }}$}}$}}
                                                      • API String ID: 1036877536-1495402609
                                                      • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                      • Instruction ID: 1987bea809140b77a8af8bba7ad2daeddb054942d9ecac8270a97aaaa4422c74
                                                      • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                      • Instruction Fuzzy Hash: 9CA178B1E013869FDB22DF28C8927FFBBE5EF62354F1451ADE585AB282C2348941C751
                                                      APIs
                                                        • Part of subcall function 00EED4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00EED501
                                                        • Part of subcall function 00EED4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00EED50F
                                                        • Part of subcall function 00EED4DC: CloseHandle.KERNEL32(00000000), ref: 00EED5DC
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F0A16D
                                                      • GetLastError.KERNEL32 ref: 00F0A180
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F0A1B3
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00F0A268
                                                      • GetLastError.KERNEL32(00000000), ref: 00F0A273
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F0A2C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 2533919879-2896544425
                                                      • Opcode ID: c6e20db09ffdac2a94744d26cb778040c1b11cf8d408734e3e111a716d8dee3e
                                                      • Instruction ID: f0a2c34a8358fc09725b7cd38226c0a57e5be0109c5e32a1c150a79f3f6e4a21
                                                      • Opcode Fuzzy Hash: c6e20db09ffdac2a94744d26cb778040c1b11cf8d408734e3e111a716d8dee3e
                                                      • Instruction Fuzzy Hash: BF618C31604342AFD710DF14C494F16BBE1AF44318F19849CE46A9B7A3C772EC45EB92
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00F13925
                                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00F1393A
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00F13954
                                                      • _wcslen.LIBCMT ref: 00F13999
                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00F139C6
                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00F139F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window_wcslen
                                                      • String ID: SysListView32
                                                      • API String ID: 2147712094-78025650
                                                      • Opcode ID: 85cd1904b9d670f816cbecb280cbe4e9d01904c08cb7a363204c1e74594280c8
                                                      • Instruction ID: 4b750d961e90a8a32da2e6e602b9a850fc338d3c2f86f1ae8496a64c68f14694
                                                      • Opcode Fuzzy Hash: 85cd1904b9d670f816cbecb280cbe4e9d01904c08cb7a363204c1e74594280c8
                                                      • Instruction Fuzzy Hash: 1F41A171A00319ABEF219F64CC45BEA7BA9EF08360F100526F958E7281D775DE84EB90
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EEBCFD
                                                      • IsMenu.USER32(00000000), ref: 00EEBD1D
                                                      • CreatePopupMenu.USER32 ref: 00EEBD53
                                                      • GetMenuItemCount.USER32(017254B8), ref: 00EEBDA4
                                                      • InsertMenuItemW.USER32(017254B8,?,00000001,00000030), ref: 00EEBDCC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                      • String ID: 0$2
                                                      • API String ID: 93392585-3793063076
                                                      • Opcode ID: f0940446be7a274e5f20087e148cded6f7a2a5937a59b0162de212df089fe4bd
                                                      • Instruction ID: 61099c117b045e326acf1ef04ac4f5793992d95323df9b801a4679b99b9dfc65
                                                      • Opcode Fuzzy Hash: f0940446be7a274e5f20087e148cded6f7a2a5937a59b0162de212df089fe4bd
                                                      • Instruction Fuzzy Hash: F7519C70A0028D9BDB20CFAADC84BEFBBF9AF45318F249219E411F7290D7709945CB61
                                                      APIs
                                                      • _ValidateLocalCookies.LIBCMT ref: 00EA2D4B
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00EA2D53
                                                      • _ValidateLocalCookies.LIBCMT ref: 00EA2DE1
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00EA2E0C
                                                      • _ValidateLocalCookies.LIBCMT ref: 00EA2E61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: &H$csm
                                                      • API String ID: 1170836740-1242228090
                                                      • Opcode ID: 4e92426f9133dd98c3c172d7416cf734bd2633f0c28e1b8c2b399365acd54df3
                                                      • Instruction ID: 3783d7bbf119b33640efb5c2dc6a0c57d5f91f150a6928422b00798670d85234
                                                      • Opcode Fuzzy Hash: 4e92426f9133dd98c3c172d7416cf734bd2633f0c28e1b8c2b399365acd54df3
                                                      • Instruction Fuzzy Hash: 4A41A334A00209ABCF14DF6CC845A9EBBE5BF4A328F149159E914BF292D735FA01CBD0
                                                      APIs
                                                      • LoadIconW.USER32(00000000,00007F03), ref: 00EEC913
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: IconLoad
                                                      • String ID: blank$info$question$stop$warning
                                                      • API String ID: 2457776203-404129466
                                                      • Opcode ID: 2971896de50016e6bb3096d4f1a5685042c11d22538e43e657ccd5aa3549d6c1
                                                      • Instruction ID: aa5c5e350c13978f140406cd5f96f9ce8fa6c4d6f79b2252cfc90c890b30a01d
                                                      • Opcode Fuzzy Hash: 2971896de50016e6bb3096d4f1a5685042c11d22538e43e657ccd5aa3549d6c1
                                                      • Instruction Fuzzy Hash: 38112E3168934EBAA70457559C82CDE77DCDF56318B30202AF904F61C3E7B5AD026269
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$LocalTime
                                                      • String ID:
                                                      • API String ID: 952045576-0
                                                      • Opcode ID: 787a468aa48f926ba3dbd7d5ba9a28be8fd5504726ebaea23747ab3a57836550
                                                      • Instruction ID: 192ba5e825bf757571434ecb7d559cfac7de911135092bee22a5e332b1cee4bd
                                                      • Opcode Fuzzy Hash: 787a468aa48f926ba3dbd7d5ba9a28be8fd5504726ebaea23747ab3a57836550
                                                      • Instruction Fuzzy Hash: 18419065C10258A5CB11EBF48C8AACFB7ECAF4A310F50A462E514F7271EB34E255C3A5
                                                      APIs
                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00ED682C,00000004,00000000,00000000), ref: 00E9F953
                                                      • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00ED682C,00000004,00000000,00000000), ref: 00EDF3D1
                                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00ED682C,00000004,00000000,00000000), ref: 00EDF454
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: b88c97ed442b00cc77192788af5725e1712c36711f4117e576a1c03321fdaf7a
                                                      • Instruction ID: f6255a1416fcff949fb158ac90b87d4c1bd8ab50f507c560afa32623499a5712
                                                      • Opcode Fuzzy Hash: b88c97ed442b00cc77192788af5725e1712c36711f4117e576a1c03321fdaf7a
                                                      • Instruction Fuzzy Hash: F2413F31604640BECF38CB68C8887AA7BD2ABD6318F15B43DE047F6661C671E481D750
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 00F12D1B
                                                      • GetDC.USER32(00000000), ref: 00F12D23
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F12D2E
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00F12D3A
                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00F12D76
                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00F12D87
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00F15A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00F12DC2
                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00F12DE1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                      • String ID:
                                                      • API String ID: 3864802216-0
                                                      • Opcode ID: 57764abb55cf117d0ec52411e8eb304d0eaf6cfd9096bf5988b703d9cf2a2312
                                                      • Instruction ID: e955908cbc2b11ed6b785e04a20754c98ecd721c84f014b285c8d152ecf152f9
                                                      • Opcode Fuzzy Hash: 57764abb55cf117d0ec52411e8eb304d0eaf6cfd9096bf5988b703d9cf2a2312
                                                      • Instruction Fuzzy Hash: D5319C72241214BFEB118F50DC8AFEB3BA9EF09721F058055FE08DA291C6759C50DBA4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID:
                                                      • API String ID: 2931989736-0
                                                      • Opcode ID: e96fa9b9c19d650e6b5a842cb56a57463cc433dbcc98d6c7105a719b0084802a
                                                      • Instruction ID: 078a83958ea5301dc4536aa2a731fbca18a96bbe54a3bdd576b13613f5b51460
                                                      • Opcode Fuzzy Hash: e96fa9b9c19d650e6b5a842cb56a57463cc433dbcc98d6c7105a719b0084802a
                                                      • Instruction Fuzzy Hash: 9721AA73640A4E77D6149A125D92FFB339CAF1538CF441021FD057E581F760EE1895E6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: NULL Pointer assignment$Not an Object type
                                                      • API String ID: 0-572801152
                                                      • Opcode ID: acac294f492d5ca31d954cad15ba8a469156b2b64d70aa0ed17c51c00f97b36e
                                                      • Instruction ID: 1a80b7d4adc93c944f8230fde1182b917f3fe5b1ced1ebffab3fe5a350706f2b
                                                      • Opcode Fuzzy Hash: acac294f492d5ca31d954cad15ba8a469156b2b64d70aa0ed17c51c00f97b36e
                                                      • Instruction Fuzzy Hash: 93D1B175E0060A9FDF10CFA8C881BAEB7B5BF48754F148069E915AB281E7B0DD45EF90
                                                      APIs
                                                      • GetCPInfo.KERNEL32(?,?), ref: 00EC15CE
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00EC1651
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00EC16E4
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00EC16FB
                                                        • Part of subcall function 00EB3820: RtlAllocateHeap.NTDLL(00000000,?,00F51444,?,00E9FDF5,?,?,00E8A976,00000010,00F51440,00E813FC,?,00E813C6,?,00E81129), ref: 00EB3852
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00EC1777
                                                      • __freea.LIBCMT ref: 00EC17A2
                                                      • __freea.LIBCMT ref: 00EC17AE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                      • String ID:
                                                      • API String ID: 2829977744-0
                                                      • Opcode ID: 52f680e5bc6655d95d1319c0a22895dbca54f85efa429b8e5822541ab32415cd
                                                      • Instruction ID: f33a92574accaf7bd319a735197e6642d8a7e903bd258da3e9e9f2840f60b5b3
                                                      • Opcode Fuzzy Hash: 52f680e5bc6655d95d1319c0a22895dbca54f85efa429b8e5822541ab32415cd
                                                      • Instruction Fuzzy Hash: A7919371E002169ADB208E64CA51FEE7BF5AF4B714F18659EE801F7182D736DC4287A0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit
                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                      • API String ID: 2610073882-625585964
                                                      • Opcode ID: 2aca79dd6f11aa5b522836c8fc0b9e2e7dcae68ca0ba9be6f6b49121eef4cfba
                                                      • Instruction ID: 81ef30a1325581e1ed3d18fce45788d66a363b48b6bf7982ffba2814e564fb6c
                                                      • Opcode Fuzzy Hash: 2aca79dd6f11aa5b522836c8fc0b9e2e7dcae68ca0ba9be6f6b49121eef4cfba
                                                      • Instruction Fuzzy Hash: E29174B1E00215ABDF20CF95CC44FAEBBB8EF45714F108559F605AB281D770A945EFA0
                                                      APIs
                                                      • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00EF125C
                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00EF1284
                                                      • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00EF12A8
                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00EF12D8
                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00EF135F
                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00EF13C4
                                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00EF1430
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                      • String ID:
                                                      • API String ID: 2550207440-0
                                                      • Opcode ID: 191e65ee9519cd9f5da0b2ed439019436b588a2fc0b81eacdfee9c2bb691be0a
                                                      • Instruction ID: 3d964d8fd176ce35efbc991c48e50dd2da6cd175567daaed1c71b6ed5a7983f2
                                                      • Opcode Fuzzy Hash: 191e65ee9519cd9f5da0b2ed439019436b588a2fc0b81eacdfee9c2bb691be0a
                                                      • Instruction Fuzzy Hash: 68919A71A0020DDFEB009F94C884BBEB7B5EF45324F11A0A9EA50FB2A1D774A941DB90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$BeginCreatePath
                                                      • String ID:
                                                      • API String ID: 3225163088-0
                                                      • Opcode ID: 6436f9be736c21388792100a1dfe505a875ff9c1585e6ef7b1f238f46a781187
                                                      • Instruction ID: 700f85501ed2a2394ceffa8591d6220cfa401da33f6307a84fe7f1f869de7404
                                                      • Opcode Fuzzy Hash: 6436f9be736c21388792100a1dfe505a875ff9c1585e6ef7b1f238f46a781187
                                                      • Instruction Fuzzy Hash: 54913671D40219EFCF10CFA9C884AEEBBB8FF49320F159059E515B7252D374A942DBA0
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00F0396B
                                                      • CharUpperBuffW.USER32(?,?), ref: 00F03A7A
                                                      • _wcslen.LIBCMT ref: 00F03A8A
                                                      • VariantClear.OLEAUT32(?), ref: 00F03C1F
                                                        • Part of subcall function 00EF0CDF: VariantInit.OLEAUT32(00000000), ref: 00EF0D1F
                                                        • Part of subcall function 00EF0CDF: VariantCopy.OLEAUT32(?,?), ref: 00EF0D28
                                                        • Part of subcall function 00EF0CDF: VariantClear.OLEAUT32(?), ref: 00EF0D34
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                      • API String ID: 4137639002-1221869570
                                                      • Opcode ID: 762b7942461c60177a60a594dce86270f969ec8c8e977fb880a87fca70b66bc1
                                                      • Instruction ID: 64e71a677c5c30e15c9fdf363c1c9686ae4c6e61a765e708da0b3ab2a879c700
                                                      • Opcode Fuzzy Hash: 762b7942461c60177a60a594dce86270f969ec8c8e977fb880a87fca70b66bc1
                                                      • Instruction Fuzzy Hash: B7917F75A083059FC704EF24C48096AB7E9FF89314F14892DF889A7391DB31EE45EB92
                                                      APIs
                                                        • Part of subcall function 00EE000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EDFF41,80070057,?,?,?,00EE035E), ref: 00EE002B
                                                        • Part of subcall function 00EE000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EDFF41,80070057,?,?), ref: 00EE0046
                                                        • Part of subcall function 00EE000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EDFF41,80070057,?,?), ref: 00EE0054
                                                        • Part of subcall function 00EE000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EDFF41,80070057,?), ref: 00EE0064
                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00F04C51
                                                      • _wcslen.LIBCMT ref: 00F04D59
                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00F04DCF
                                                      • CoTaskMemFree.OLE32(?), ref: 00F04DDA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                      • String ID: NULL Pointer assignment
                                                      • API String ID: 614568839-2785691316
                                                      • Opcode ID: 77bf604014a67e132c0e98aee73afd4bde33bbe4b29361d294f1badd8566245d
                                                      • Instruction ID: d1931ef86ff89a9605e22bc825066027405fa28806bdf90282cd3c9fe420bd13
                                                      • Opcode Fuzzy Hash: 77bf604014a67e132c0e98aee73afd4bde33bbe4b29361d294f1badd8566245d
                                                      • Instruction Fuzzy Hash: 23912BB1D0021D9FDF14EFA4D891AEDB7B8BF48310F108169E919B7291DB74AA44DF60
                                                      APIs
                                                      • GetMenu.USER32(?), ref: 00F12183
                                                      • GetMenuItemCount.USER32(00000000), ref: 00F121B5
                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00F121DD
                                                      • _wcslen.LIBCMT ref: 00F12213
                                                      • GetMenuItemID.USER32(?,?), ref: 00F1224D
                                                      • GetSubMenu.USER32(?,?), ref: 00F1225B
                                                        • Part of subcall function 00EE3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00EE3A57
                                                        • Part of subcall function 00EE3A3D: GetCurrentThreadId.KERNEL32 ref: 00EE3A5E
                                                        • Part of subcall function 00EE3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00EE25B3), ref: 00EE3A65
                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00F122E3
                                                        • Part of subcall function 00EEE97B: Sleep.KERNEL32 ref: 00EEE9F3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                      • String ID:
                                                      • API String ID: 4196846111-0
                                                      • Opcode ID: 5bde41090217093a794f398ddf372f5c39058b79685e212cb5aa16cff85f1304
                                                      • Instruction ID: 66368d474d5a0fc2b0d514c6178db050842f6b9e3d793fe36e8b62d8af76632c
                                                      • Opcode Fuzzy Hash: 5bde41090217093a794f398ddf372f5c39058b79685e212cb5aa16cff85f1304
                                                      • Instruction Fuzzy Hash: DD717D75E00205AFDB54EFA8C845AEEB7F1EF88320F148459E91AFB341D734A9919B90
                                                      APIs
                                                      • IsWindow.USER32(01725490), ref: 00F17F37
                                                      • IsWindowEnabled.USER32(01725490), ref: 00F17F43
                                                      • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00F1801E
                                                      • SendMessageW.USER32(01725490,000000B0,?,?), ref: 00F18051
                                                      • IsDlgButtonChecked.USER32(?,?), ref: 00F18089
                                                      • GetWindowLongW.USER32(01725490,000000EC), ref: 00F180AB
                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00F180C3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                      • String ID:
                                                      • API String ID: 4072528602-0
                                                      • Opcode ID: 00eef524c8e3e5b40ef6998f3489d9cb09c40825af6b774308009b2e869be96e
                                                      • Instruction ID: 3750300b6fc0288724d12cbba3b4a7c7bace5deff971ea824ae887dcb2ed3783
                                                      • Opcode Fuzzy Hash: 00eef524c8e3e5b40ef6998f3489d9cb09c40825af6b774308009b2e869be96e
                                                      • Instruction Fuzzy Hash: 1071A035A08348AFEB25AF64CC84FEB7BB5FF09350F144059E95957261CB31A886FB90
                                                      APIs
                                                      • GetParent.USER32(?), ref: 00EEAEF9
                                                      • GetKeyboardState.USER32(?), ref: 00EEAF0E
                                                      • SetKeyboardState.USER32(?), ref: 00EEAF6F
                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 00EEAF9D
                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 00EEAFBC
                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00EEAFFD
                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00EEB020
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: 0bdef07d84e9d22c653bb737e0705d6f150079665b47acb01574384d3019fc1b
                                                      • Instruction ID: 3e567c1bc97cc8439e0c2fade17d9b3d288509d22aac00e86bb6fd9ee3e53939
                                                      • Opcode Fuzzy Hash: 0bdef07d84e9d22c653bb737e0705d6f150079665b47acb01574384d3019fc1b
                                                      • Instruction Fuzzy Hash: 3F51CEA06046D97DFB368336C845BBBBEE95B06308F0C949DE1D9658D2C398A8C8D791
                                                      APIs
                                                      • GetParent.USER32(00000000), ref: 00EEAD19
                                                      • GetKeyboardState.USER32(?), ref: 00EEAD2E
                                                      • SetKeyboardState.USER32(?), ref: 00EEAD8F
                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00EEADBB
                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00EEADD8
                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00EEAE17
                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00EEAE38
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: 4bbd325c6a7c7b0510e800f04cd783911c819240872a4931c42001ad50346754
                                                      • Instruction ID: 7dd7c651bf03b37f073eeb2b06b016b8eadc08cb6d4bd79cbc6c85a497cd8ee6
                                                      • Opcode Fuzzy Hash: 4bbd325c6a7c7b0510e800f04cd783911c819240872a4931c42001ad50346754
                                                      • Instruction Fuzzy Hash: 4F51E5A05047D93DFB3282268C95BBA7ED95F45308F0C949CE1D9668D2D294FCC8D752
                                                      APIs
                                                      • GetConsoleCP.KERNEL32(00EC3CD6,?,?,?,?,?,?,?,?,00EB5BA3,?,?,00EC3CD6,?,?), ref: 00EB5470
                                                      • __fassign.LIBCMT ref: 00EB54EB
                                                      • __fassign.LIBCMT ref: 00EB5506
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00EC3CD6,00000005,00000000,00000000), ref: 00EB552C
                                                      • WriteFile.KERNEL32(?,00EC3CD6,00000000,00EB5BA3,00000000,?,?,?,?,?,?,?,?,?,00EB5BA3,?), ref: 00EB554B
                                                      • WriteFile.KERNEL32(?,?,00000001,00EB5BA3,00000000,?,?,?,?,?,?,?,?,?,00EB5BA3,?), ref: 00EB5584
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                      • String ID:
                                                      • API String ID: 1324828854-0
                                                      • Opcode ID: bd5454658b1233d83248606d9de6edb1eed6b88c33a382c1a1d0b38181494aa2
                                                      • Instruction ID: b46957b36a532399b2873862ac03510d63664c5a226ef0a2bccf05ddd4d25fa4
                                                      • Opcode Fuzzy Hash: bd5454658b1233d83248606d9de6edb1eed6b88c33a382c1a1d0b38181494aa2
                                                      • Instruction Fuzzy Hash: 7351B071A00649AFDB20CFA8D845BEEBBF9EF09301F14511AE955F7291D6309A41CF60
                                                      APIs
                                                        • Part of subcall function 00F0304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F0307A
                                                        • Part of subcall function 00F0304E: _wcslen.LIBCMT ref: 00F0309B
                                                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00F01112
                                                      • WSAGetLastError.WSOCK32 ref: 00F01121
                                                      • WSAGetLastError.WSOCK32 ref: 00F011C9
                                                      • closesocket.WSOCK32(00000000), ref: 00F011F9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 2675159561-0
                                                      • Opcode ID: 04e81d630d8cb73423e10cc672c1e70abcd7fbefc78f561599e61cbe6b01e724
                                                      • Instruction ID: 5c6f1927f355c44ba0663c633d6629892cf4035b8cfe76129cb6cbdac94d6e34
                                                      • Opcode Fuzzy Hash: 04e81d630d8cb73423e10cc672c1e70abcd7fbefc78f561599e61cbe6b01e724
                                                      • Instruction Fuzzy Hash: C741C131600208AFDB149F14C884BAABBE9FF45328F158059F919AB2D1C774ED41EBE1
                                                      APIs
                                                        • Part of subcall function 00EEDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00EECF22,?), ref: 00EEDDFD
                                                        • Part of subcall function 00EEDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00EECF22,?), ref: 00EEDE16
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00EECF45
                                                      • MoveFileW.KERNEL32(?,?), ref: 00EECF7F
                                                      • _wcslen.LIBCMT ref: 00EED005
                                                      • _wcslen.LIBCMT ref: 00EED01B
                                                      • SHFileOperationW.SHELL32(?), ref: 00EED061
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                      • String ID: \*.*
                                                      • API String ID: 3164238972-1173974218
                                                      • Opcode ID: c727c968159f622fea206d1ab07a63fe050e750448db0f2873f8ade970a519fe
                                                      • Instruction ID: 8815888be68f83a1db54ed6bbff9f425f2c3624c5649e952691e6c60e9a8a219
                                                      • Opcode Fuzzy Hash: c727c968159f622fea206d1ab07a63fe050e750448db0f2873f8ade970a519fe
                                                      • Instruction Fuzzy Hash: 0B41747194525C5FDF12EBA5CD81ADEB7F9AF08380F1410E6E509FB142EA34A689CB50
                                                      APIs
                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00F12E1C
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00F12E4F
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00F12E84
                                                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00F12EB6
                                                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00F12EE0
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00F12EF1
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00F12F0B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$MessageSend
                                                      • String ID:
                                                      • API String ID: 2178440468-0
                                                      • Opcode ID: dc4a5beff08b8abfad3d7630e2a1ee3885fc038dc69c83256bee837d1ef8a66f
                                                      • Instruction ID: 5e0dea8937bb0a7b0042ebed65de18e0b52abc987beb656cdb1eb2211b29005e
                                                      • Opcode Fuzzy Hash: dc4a5beff08b8abfad3d7630e2a1ee3885fc038dc69c83256bee837d1ef8a66f
                                                      • Instruction Fuzzy Hash: 3A311731A442589FEB61CF98DC94FA537E1FB4A721F154164FA148F2B1CB71ACA0EB41
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00EE7769
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00EE778F
                                                      • SysAllocString.OLEAUT32(00000000), ref: 00EE7792
                                                      • SysAllocString.OLEAUT32(?), ref: 00EE77B0
                                                      • SysFreeString.OLEAUT32(?), ref: 00EE77B9
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00EE77DE
                                                      • SysAllocString.OLEAUT32(?), ref: 00EE77EC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: 49f6dc958e367c8a523706758983375a57a3ba13f1a19d85758c878d6d5e25cd
                                                      • Instruction ID: d836b2c33920e97f5a504dfdc01097fe568e1a2ecc01b16683cf0237dde63383
                                                      • Opcode Fuzzy Hash: 49f6dc958e367c8a523706758983375a57a3ba13f1a19d85758c878d6d5e25cd
                                                      • Instruction Fuzzy Hash: 36217C7660821DAFDB10DFA9CC88CFB77ACEB097647058026FA55EB150D6709C8287A0
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00EE7842
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00EE7868
                                                      • SysAllocString.OLEAUT32(00000000), ref: 00EE786B
                                                      • SysAllocString.OLEAUT32 ref: 00EE788C
                                                      • SysFreeString.OLEAUT32 ref: 00EE7895
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00EE78AF
                                                      • SysAllocString.OLEAUT32(?), ref: 00EE78BD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: c51c51fe6dace7f6d135df4523e3854041b80282981e2b634e49bb20cf69abf7
                                                      • Instruction ID: 5ddd88c80a11ca1a4bb4fb109135781a4b28715a2654c98a70a3f9772d31f0cb
                                                      • Opcode Fuzzy Hash: c51c51fe6dace7f6d135df4523e3854041b80282981e2b634e49bb20cf69abf7
                                                      • Instruction Fuzzy Hash: ED21C171608228AFDF149FA9CC88DAA77ECEB183607108025F954DB2A0D670DC41DB68
                                                      APIs
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00EF04F2
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00EF052E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CreateHandlePipe
                                                      • String ID: nul
                                                      • API String ID: 1424370930-2873401336
                                                      • Opcode ID: f31c1cceaf0d7c5b734dfd6208a8873111d6c6b0e0727c877f3c19476d20db6f
                                                      • Instruction ID: 2f39b02cffc122c9e5a3b6ccf63b721538e7a6469357305af8d7630ec61f1f45
                                                      • Opcode Fuzzy Hash: f31c1cceaf0d7c5b734dfd6208a8873111d6c6b0e0727c877f3c19476d20db6f
                                                      • Instruction Fuzzy Hash: 25215175500309ABDB309F69D844AAA77A4AF44728F204A19E9A1E61E1E7B0D940DF60
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00EF05C6
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00EF0601
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CreateHandlePipe
                                                      • String ID: nul
                                                      • API String ID: 1424370930-2873401336
                                                      • Opcode ID: c4ddd567a06aa406222f9f78ce4d241750bd3de4aeaa50786d7b96121b01a2f9
                                                      • Instruction ID: efc4f995fc8a0a9ea679330f58f8b1087be58973d8e0aa629c4c63323009ef12
                                                      • Opcode Fuzzy Hash: c4ddd567a06aa406222f9f78ce4d241750bd3de4aeaa50786d7b96121b01a2f9
                                                      • Instruction Fuzzy Hash: DA21B27560031D9BDB208F68CC04AAA77E4BF85734F214A19FEA1F72E1DBB09860CB50
                                                      APIs
                                                        • Part of subcall function 00E8600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00E8604C
                                                        • Part of subcall function 00E8600E: GetStockObject.GDI32(00000011), ref: 00E86060
                                                        • Part of subcall function 00E8600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E8606A
                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00F14112
                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00F1411F
                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00F1412A
                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00F14139
                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00F14145
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                      • String ID: Msctls_Progress32
                                                      • API String ID: 1025951953-3636473452
                                                      • Opcode ID: c3cd5a282a9e6c792d5207571c70a5eae7a8fd436288f01a184b76cd604e9d40
                                                      • Instruction ID: 6637098fba6ee65e824ae0bdb7326f8bf6df053fb59013e186354b597c1c34af
                                                      • Opcode Fuzzy Hash: c3cd5a282a9e6c792d5207571c70a5eae7a8fd436288f01a184b76cd604e9d40
                                                      • Instruction Fuzzy Hash: AC1193B214021D7EEF219E64CC85EE77F5DEF097A8F014110BA18A6050C6729C61ABA4
                                                      APIs
                                                        • Part of subcall function 00EBD7A3: _free.LIBCMT ref: 00EBD7CC
                                                      • _free.LIBCMT ref: 00EBD82D
                                                        • Part of subcall function 00EB29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000), ref: 00EB29DE
                                                        • Part of subcall function 00EB29C8: GetLastError.KERNEL32(00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000,00000000), ref: 00EB29F0
                                                      • _free.LIBCMT ref: 00EBD838
                                                      • _free.LIBCMT ref: 00EBD843
                                                      • _free.LIBCMT ref: 00EBD897
                                                      • _free.LIBCMT ref: 00EBD8A2
                                                      • _free.LIBCMT ref: 00EBD8AD
                                                      • _free.LIBCMT ref: 00EBD8B8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                                                      • Instruction ID: 7a32fcbbb999df6f05a650a52608f8f570bb0caa892b5f1dfbe1eb129e725550
                                                      • Opcode Fuzzy Hash: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                                                      • Instruction Fuzzy Hash: 46112B71944B14BBDA21BFB0CC47FCB7BDCAF44700F406C2AB29DB6492EA65B50587A0
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00EEDA74
                                                      • LoadStringW.USER32(00000000), ref: 00EEDA7B
                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00EEDA91
                                                      • LoadStringW.USER32(00000000), ref: 00EEDA98
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00EEDADC
                                                      Strings
                                                      • %s (%d) : ==> %s: %s %s, xrefs: 00EEDAB9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message
                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                      • API String ID: 4072794657-3128320259
                                                      • Opcode ID: 8bccd0d792eceaba8108f915135f8733967b18fc5001ad2256ac773f6f9da58b
                                                      • Instruction ID: ce9f87ad3ac99b363389dcace2f6a19b1cd4142cfd5d002f203b60c2dafd855f
                                                      • Opcode Fuzzy Hash: 8bccd0d792eceaba8108f915135f8733967b18fc5001ad2256ac773f6f9da58b
                                                      • Instruction Fuzzy Hash: E30186F654020C7FE710DBA09D89EE7376CE708701F4154A1BB0AF2041E6749E845FB5
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(0171DF58,0171DF58), ref: 00EF097B
                                                      • EnterCriticalSection.KERNEL32(0171DF38,00000000), ref: 00EF098D
                                                      • TerminateThread.KERNEL32(00000000,000001F6), ref: 00EF099B
                                                      • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00EF09A9
                                                      • CloseHandle.KERNEL32(00000000), ref: 00EF09B8
                                                      • InterlockedExchange.KERNEL32(0171DF58,000001F6), ref: 00EF09C8
                                                      • LeaveCriticalSection.KERNEL32(0171DF38), ref: 00EF09CF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                      • String ID:
                                                      • API String ID: 3495660284-0
                                                      • Opcode ID: 58ecbb0507a0684a54d84dd9754a1bdfc517f9c0bbbf0de664df09a1d3f4f92f
                                                      • Instruction ID: 38fc1676f270a8e82173cc2e000771877b98ca9708a5543dcf3c70a5b6b34dd4
                                                      • Opcode Fuzzy Hash: 58ecbb0507a0684a54d84dd9754a1bdfc517f9c0bbbf0de664df09a1d3f4f92f
                                                      • Instruction Fuzzy Hash: 8EF03C32482A16BBD7525FA4EE8CBE6BB39FF41702F416025F242A08A1D7B49465DFD0
                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 00E85D30
                                                      • GetWindowRect.USER32(?,?), ref: 00E85D71
                                                      • ScreenToClient.USER32(?,?), ref: 00E85D99
                                                      • GetClientRect.USER32(?,?), ref: 00E85ED7
                                                      • GetWindowRect.USER32(?,?), ref: 00E85EF8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Rect$Client$Window$Screen
                                                      • String ID:
                                                      • API String ID: 1296646539-0
                                                      • Opcode ID: 94475841274945d782093cae84f05905def6e0da164da193e99996241031b968
                                                      • Instruction ID: c879f15a3392af9218a9c1a5c8fb1b3b43980ba47fd5def805273ab014f63fb2
                                                      • Opcode Fuzzy Hash: 94475841274945d782093cae84f05905def6e0da164da193e99996241031b968
                                                      • Instruction Fuzzy Hash: 6BB18E76A0074ADBDB14DFA8C540BEEB7F1FF54314F14A41AE8A9E7290DB30AA41DB50
                                                      APIs
                                                      • __allrem.LIBCMT ref: 00EB00BA
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EB00D6
                                                      • __allrem.LIBCMT ref: 00EB00ED
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EB010B
                                                      • __allrem.LIBCMT ref: 00EB0122
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EB0140
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                      • String ID:
                                                      • API String ID: 1992179935-0
                                                      • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                      • Instruction ID: 50967f15ad26d6c6736a095a0dd7975d18b6a7c1aaacc319e06550d5e07abb57
                                                      • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                      • Instruction Fuzzy Hash: 1C81D775A017069FE724AF68CC41BAB73E9AF46364F24653EF551FB281E7B0E9008790
                                                      APIs
                                                        • Part of subcall function 00F03149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,00F0101C,00000000,?,?,00000000), ref: 00F03195
                                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00F01DC0
                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00F01DE1
                                                      • WSAGetLastError.WSOCK32 ref: 00F01DF2
                                                      • inet_ntoa.WSOCK32(?), ref: 00F01E8C
                                                      • htons.WSOCK32(?,?,?,?,?), ref: 00F01EDB
                                                      • _strlen.LIBCMT ref: 00F01F35
                                                        • Part of subcall function 00EE39E8: _strlen.LIBCMT ref: 00EE39F2
                                                        • Part of subcall function 00E86D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,00E9CF58,?,?,?), ref: 00E86DBA
                                                        • Part of subcall function 00E86D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,00E9CF58,?,?,?), ref: 00E86DED
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                      • String ID:
                                                      • API String ID: 1923757996-0
                                                      • Opcode ID: f12b8feaa4d723c83e2d4452cabaad1d10a64c98a70c87145d60f3ab9fd38406
                                                      • Instruction ID: 7ba6aa33762aca6ba8715ea9af9b1558cb0e1b8cf1360c1973fd541105d12e90
                                                      • Opcode Fuzzy Hash: f12b8feaa4d723c83e2d4452cabaad1d10a64c98a70c87145d60f3ab9fd38406
                                                      • Instruction Fuzzy Hash: 5FA1D031604341AFC724EB24C885F2A7BE5BF85328F54994CF45A6B2E2CB31ED45EB91
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00EA82D9,00EA82D9,?,?,?,00EB644F,00000001,00000001,?), ref: 00EB6258
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00EB644F,00000001,00000001,?,?,?,?), ref: 00EB62DE
                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00EB63D8
                                                      • __freea.LIBCMT ref: 00EB63E5
                                                        • Part of subcall function 00EB3820: RtlAllocateHeap.NTDLL(00000000,?,00F51444,?,00E9FDF5,?,?,00E8A976,00000010,00F51440,00E813FC,?,00E813C6,?,00E81129), ref: 00EB3852
                                                      • __freea.LIBCMT ref: 00EB63EE
                                                      • __freea.LIBCMT ref: 00EB6413
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1414292761-0
                                                      • Opcode ID: bed2eacf79a0ad9ec912400cac8a9f01a8a7095edde06ff781f06f9c055e14c7
                                                      • Instruction ID: 9fdf1fd69afbe881fad37e6fd0f52c678d0366f5da249c108384007db3b6c097
                                                      • Opcode Fuzzy Hash: bed2eacf79a0ad9ec912400cac8a9f01a8a7095edde06ff781f06f9c055e14c7
                                                      • Instruction Fuzzy Hash: ED51E072A00216ABEB258F64DC81EEF7BE9EB94714F155629FC05F6150EB38DC40C6A0
                                                      APIs
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                        • Part of subcall function 00F0C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F0B6AE,?,?), ref: 00F0C9B5
                                                        • Part of subcall function 00F0C998: _wcslen.LIBCMT ref: 00F0C9F1
                                                        • Part of subcall function 00F0C998: _wcslen.LIBCMT ref: 00F0CA68
                                                        • Part of subcall function 00F0C998: _wcslen.LIBCMT ref: 00F0CA9E
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F0BCCA
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F0BD25
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00F0BD6A
                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00F0BD99
                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00F0BDF3
                                                      • RegCloseKey.ADVAPI32(?), ref: 00F0BDFF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                      • String ID:
                                                      • API String ID: 1120388591-0
                                                      • Opcode ID: c83012511915f20fddf3fd17d18aff1622cced7dda7e82ce5ccc14e9992a7342
                                                      • Instruction ID: 7e567f73392c0c4f567bcc427bfd3c79b7d5e1ae557e8473835237d3180b34d6
                                                      • Opcode Fuzzy Hash: c83012511915f20fddf3fd17d18aff1622cced7dda7e82ce5ccc14e9992a7342
                                                      • Instruction Fuzzy Hash: 3B81D231608241EFD714EF24C885E2ABBE5FF84318F14895CF4599B2A2DB31ED45EB92
                                                      APIs
                                                      • VariantInit.OLEAUT32(00000035), ref: 00EDF7B9
                                                      • SysAllocString.OLEAUT32(00000001), ref: 00EDF860
                                                      • VariantCopy.OLEAUT32(00EDFA64,00000000), ref: 00EDF889
                                                      • VariantClear.OLEAUT32(00EDFA64), ref: 00EDF8AD
                                                      • VariantCopy.OLEAUT32(00EDFA64,00000000), ref: 00EDF8B1
                                                      • VariantClear.OLEAUT32(?), ref: 00EDF8BB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCopy$AllocInitString
                                                      • String ID:
                                                      • API String ID: 3859894641-0
                                                      • Opcode ID: 3ce3d19d8dc177292c9265ec9767fc60d623961cab601324f8d4614be94f2afa
                                                      • Instruction ID: c080b1b46962b37a5b87336866fc7f136a04d14779650f36b65d2f2437589e62
                                                      • Opcode Fuzzy Hash: 3ce3d19d8dc177292c9265ec9767fc60d623961cab601324f8d4614be94f2afa
                                                      • Instruction Fuzzy Hash: 9151E435940310BACF14EBA5D8A5B69B3E8EF85310B24A467E807FF392DB708C41D796
                                                      APIs
                                                        • Part of subcall function 00E87620: _wcslen.LIBCMT ref: 00E87625
                                                        • Part of subcall function 00E86B57: _wcslen.LIBCMT ref: 00E86B6A
                                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 00EF94E5
                                                      • _wcslen.LIBCMT ref: 00EF9506
                                                      • _wcslen.LIBCMT ref: 00EF952D
                                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00EF9585
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$FileName$OpenSave
                                                      • String ID: X
                                                      • API String ID: 83654149-3081909835
                                                      • Opcode ID: c780aa15741897b659135dc59bf660183941180e2aba77bef2eca7345deb16d1
                                                      • Instruction ID: b73ed2f485fbe950c8914949fc482ffc1f64241f89fa332b2ec875f4626786a3
                                                      • Opcode Fuzzy Hash: c780aa15741897b659135dc59bf660183941180e2aba77bef2eca7345deb16d1
                                                      • Instruction Fuzzy Hash: 80E1B1716083018FD714EF24C881B6AB7E4BF85314F14996DF99DAB2A2DB31ED05CB92
                                                      APIs
                                                        • Part of subcall function 00E99BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E99BB2
                                                      • BeginPaint.USER32(?,?,?), ref: 00E99241
                                                      • GetWindowRect.USER32(?,?), ref: 00E992A5
                                                      • ScreenToClient.USER32(?,?), ref: 00E992C2
                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00E992D3
                                                      • EndPaint.USER32(?,?,?,?,?), ref: 00E99321
                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00ED71EA
                                                        • Part of subcall function 00E99339: BeginPath.GDI32(00000000), ref: 00E99357
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                      • String ID:
                                                      • API String ID: 3050599898-0
                                                      • Opcode ID: 9568f887494542e5f931ee34c3743f023ad2d2e984e735ce585e74f2eaca28e7
                                                      • Instruction ID: 8ec13cfd721991a1eb9745f8267360aa3fa3e720ecd77426543385ecd4b06a0f
                                                      • Opcode Fuzzy Hash: 9568f887494542e5f931ee34c3743f023ad2d2e984e735ce585e74f2eaca28e7
                                                      • Instruction Fuzzy Hash: 8D41B370105304AFDB11DF28DC84FAA7BE8FB46725F04022DFA95A72E2D731A845EB61
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 00EF080C
                                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00EF0847
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00EF0863
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00EF08DC
                                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00EF08F3
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00EF0921
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                      • String ID:
                                                      • API String ID: 3368777196-0
                                                      • Opcode ID: d0f8476306eebc3f8d107fd45f0f54da254e453cd263cc25d12fecc59775ac3c
                                                      • Instruction ID: ad7dba8a1b4752da86c37d766ddeaadc9ae7f3e47296a32ff74964eaf80dcdad
                                                      • Opcode Fuzzy Hash: d0f8476306eebc3f8d107fd45f0f54da254e453cd263cc25d12fecc59775ac3c
                                                      • Instruction Fuzzy Hash: FE417C71A00209EBDF14AF54DC85AAA77B8FF45310F1480A9ED00EE297DB30DE65DBA0
                                                      APIs
                                                      • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00EDF3AB,00000000,?,?,00000000,?,00ED682C,00000004,00000000,00000000), ref: 00F1824C
                                                      • EnableWindow.USER32(00000000,00000000), ref: 00F18272
                                                      • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00F182D1
                                                      • ShowWindow.USER32(00000000,00000004), ref: 00F182E5
                                                      • EnableWindow.USER32(00000000,00000001), ref: 00F1830B
                                                      • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00F1832F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$Enable$MessageSend
                                                      • String ID:
                                                      • API String ID: 642888154-0
                                                      • Opcode ID: 667545e83484202c39769d998f7132439ec5bb93ea080226176c568c58467494
                                                      • Instruction ID: 4627757fea16b24074b0331d6eb28b390de1701c9b96fada016853140744ccc8
                                                      • Opcode Fuzzy Hash: 667545e83484202c39769d998f7132439ec5bb93ea080226176c568c58467494
                                                      • Instruction Fuzzy Hash: C041C834A01644AFDB12CF15CD95BE47BE0FB06765F184169E6184F2B2CB71AC82EF50
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 00EE4C95
                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00EE4CB2
                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00EE4CEA
                                                      • _wcslen.LIBCMT ref: 00EE4D08
                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00EE4D10
                                                      • _wcsstr.LIBVCRUNTIME ref: 00EE4D1A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                      • String ID:
                                                      • API String ID: 72514467-0
                                                      • Opcode ID: 7a1c74d51c60287a97eaaf3498154107ea4ab1c30a66d9ee36b2aea360c987d4
                                                      • Instruction ID: 24673a70853e46d25d8132b28bb5cc8d3acb43658b9461f36d08b281c5622868
                                                      • Opcode Fuzzy Hash: 7a1c74d51c60287a97eaaf3498154107ea4ab1c30a66d9ee36b2aea360c987d4
                                                      • Instruction Fuzzy Hash: 362129B12042487BEB155B3ADC09E7B7BDCDF49750F119029F809EA1D1DA61DC0096A1
                                                      APIs
                                                        • Part of subcall function 00E83AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E83A97,?,?,00E82E7F,?,?,?,00000000), ref: 00E83AC2
                                                      • _wcslen.LIBCMT ref: 00EF587B
                                                      • CoInitialize.OLE32(00000000), ref: 00EF5995
                                                      • CoCreateInstance.OLE32(00F1FCF8,00000000,00000001,00F1FB68,?), ref: 00EF59AE
                                                      • CoUninitialize.OLE32 ref: 00EF59CC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                      • String ID: .lnk
                                                      • API String ID: 3172280962-24824748
                                                      • Opcode ID: 4b3a4fa1ffa8b37b53d2837d766ec8efbc10fdfaff6ecd55dea8c10ab54c59b6
                                                      • Instruction ID: fb106ccaae3eb3638e756f948009bd7b5923d6fbd8f2d3bf4c8df1317f7e074b
                                                      • Opcode Fuzzy Hash: 4b3a4fa1ffa8b37b53d2837d766ec8efbc10fdfaff6ecd55dea8c10ab54c59b6
                                                      • Instruction Fuzzy Hash: 9DD185726087059FC708EF24C48092ABBE1FF99714F14985DFA99AB361C731ED45CB92
                                                      APIs
                                                        • Part of subcall function 00EE0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00EE0FCA
                                                        • Part of subcall function 00EE0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00EE0FD6
                                                        • Part of subcall function 00EE0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00EE0FE5
                                                        • Part of subcall function 00EE0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00EE0FEC
                                                        • Part of subcall function 00EE0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00EE1002
                                                      • GetLengthSid.ADVAPI32(?,00000000,00EE1335), ref: 00EE17AE
                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00EE17BA
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00EE17C1
                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 00EE17DA
                                                      • GetProcessHeap.KERNEL32(00000000,00000000,00EE1335), ref: 00EE17EE
                                                      • HeapFree.KERNEL32(00000000), ref: 00EE17F5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                      • String ID:
                                                      • API String ID: 3008561057-0
                                                      • Opcode ID: 70f18d428d4046a4d6620b47cd5df24fa3bd00edb114ce9bc885801a3ffcc87b
                                                      • Instruction ID: 47387bb91f0461e9053fce4c0abc839439ab6ea77931b08e285d242f44eea03e
                                                      • Opcode Fuzzy Hash: 70f18d428d4046a4d6620b47cd5df24fa3bd00edb114ce9bc885801a3ffcc87b
                                                      • Instruction Fuzzy Hash: D011EE31684208FFDB108FA6CC48BEE7BB8EB46719F108059F481B7211C731A980DBA0
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00EE14FF
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00EE1506
                                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00EE1515
                                                      • CloseHandle.KERNEL32(00000004), ref: 00EE1520
                                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00EE154F
                                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00EE1563
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                      • String ID:
                                                      • API String ID: 1413079979-0
                                                      • Opcode ID: bb59a34c3a7ca66a512b5af7c1c39e17133e9b02ab966e6aae218b8e202071d3
                                                      • Instruction ID: 78c76998d2b875b93ef382d010957e0a18e1c3096200226e1a8fc107be5a8309
                                                      • Opcode Fuzzy Hash: bb59a34c3a7ca66a512b5af7c1c39e17133e9b02ab966e6aae218b8e202071d3
                                                      • Instruction Fuzzy Hash: 9611597250024DABDF118F98DD49BDE7BA9EF48748F058054FA15A21A0C3718EA4EBA0
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,00EA3379,00EA2FE5), ref: 00EA3390
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00EA339E
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00EA33B7
                                                      • SetLastError.KERNEL32(00000000,?,00EA3379,00EA2FE5), ref: 00EA3409
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: 1aa4a47ba1824b756c9facabed4e1b108abaef539eb44c001d9a47f55afc0a1c
                                                      • Instruction ID: 923437a0e9d8bd8ec36708c21a284f14e19a1935b586443ba7a42e81c8014b0a
                                                      • Opcode Fuzzy Hash: 1aa4a47ba1824b756c9facabed4e1b108abaef539eb44c001d9a47f55afc0a1c
                                                      • Instruction Fuzzy Hash: 3D01243660E315BEAA6427787C855A73ED4EB6F3797203229F830EC1F0EF156E096184
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,00EB5686,00EC3CD6,?,00000000,?,00EB5B6A,?,?,?,?,?,00EAE6D1,?,00F48A48), ref: 00EB2D78
                                                      • _free.LIBCMT ref: 00EB2DAB
                                                      • _free.LIBCMT ref: 00EB2DD3
                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,00EAE6D1,?,00F48A48,00000010,00E84F4A,?,?,00000000,00EC3CD6), ref: 00EB2DE0
                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,00EAE6D1,?,00F48A48,00000010,00E84F4A,?,?,00000000,00EC3CD6), ref: 00EB2DEC
                                                      • _abort.LIBCMT ref: 00EB2DF2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free$_abort
                                                      • String ID:
                                                      • API String ID: 3160817290-0
                                                      • Opcode ID: 0971efc5ef6369c10bfe5d03aa2eedb8562487e3b93ec3a6b5f878f6f980ab46
                                                      • Instruction ID: c8533c8e697b9229720e3f33a4bde25289a192f4200a6505e7bf69d6860af726
                                                      • Opcode Fuzzy Hash: 0971efc5ef6369c10bfe5d03aa2eedb8562487e3b93ec3a6b5f878f6f980ab46
                                                      • Instruction Fuzzy Hash: 0EF0FC3554560037C6123739BC0AEDF3599AFC67A5F25651CFF38F21E6EF24880161A1
                                                      APIs
                                                        • Part of subcall function 00E99639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E99693
                                                        • Part of subcall function 00E99639: SelectObject.GDI32(?,00000000), ref: 00E996A2
                                                        • Part of subcall function 00E99639: BeginPath.GDI32(?), ref: 00E996B9
                                                        • Part of subcall function 00E99639: SelectObject.GDI32(?,00000000), ref: 00E996E2
                                                      • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00F18A4E
                                                      • LineTo.GDI32(?,00000003,00000000), ref: 00F18A62
                                                      • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00F18A70
                                                      • LineTo.GDI32(?,00000000,00000003), ref: 00F18A80
                                                      • EndPath.GDI32(?), ref: 00F18A90
                                                      • StrokePath.GDI32(?), ref: 00F18AA0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                      • String ID:
                                                      • API String ID: 43455801-0
                                                      • Opcode ID: 23f7b067612c63bd4b66027f931baa228795f42e4ba5935b2c05a3b1c1e1c8dd
                                                      • Instruction ID: 600ec098f6955ba4e1dc6c336672199af179e6af4b112aad06073b0a4279f996
                                                      • Opcode Fuzzy Hash: 23f7b067612c63bd4b66027f931baa228795f42e4ba5935b2c05a3b1c1e1c8dd
                                                      • Instruction Fuzzy Hash: 2211F77644010CFFDB129F94DC88EEA7FACEF08390F01C012BA199A1A1C771AD55EBA0
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 00EE5218
                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00EE5229
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00EE5230
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00EE5238
                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00EE524F
                                                      • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00EE5261
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CapsDevice$Release
                                                      • String ID:
                                                      • API String ID: 1035833867-0
                                                      • Opcode ID: 16c27a0f95eb3f079fa4130189c9180d7174fcb986c949794ce8857069757de1
                                                      • Instruction ID: 8b8780207aaf863f34fc4ee360cf32123c6dd98b6ab07699ac36dd2272df9349
                                                      • Opcode Fuzzy Hash: 16c27a0f95eb3f079fa4130189c9180d7174fcb986c949794ce8857069757de1
                                                      • Instruction Fuzzy Hash: 9D014875A40718BBEB105BA69C45A5E7F78EB48751F044065FA09A7291D6709900DB90
                                                      APIs
                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E81BF4
                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00E81BFC
                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E81C07
                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E81C12
                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00E81C1A
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E81C22
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Virtual
                                                      • String ID:
                                                      • API String ID: 4278518827-0
                                                      • Opcode ID: 3eb8cdeeeeb9c2c672a36e3d1b69955c8f1113fe1a4591f44bc753547443b83f
                                                      • Instruction ID: 1e6ba7abab5e3c87e841b3f34cc0bb31c7612f4dfbd31d1daafcdcc4f78c88c1
                                                      • Opcode Fuzzy Hash: 3eb8cdeeeeb9c2c672a36e3d1b69955c8f1113fe1a4591f44bc753547443b83f
                                                      • Instruction Fuzzy Hash: 0D0167B0942B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                      APIs
                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00EEEB30
                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00EEEB46
                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 00EEEB55
                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00EEEB64
                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00EEEB6E
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00EEEB75
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 839392675-0
                                                      • Opcode ID: 15e0a8599ef7323807f891a77cf5e3e3d2ee71ce1026d59e65a86475813c8d97
                                                      • Instruction ID: f3b509680d1b01257f125b0298fcf710f0093acdacc4b60c7ab2520f5e62a043
                                                      • Opcode Fuzzy Hash: 15e0a8599ef7323807f891a77cf5e3e3d2ee71ce1026d59e65a86475813c8d97
                                                      • Instruction Fuzzy Hash: 97F0307258015CBBE72157529C0DEEF3A7CEFCAB11F018158F611E1191D7A05A01E6F5
                                                      APIs
                                                      • GetClientRect.USER32(?), ref: 00ED7452
                                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 00ED7469
                                                      • GetWindowDC.USER32(?), ref: 00ED7475
                                                      • GetPixel.GDI32(00000000,?,?), ref: 00ED7484
                                                      • ReleaseDC.USER32(?,00000000), ref: 00ED7496
                                                      • GetSysColor.USER32(00000005), ref: 00ED74B0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                      • String ID:
                                                      • API String ID: 272304278-0
                                                      • Opcode ID: 5567e17bb1cce8dd464424552cec6b0a06250203a84398cf94899039197ad443
                                                      • Instruction ID: 35af826e6bb588a1132f5c21c673b3d9b8c3a59e666922af9d9b034f755bab3a
                                                      • Opcode Fuzzy Hash: 5567e17bb1cce8dd464424552cec6b0a06250203a84398cf94899039197ad443
                                                      • Instruction Fuzzy Hash: 1A018B31440219EFDB515F64DC08BEA7BB6FB04311F568064F929A21A1CB311E42EB90
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00EE187F
                                                      • UnloadUserProfile.USERENV(?,?), ref: 00EE188B
                                                      • CloseHandle.KERNEL32(?), ref: 00EE1894
                                                      • CloseHandle.KERNEL32(?), ref: 00EE189C
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00EE18A5
                                                      • HeapFree.KERNEL32(00000000), ref: 00EE18AC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                      • String ID:
                                                      • API String ID: 146765662-0
                                                      • Opcode ID: 622a03c4a0979d3e63830ef0e131f1f3b7808ad5a0bd126336a2da741213bd68
                                                      • Instruction ID: 4ee0289d42603902a28a0e662f0f99c081448674beb7fe88841e4dcdb7e97fd4
                                                      • Opcode Fuzzy Hash: 622a03c4a0979d3e63830ef0e131f1f3b7808ad5a0bd126336a2da741213bd68
                                                      • Instruction Fuzzy Hash: 99E0ED36484219BBEB015FA2ED0C985BF39FF49721B11C220F22591071CB725420EF90
                                                      APIs
                                                        • Part of subcall function 00EA0242: EnterCriticalSection.KERNEL32(00F5070C,00F51884,?,?,00E9198B,00F52518,?,?,?,00E812F9,00000000), ref: 00EA024D
                                                        • Part of subcall function 00EA0242: LeaveCriticalSection.KERNEL32(00F5070C,?,00E9198B,00F52518,?,?,?,00E812F9,00000000), ref: 00EA028A
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                        • Part of subcall function 00EA00A3: __onexit.LIBCMT ref: 00EA00A9
                                                      • __Init_thread_footer.LIBCMT ref: 00F07BFB
                                                        • Part of subcall function 00EA01F8: EnterCriticalSection.KERNEL32(00F5070C,?,?,00E98747,00F52514), ref: 00EA0202
                                                        • Part of subcall function 00EA01F8: LeaveCriticalSection.KERNEL32(00F5070C,?,00E98747,00F52514), ref: 00EA0235
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                      • String ID: +T$5$G$Variable must be of type 'Object'.
                                                      • API String ID: 535116098-4125810065
                                                      • Opcode ID: c5814488c26fe9098d9a00b18dc7cb4df3f231cd30613cba6200f3ae0bbb04c6
                                                      • Instruction ID: 034009552a71217a611b66c53dfed843769c96c0fe3c59e655392b9e692144a4
                                                      • Opcode Fuzzy Hash: c5814488c26fe9098d9a00b18dc7cb4df3f231cd30613cba6200f3ae0bbb04c6
                                                      • Instruction Fuzzy Hash: 0A919A70E05309EFCB14EF54D8909BEB7B1BF49314F148099F80AAB292DB71AE41EB51
                                                      APIs
                                                        • Part of subcall function 00E87620: _wcslen.LIBCMT ref: 00E87625
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00EEC6EE
                                                      • _wcslen.LIBCMT ref: 00EEC735
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00EEC79C
                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00EEC7CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info_wcslen$Default
                                                      • String ID: 0
                                                      • API String ID: 1227352736-4108050209
                                                      • Opcode ID: 604ee1a2efe5ecd7cd29bc8e438d2ebb0c16f43df8a489b65e9d677884e23562
                                                      • Instruction ID: 63f7a8790b2a0a2dedb3ab95816a47ec15a7826559ea5d32cc18f06bd8f8a8df
                                                      • Opcode Fuzzy Hash: 604ee1a2efe5ecd7cd29bc8e438d2ebb0c16f43df8a489b65e9d677884e23562
                                                      • Instruction Fuzzy Hash: 7E5124716043899BD7149F3AC844BAB77E4AF89318F242A2EF995F3190DB70DC06DB52
                                                      APIs
                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 00F0AEA3
                                                        • Part of subcall function 00E87620: _wcslen.LIBCMT ref: 00E87625
                                                      • GetProcessId.KERNEL32(00000000), ref: 00F0AF38
                                                      • CloseHandle.KERNEL32(00000000), ref: 00F0AF67
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CloseExecuteHandleProcessShell_wcslen
                                                      • String ID: <$@
                                                      • API String ID: 146682121-1426351568
                                                      • Opcode ID: fe000d1ea6ef4f9615445307fe9699b3100c9b7d81e43c9c7da77483dd0aa17d
                                                      • Instruction ID: 8af8e321ac33e0517447991d999376d4e8ad9d468774e573f4ed04e0392a6c81
                                                      • Opcode Fuzzy Hash: fe000d1ea6ef4f9615445307fe9699b3100c9b7d81e43c9c7da77483dd0aa17d
                                                      • Instruction Fuzzy Hash: EE718C71A00619DFCB14EF54C484A9EBBF1FF08314F148499E85AAB392C774ED45DB91
                                                      APIs
                                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00EE7206
                                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00EE723C
                                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00EE724D
                                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00EE72CF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                                      • String ID: DllGetClassObject
                                                      • API String ID: 753597075-1075368562
                                                      • Opcode ID: 059d53fe902ec82ce3a08af626d2f10030c7bd1c9ebd44aba171a913a5d58aa0
                                                      • Instruction ID: 831a2496d5cb72df5220f319185b0d0092803942dd7ff616dcf58ae6def8cbdf
                                                      • Opcode Fuzzy Hash: 059d53fe902ec82ce3a08af626d2f10030c7bd1c9ebd44aba171a913a5d58aa0
                                                      • Instruction Fuzzy Hash: 0241DFB1A04209EFDB15CF55C884A9A7BB9EF48314F1090A9BE45AF21AD7B0DD40DBA0
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F13E35
                                                      • IsMenu.USER32(?), ref: 00F13E4A
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F13E92
                                                      • DrawMenuBar.USER32 ref: 00F13EA5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$DrawInfoInsert
                                                      • String ID: 0
                                                      • API String ID: 3076010158-4108050209
                                                      • Opcode ID: 16da9cd1b0bf380f177fff2130008652157eff7b284f1c0dcc8be2ebbd5f3c4b
                                                      • Instruction ID: 1a355d4171bce9c8e14b1ea5f7cd890946961b8b78b93bcd6e8c2d6e32a8e3d2
                                                      • Opcode Fuzzy Hash: 16da9cd1b0bf380f177fff2130008652157eff7b284f1c0dcc8be2ebbd5f3c4b
                                                      • Instruction Fuzzy Hash: A3413A75A01309EFDB10DF54D884AEABBB9FF49364F044129E915A7290D730AE89EF90
                                                      APIs
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                        • Part of subcall function 00EE3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EE3CCA
                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00EE1E66
                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00EE1E79
                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00EE1EA9
                                                        • Part of subcall function 00E86B57: _wcslen.LIBCMT ref: 00E86B6A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$_wcslen$ClassName
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 2081771294-1403004172
                                                      • Opcode ID: e06dbbdbb0b9d4afb5ce7f1815d3c88a2bbfdb2bfb789b4dcafa7df329a145d6
                                                      • Instruction ID: 9ee2f3c8e44727e31558c8ab0df9eefb7eb13f0918d1b5fc19083004d2f359ca
                                                      • Opcode Fuzzy Hash: e06dbbdbb0b9d4afb5ce7f1815d3c88a2bbfdb2bfb789b4dcafa7df329a145d6
                                                      • Instruction Fuzzy Hash: 23212371A00148AFDB18ABB1CC49CFFB7B8DF41364B146119F829B31E1DB3949499760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                      • API String ID: 176396367-4004644295
                                                      • Opcode ID: 3498a4bfa6dcb01c88f7dc90dd4be4af5f8f82a08ebb760a5c79ef59165fffcb
                                                      • Instruction ID: bdde58fde7c130fed8b7110e4b52a8a5ae25ce300459ad5da2142a99c5cc17f7
                                                      • Opcode Fuzzy Hash: 3498a4bfa6dcb01c88f7dc90dd4be4af5f8f82a08ebb760a5c79ef59165fffcb
                                                      • Instruction Fuzzy Hash: 2B31E673F0016E4BCB20EF6C98601BF37929BA2760B154229EC55AB2C5E679DD44B3E0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00F12F8D
                                                      • LoadLibraryW.KERNEL32(?), ref: 00F12F94
                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00F12FA9
                                                      • DestroyWindow.USER32(?), ref: 00F12FB1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$DestroyLibraryLoadWindow
                                                      • String ID: SysAnimate32
                                                      • API String ID: 3529120543-1011021900
                                                      • Opcode ID: 0a2155e9ea70584f7c6dc57a5e9a3d0dc09b4ba5cc913a776e624a5257713840
                                                      • Instruction ID: b5d90947942effeabf09bbb6e382e48c13dcad7a5eff4be2b90007a770e2725a
                                                      • Opcode Fuzzy Hash: 0a2155e9ea70584f7c6dc57a5e9a3d0dc09b4ba5cc913a776e624a5257713840
                                                      • Instruction Fuzzy Hash: 83219D71600209ABEB604FA4EC84EFB37B9EB59374F104218F954D6190D771DCA2A760
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00EA4D1E,00EB28E9,(,00EA4CBE,00000000,00F488B8,0000000C,00EA4E15,(,00000002), ref: 00EA4D8D
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00EA4DA0
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,00EA4D1E,00EB28E9,(,00EA4CBE,00000000,00F488B8,0000000C,00EA4E15,(,00000002,00000000), ref: 00EA4DC3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: 65a3fce03ac37acebeb663e4875f0e400b6437aed71e3c3c684ef59bffe8f92d
                                                      • Instruction ID: 9cdfe011f4d1aa24f56fbb0ede029d5ed54e0f7d834f0c96d2ba6750943daafa
                                                      • Opcode Fuzzy Hash: 65a3fce03ac37acebeb663e4875f0e400b6437aed71e3c3c684ef59bffe8f92d
                                                      • Instruction Fuzzy Hash: 43F0AF35A8021CBBDB109F94DC49BEDBFB4EF48716F0140A4F805B62A0CF70A940EAD1
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E84EDD,?,00F51418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E84E9C
                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E84EAE
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00E84EDD,?,00F51418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E84EC0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                      • API String ID: 145871493-3689287502
                                                      • Opcode ID: aff9ee1e73ab682bebcf85669da8a745c6ffb57eabb2194c4ec4240e0e5c7269
                                                      • Instruction ID: efe9d7358faeb83c732d6adadc7b0c458d4e5a86a9d4c495aa677ab673594d0b
                                                      • Opcode Fuzzy Hash: aff9ee1e73ab682bebcf85669da8a745c6ffb57eabb2194c4ec4240e0e5c7269
                                                      • Instruction Fuzzy Hash: 54E0CD35A815236BD2312B256C18F9F7654EFC1F667064115FC0CF7140DB60CD0161E1
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00EC3CDE,?,00F51418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E84E62
                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E84E74
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00EC3CDE,?,00F51418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E84E87
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                      • API String ID: 145871493-1355242751
                                                      • Opcode ID: c7eb216b503a56da958508bdf8a42650ec6a3ae13c2a7336d9f8e8a274ce9e58
                                                      • Instruction ID: dd9804ecedeb1488a72a069fe29d2466dd3dac5535daafa36b132f224bf33a76
                                                      • Opcode Fuzzy Hash: c7eb216b503a56da958508bdf8a42650ec6a3ae13c2a7336d9f8e8a274ce9e58
                                                      • Instruction Fuzzy Hash: 61D012355826236757222B256C18DCB7A18EF85B593064515BD0DF6154CF60CD01A6D1
                                                      APIs
                                                      • GetCurrentProcessId.KERNEL32 ref: 00F0A427
                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00F0A435
                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00F0A468
                                                      • CloseHandle.KERNEL32(?), ref: 00F0A63D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                                      • String ID:
                                                      • API String ID: 3488606520-0
                                                      • Opcode ID: 9d983eaca9336a759b27cfe7d6af59feeb3bce5245416c8456d73c8e86afb83b
                                                      • Instruction ID: df3013ff38fddf7f1afcbcb17908627114dfa40056f238de71e18bea07985dd6
                                                      • Opcode Fuzzy Hash: 9d983eaca9336a759b27cfe7d6af59feeb3bce5245416c8456d73c8e86afb83b
                                                      • Instruction Fuzzy Hash: 68A1B3716043009FE720DF24D886F2AB7E5AF84714F14985CF56A9B2D2D771EC41DB92
                                                      APIs
                                                        • Part of subcall function 00EEDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00EECF22,?), ref: 00EEDDFD
                                                        • Part of subcall function 00EEDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00EECF22,?), ref: 00EEDE16
                                                        • Part of subcall function 00EEE199: GetFileAttributesW.KERNEL32(?,00EECF95), ref: 00EEE19A
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00EEE473
                                                      • MoveFileW.KERNEL32(?,?), ref: 00EEE4AC
                                                      • _wcslen.LIBCMT ref: 00EEE5EB
                                                      • _wcslen.LIBCMT ref: 00EEE603
                                                      • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00EEE650
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                      • String ID:
                                                      • API String ID: 3183298772-0
                                                      • Opcode ID: 9b2906bc237f50b5c5b0576b99c59973038253efa6ff3948c24118aec3ccbd26
                                                      • Instruction ID: 9cda126c0ea8f05d36d7bbfdf768423ac1d997f4b4104784d892463a3353fe9a
                                                      • Opcode Fuzzy Hash: 9b2906bc237f50b5c5b0576b99c59973038253efa6ff3948c24118aec3ccbd26
                                                      • Instruction Fuzzy Hash: 3A5175B24083895BC724EB90DC819DFB3ECAF85344F00591EF599E3291EF75A5888766
                                                      APIs
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                        • Part of subcall function 00F0C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F0B6AE,?,?), ref: 00F0C9B5
                                                        • Part of subcall function 00F0C998: _wcslen.LIBCMT ref: 00F0C9F1
                                                        • Part of subcall function 00F0C998: _wcslen.LIBCMT ref: 00F0CA68
                                                        • Part of subcall function 00F0C998: _wcslen.LIBCMT ref: 00F0CA9E
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F0BAA5
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F0BB00
                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00F0BB63
                                                      • RegCloseKey.ADVAPI32(?,?), ref: 00F0BBA6
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00F0BBB3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                      • String ID:
                                                      • API String ID: 826366716-0
                                                      • Opcode ID: af423f2e021ec2edc595e71b8714672d93714bdec2d2ee1275b015ea401627cc
                                                      • Instruction ID: 463c21bbbf535aa35fa9ed6d98bf28078e292cddab302b610317aa72d15df074
                                                      • Opcode Fuzzy Hash: af423f2e021ec2edc595e71b8714672d93714bdec2d2ee1275b015ea401627cc
                                                      • Instruction Fuzzy Hash: 5C61E271608201EFD314EF14C890E2ABBE5FF84318F14855CF4998B2A2DB35ED45EB92
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00EE8BCD
                                                      • VariantClear.OLEAUT32 ref: 00EE8C3E
                                                      • VariantClear.OLEAUT32 ref: 00EE8C9D
                                                      • VariantClear.OLEAUT32(?), ref: 00EE8D10
                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00EE8D3B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Variant$Clear$ChangeInitType
                                                      • String ID:
                                                      • API String ID: 4136290138-0
                                                      • Opcode ID: 548fce355257c28930d04a995d45dd92d1993021bfec6bb109b30689cbe66111
                                                      • Instruction ID: 9ca722943a4166f2ae6bc8fedc0cf23cb47430d612fb755884fae47307a5886a
                                                      • Opcode Fuzzy Hash: 548fce355257c28930d04a995d45dd92d1993021bfec6bb109b30689cbe66111
                                                      • Instruction Fuzzy Hash: 6B5197B5A00219EFCB10CF29C884AAAB7F9FF89314B118559E909EB354E730E911CF90
                                                      APIs
                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00EF8BAE
                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00EF8BDA
                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00EF8C32
                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00EF8C57
                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00EF8C5F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile$SectionWrite$String
                                                      • String ID:
                                                      • API String ID: 2832842796-0
                                                      • Opcode ID: 6bedc43e21f696dda0c8e98b7d8fe28c62a357805ece5629ef3edb895dfca9e2
                                                      • Instruction ID: 084239e5d3c688924b1ebd861f38992397db59c6b1a4eb9940632f8127a1c6dc
                                                      • Opcode Fuzzy Hash: 6bedc43e21f696dda0c8e98b7d8fe28c62a357805ece5629ef3edb895dfca9e2
                                                      • Instruction Fuzzy Hash: 0C515A35A002199FCB04EF64C880AADBBF5FF49314F189458E94DAB362CB31ED41CBA1
                                                      APIs
                                                      • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00F08F40
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00F08FD0
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00F08FEC
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00F09032
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00F09052
                                                        • Part of subcall function 00E9F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00EF1043,?,753CE610), ref: 00E9F6E6
                                                        • Part of subcall function 00E9F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00EDFA64,00000000,00000000,?,?,00EF1043,?,753CE610,?,00EDFA64), ref: 00E9F70D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                      • String ID:
                                                      • API String ID: 666041331-0
                                                      • Opcode ID: 59b31e521e79ca1029f86125c9d8741cb2ffa86f431b85b41cdf99bbea71f1bc
                                                      • Instruction ID: b7f48e721fa331a2c2ddb0c451969f5e5df911610875152659f56f8c339564df
                                                      • Opcode Fuzzy Hash: 59b31e521e79ca1029f86125c9d8741cb2ffa86f431b85b41cdf99bbea71f1bc
                                                      • Instruction Fuzzy Hash: C9515F35A04205DFC715EF64C4848ADBBF1FF49324B058099E849AB3A2DB31ED86EB90
                                                      APIs
                                                      • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00F16C33
                                                      • SetWindowLongW.USER32(?,000000EC,?), ref: 00F16C4A
                                                      • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00F16C73
                                                      • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00EFAB79,00000000,00000000), ref: 00F16C98
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00F16CC7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$MessageSendShow
                                                      • String ID:
                                                      • API String ID: 3688381893-0
                                                      • Opcode ID: 74469a50f10fea136281166bc5a863d6abfd66e07b101f610720f2a83e71dd60
                                                      • Instruction ID: 9f096118a8421a3b3eb30ef96e542169c86ef72509371d25122c3d21e0033432
                                                      • Opcode Fuzzy Hash: 74469a50f10fea136281166bc5a863d6abfd66e07b101f610720f2a83e71dd60
                                                      • Instruction Fuzzy Hash: 0141D435A04104AFD724CF28CC58FE97BA5EB09361F154268F999E73E0C371AD81EAC0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 8fbc1c1f7d444ff95e2e7a2be8ed6a790a057c817acc5fdad4aa980010c97870
                                                      • Instruction ID: 7c4a852abbb0134f964d55b63c97aaa6e9ca47e3b82afb7c62f99d44f3df88c2
                                                      • Opcode Fuzzy Hash: 8fbc1c1f7d444ff95e2e7a2be8ed6a790a057c817acc5fdad4aa980010c97870
                                                      • Instruction Fuzzy Hash: F241E272A00204AFCB24DF78C880A9EB7E5EF89714F1555ACEA15FB391DB31AD01DB80
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 00E99141
                                                      • ScreenToClient.USER32(00000000,?), ref: 00E9915E
                                                      • GetAsyncKeyState.USER32(00000001), ref: 00E99183
                                                      • GetAsyncKeyState.USER32(00000002), ref: 00E9919D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: AsyncState$ClientCursorScreen
                                                      • String ID:
                                                      • API String ID: 4210589936-0
                                                      • Opcode ID: 97bacb000af2e337ae363535999cfdc4b9db9af8f6102a034788e85b2b935238
                                                      • Instruction ID: 00f7ba8c5d7dda81092c848cb6c8d76afd14e59f85e1c45fe9a1b87ac184b48b
                                                      • Opcode Fuzzy Hash: 97bacb000af2e337ae363535999cfdc4b9db9af8f6102a034788e85b2b935238
                                                      • Instruction Fuzzy Hash: 9D419F31A0821AFBDF099F68C844BEEB774FB05324F21931AE469B32D1D7346990DB91
                                                      APIs
                                                      • GetInputState.USER32 ref: 00EF38CB
                                                      • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00EF3922
                                                      • TranslateMessage.USER32(?), ref: 00EF394B
                                                      • DispatchMessageW.USER32(?), ref: 00EF3955
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EF3966
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                      • String ID:
                                                      • API String ID: 2256411358-0
                                                      • Opcode ID: 454a7f48fd1d22b4d45c53fc95908d4d0542a2fe7fdb81ccff2285f518ecd62e
                                                      • Instruction ID: fc121fec41e9483548b9098fa5e903587147e86e8563ed1e1bd006855c93abaa
                                                      • Opcode Fuzzy Hash: 454a7f48fd1d22b4d45c53fc95908d4d0542a2fe7fdb81ccff2285f518ecd62e
                                                      • Instruction Fuzzy Hash: B631097050438E9EEB35CB34D808BB637E8AB41349F04156DE762E21E4E3F4AA85DB11
                                                      APIs
                                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00EFC21E,00000000), ref: 00EFCF38
                                                      • InternetReadFile.WININET(?,00000000,?,?), ref: 00EFCF6F
                                                      • GetLastError.KERNEL32(?,00000000,?,?,?,00EFC21E,00000000), ref: 00EFCFB4
                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,00EFC21E,00000000), ref: 00EFCFC8
                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,00EFC21E,00000000), ref: 00EFCFF2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                      • String ID:
                                                      • API String ID: 3191363074-0
                                                      • Opcode ID: 88f79e62ead626e26f19012c9c79294c8cab937d6b746a60856d340299d787a8
                                                      • Instruction ID: e13ae8644e4f9f499dbe2b43a3efdbc703c67ad76bfd44745dfaad6464670ed5
                                                      • Opcode Fuzzy Hash: 88f79e62ead626e26f19012c9c79294c8cab937d6b746a60856d340299d787a8
                                                      • Instruction Fuzzy Hash: F431417260420DAFDB20DFA5C984ABBBBF9EB14354B30942EF616E2150D730AD40DBA0
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 00EE1915
                                                      • PostMessageW.USER32(00000001,00000201,00000001), ref: 00EE19C1
                                                      • Sleep.KERNEL32(00000000,?,?,?), ref: 00EE19C9
                                                      • PostMessageW.USER32(00000001,00000202,00000000), ref: 00EE19DA
                                                      • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00EE19E2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleep$RectWindow
                                                      • String ID:
                                                      • API String ID: 3382505437-0
                                                      • Opcode ID: ef946c687abf766c6ad6dae79ee1efd0e2074da1061c53576325ee1cc213e06c
                                                      • Instruction ID: 9c43fde59a2d1a65aaa38837d0a48be400fb88dde8fe3f08a5ce5783675b09e3
                                                      • Opcode Fuzzy Hash: ef946c687abf766c6ad6dae79ee1efd0e2074da1061c53576325ee1cc213e06c
                                                      • Instruction Fuzzy Hash: 2431D47190025DEFCB00CFA9CD99ADE3BB5EB44315F109265F925A72D2C7709D84DB90
                                                      APIs
                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00F15745
                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 00F1579D
                                                      • _wcslen.LIBCMT ref: 00F157AF
                                                      • _wcslen.LIBCMT ref: 00F157BA
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F15816
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$_wcslen
                                                      • String ID:
                                                      • API String ID: 763830540-0
                                                      • Opcode ID: b25b49115b129b8b6c1c7445430f6eb8aa7a4a9778325ccb69f3e46950f728a6
                                                      • Instruction ID: 5cb43cf0bbcb6e828851a836cffa00459fba9c923b5b748c77ee169b94a5ea4d
                                                      • Opcode Fuzzy Hash: b25b49115b129b8b6c1c7445430f6eb8aa7a4a9778325ccb69f3e46950f728a6
                                                      • Instruction Fuzzy Hash: EF218F71D04618DADB209FA0CC85AEEB7B8FF84B35F108216E929AA1C0D77099C5DF50
                                                      APIs
                                                      • IsWindow.USER32(00000000), ref: 00F00951
                                                      • GetForegroundWindow.USER32 ref: 00F00968
                                                      • GetDC.USER32(00000000), ref: 00F009A4
                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 00F009B0
                                                      • ReleaseDC.USER32(00000000,00000003), ref: 00F009E8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$ForegroundPixelRelease
                                                      • String ID:
                                                      • API String ID: 4156661090-0
                                                      • Opcode ID: eb0996aa485d9b4689e7ff59a0e25023a31cbf0996058aafc1724b90a7967dd6
                                                      • Instruction ID: f4a00f352d517134909fc253ed72e82f5a0927ff484a3cdc6f0d386e59e5b6d7
                                                      • Opcode Fuzzy Hash: eb0996aa485d9b4689e7ff59a0e25023a31cbf0996058aafc1724b90a7967dd6
                                                      • Instruction Fuzzy Hash: 7A218175600208AFD704EF65D884AAEBBE9EF45700F058069F94AA7362CB70AC04DB90
                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32 ref: 00EBCDC6
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00EBCDE9
                                                        • Part of subcall function 00EB3820: RtlAllocateHeap.NTDLL(00000000,?,00F51444,?,00E9FDF5,?,?,00E8A976,00000010,00F51440,00E813FC,?,00E813C6,?,00E81129), ref: 00EB3852
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00EBCE0F
                                                      • _free.LIBCMT ref: 00EBCE22
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00EBCE31
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                      • String ID:
                                                      • API String ID: 336800556-0
                                                      • Opcode ID: c4f53a230355e16dfb2023c0aaad0bd8e6ff2e552f7f6566d5178d5e4399bc5e
                                                      • Instruction ID: ef6518c3d0982f4c5c83d73f18076ec079eb16f854396b8acf1995ae3f05f6ca
                                                      • Opcode Fuzzy Hash: c4f53a230355e16dfb2023c0aaad0bd8e6ff2e552f7f6566d5178d5e4399bc5e
                                                      • Instruction Fuzzy Hash: FC01F772605215BF23211AB66C8CCFB7A6DDEC6BA53255129FD05FB200EA60CD0191F1
                                                      APIs
                                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E99693
                                                      • SelectObject.GDI32(?,00000000), ref: 00E996A2
                                                      • BeginPath.GDI32(?), ref: 00E996B9
                                                      • SelectObject.GDI32(?,00000000), ref: 00E996E2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$BeginCreatePath
                                                      • String ID:
                                                      • API String ID: 3225163088-0
                                                      • Opcode ID: 4c4ecab73376f05def7788b1a6323f9e7679ea52a2bfde24589aaa00f8911894
                                                      • Instruction ID: f057d1776caa9f2667bf977e3fa3cb19ad994d6e6e00111764095a0ef046a451
                                                      • Opcode Fuzzy Hash: 4c4ecab73376f05def7788b1a6323f9e7679ea52a2bfde24589aaa00f8911894
                                                      • Instruction Fuzzy Hash: 4A215070802309EBDF119F68EC187ED3BA9BB5135AF10421AF611B61B2D3706895EB94
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID:
                                                      • API String ID: 2931989736-0
                                                      • Opcode ID: d615334d32ee67e86b7fae1f2dcf59bf280268751d56a07e78891ef08442a522
                                                      • Instruction ID: 1c77cfc27181406fd841567090c8039f86008b8d3f0d62947751726034e7140c
                                                      • Opcode Fuzzy Hash: d615334d32ee67e86b7fae1f2dcf59bf280268751d56a07e78891ef08442a522
                                                      • Instruction Fuzzy Hash: 0601D2A364160DFAD60896129D92EFB739C9B6539CF001022FD04BE241F660FD7892E1
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,?,00EAF2DE,00EB3863,00F51444,?,00E9FDF5,?,?,00E8A976,00000010,00F51440,00E813FC,?,00E813C6), ref: 00EB2DFD
                                                      • _free.LIBCMT ref: 00EB2E32
                                                      • _free.LIBCMT ref: 00EB2E59
                                                      • SetLastError.KERNEL32(00000000,00E81129), ref: 00EB2E66
                                                      • SetLastError.KERNEL32(00000000,00E81129), ref: 00EB2E6F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: d23c7ad032b6bb4fd9ad92d455c74ce38e88553edc21a191d9643c8d4860853b
                                                      • Instruction ID: 5eb13f38501a17367b748f328ebd335f704c64418b6ddf2a34d0f1986b03bf5c
                                                      • Opcode Fuzzy Hash: d23c7ad032b6bb4fd9ad92d455c74ce38e88553edc21a191d9643c8d4860853b
                                                      • Instruction Fuzzy Hash: 3801283624560477C61327766C46DEB36ADAFD57B9B21B42CFB25B21E2EF34CC016060
                                                      APIs
                                                      • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EDFF41,80070057,?,?,?,00EE035E), ref: 00EE002B
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EDFF41,80070057,?,?), ref: 00EE0046
                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EDFF41,80070057,?,?), ref: 00EE0054
                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EDFF41,80070057,?), ref: 00EE0064
                                                      • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00EDFF41,80070057,?,?), ref: 00EE0070
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                      • String ID:
                                                      • API String ID: 3897988419-0
                                                      • Opcode ID: 50af3deb5ef9fd2a8cfc24cf470104a1257aa6930f03df03f010ba538eb78dc6
                                                      • Instruction ID: c317af615e2a2fbb41ea3f78cd61747be8efa5eca071a475745bd1d7e7c2d873
                                                      • Opcode Fuzzy Hash: 50af3deb5ef9fd2a8cfc24cf470104a1257aa6930f03df03f010ba538eb78dc6
                                                      • Instruction Fuzzy Hash: 3D01A27264020CBFDB119F6AEC44BEA7AEDEF44761F159524F905E2210D7B1DD80ABA0
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 00EEE997
                                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 00EEE9A5
                                                      • Sleep.KERNEL32(00000000), ref: 00EEE9AD
                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 00EEE9B7
                                                      • Sleep.KERNEL32 ref: 00EEE9F3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                      • String ID:
                                                      • API String ID: 2833360925-0
                                                      • Opcode ID: 924f4b58e4a0268f67713f419056ed5784b1e70712d6cdd8f4ad041d3f9bc36e
                                                      • Instruction ID: e7888592bf893b2f6740be7c4c9c68cfcee54e37c1d614462949895aafa017f9
                                                      • Opcode Fuzzy Hash: 924f4b58e4a0268f67713f419056ed5784b1e70712d6cdd8f4ad041d3f9bc36e
                                                      • Instruction Fuzzy Hash: 3A016931C4162DEBCF04AFE6DC59AEDBBB8FF48300F015586E502B2242CB319550DBA1
                                                      APIs
                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00EE1114
                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,?,00EE0B9B,?,?,?), ref: 00EE1120
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00EE0B9B,?,?,?), ref: 00EE112F
                                                      • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00EE0B9B,?,?,?), ref: 00EE1136
                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00EE114D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 842720411-0
                                                      • Opcode ID: 914fe0c79364df9f651c1fc4cc51e2d4bc01db1839bf5b0b4cfcc483e0aead57
                                                      • Instruction ID: f3fe1825dc8f82e73eab37e59a91f847fa0bf82931e6f9b5e25555c88432c76c
                                                      • Opcode Fuzzy Hash: 914fe0c79364df9f651c1fc4cc51e2d4bc01db1839bf5b0b4cfcc483e0aead57
                                                      • Instruction Fuzzy Hash: 8901D179140308BFDB010F65DC08EAA3F6EEF85364B124014FA00D3350DB31CC409AA0
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00EE0FCA
                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00EE0FD6
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00EE0FE5
                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00EE0FEC
                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00EE1002
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: d4c03d2025d35acbc03d8ad7f7f1f66e051b4dd1c40cfd4360edb597c6fde294
                                                      • Instruction ID: fa3112e529b00070ea201cf922ddda8be6bcfc78a54b96fecf6808bcb317c57f
                                                      • Opcode Fuzzy Hash: d4c03d2025d35acbc03d8ad7f7f1f66e051b4dd1c40cfd4360edb597c6fde294
                                                      • Instruction Fuzzy Hash: 38F0C239180309FBD7210FA5DC4DF963B6EEF89761F128414F945D7291CA30DC809AA0
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00EE102A
                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00EE1036
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EE1045
                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00EE104C
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EE1062
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: f4a6ac56226f3138956a7205dcd9c99794b51d085aebb4f5c236f88074212331
                                                      • Instruction ID: 0b4228d72b911552c5d80383e33ef571725cffc063a8d25edafd838971f7967b
                                                      • Opcode Fuzzy Hash: f4a6ac56226f3138956a7205dcd9c99794b51d085aebb4f5c236f88074212331
                                                      • Instruction Fuzzy Hash: 89F0C239180309FBD7211FA5EC48F963B6EEF89761F124414F945D7250CA30D8809AA0
                                                      APIs
                                                      • CloseHandle.KERNEL32(?,?,?,?,00EF017D,?,00EF32FC,?,00000001,00EC2592,?), ref: 00EF0324
                                                      • CloseHandle.KERNEL32(?,?,?,?,00EF017D,?,00EF32FC,?,00000001,00EC2592,?), ref: 00EF0331
                                                      • CloseHandle.KERNEL32(?,?,?,?,00EF017D,?,00EF32FC,?,00000001,00EC2592,?), ref: 00EF033E
                                                      • CloseHandle.KERNEL32(?,?,?,?,00EF017D,?,00EF32FC,?,00000001,00EC2592,?), ref: 00EF034B
                                                      • CloseHandle.KERNEL32(?,?,?,?,00EF017D,?,00EF32FC,?,00000001,00EC2592,?), ref: 00EF0358
                                                      • CloseHandle.KERNEL32(?,?,?,?,00EF017D,?,00EF32FC,?,00000001,00EC2592,?), ref: 00EF0365
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: 60450389931351649fd59ee8ab6a1331cae63e6c846c158edd4dab90b42daece
                                                      • Instruction ID: 3376b8dbd0bcd4176b225ed6a871eb16d786a7dfd4d82cd503570a0d4d5dd0b8
                                                      • Opcode Fuzzy Hash: 60450389931351649fd59ee8ab6a1331cae63e6c846c158edd4dab90b42daece
                                                      • Instruction Fuzzy Hash: 7F01A272801B199FC7309F66D880822F7F5BF503193159A3FD29662932C371A954DF80
                                                      APIs
                                                      • _free.LIBCMT ref: 00EBD752
                                                        • Part of subcall function 00EB29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000), ref: 00EB29DE
                                                        • Part of subcall function 00EB29C8: GetLastError.KERNEL32(00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000,00000000), ref: 00EB29F0
                                                      • _free.LIBCMT ref: 00EBD764
                                                      • _free.LIBCMT ref: 00EBD776
                                                      • _free.LIBCMT ref: 00EBD788
                                                      • _free.LIBCMT ref: 00EBD79A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 165a6d931fdcbe3565bfee1b8f3510a866e360bff5006f2f8351a8fd3fd26874
                                                      • Instruction ID: f28d9b7be1d4e68d922f8357fdc61bd5563f03dacf553ee89d149b37444489b3
                                                      • Opcode Fuzzy Hash: 165a6d931fdcbe3565bfee1b8f3510a866e360bff5006f2f8351a8fd3fd26874
                                                      • Instruction Fuzzy Hash: 40F04F32509218BB8661EB64FDC5CD77BDDBF453147942C0AF548F7501DB20FC8086A4
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00EE5C58
                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00EE5C6F
                                                      • MessageBeep.USER32(00000000), ref: 00EE5C87
                                                      • KillTimer.USER32(?,0000040A), ref: 00EE5CA3
                                                      • EndDialog.USER32(?,00000001), ref: 00EE5CBD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                      • String ID:
                                                      • API String ID: 3741023627-0
                                                      • Opcode ID: 1fcea3afd1d01a54884390e153d8521cf1729ac4b621a70125dd08c55b0995b1
                                                      • Instruction ID: 6e0a30ae0333356255b8a5fd3aca4bd0a839869a9b9ccf57cd334edae9c398f1
                                                      • Opcode Fuzzy Hash: 1fcea3afd1d01a54884390e153d8521cf1729ac4b621a70125dd08c55b0995b1
                                                      • Instruction Fuzzy Hash: B101D131540B08ABEB205B11DD5EFE6B7B8BF04B09F052159A287B10E1DBF0A984DF90
                                                      APIs
                                                      • _free.LIBCMT ref: 00EB22BE
                                                        • Part of subcall function 00EB29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000), ref: 00EB29DE
                                                        • Part of subcall function 00EB29C8: GetLastError.KERNEL32(00000000,?,00EBD7D1,00000000,00000000,00000000,00000000,?,00EBD7F8,00000000,00000007,00000000,?,00EBDBF5,00000000,00000000), ref: 00EB29F0
                                                      • _free.LIBCMT ref: 00EB22D0
                                                      • _free.LIBCMT ref: 00EB22E3
                                                      • _free.LIBCMT ref: 00EB22F4
                                                      • _free.LIBCMT ref: 00EB2305
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 68c0ebd25be6cf1d3ae6bc44af18b6eee30c9b24bb204fa0c9d777ec872ece31
                                                      • Instruction ID: f9cc511cc351bb7d6798bac614a8a09ae2ca29a3583ee5a8154e16fbf6f41688
                                                      • Opcode Fuzzy Hash: 68c0ebd25be6cf1d3ae6bc44af18b6eee30c9b24bb204fa0c9d777ec872ece31
                                                      • Instruction Fuzzy Hash: 41F054744013189B8652AF54BC0199A3BE4FB59752B012A0EFB18E2271CB301411BFE5
                                                      APIs
                                                      • EndPath.GDI32(?), ref: 00E995D4
                                                      • StrokeAndFillPath.GDI32(?,?,00ED71F7,00000000,?,?,?), ref: 00E995F0
                                                      • SelectObject.GDI32(?,00000000), ref: 00E99603
                                                      • DeleteObject.GDI32 ref: 00E99616
                                                      • StrokePath.GDI32(?), ref: 00E99631
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                                      • String ID:
                                                      • API String ID: 2625713937-0
                                                      • Opcode ID: ef7a5b2c5c9791d7d0cf750cbe4e419c8e5606db15044bf9b248bc35ae35cf7f
                                                      • Instruction ID: 2a076157f774ca9a6356edebb7380731270c734b5425133c4110b20202158dcb
                                                      • Opcode Fuzzy Hash: ef7a5b2c5c9791d7d0cf750cbe4e419c8e5606db15044bf9b248bc35ae35cf7f
                                                      • Instruction Fuzzy Hash: 16F0373004630CEBDB225F69ED1CBA93B61BB15327F058258F665A50F2C7309995EFA4
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: __freea$_free
                                                      • String ID: a/p$am/pm
                                                      • API String ID: 3432400110-3206640213
                                                      • Opcode ID: dc57967ba496cb9fa87c876900bc4ec708939eb30f216a426589b6743f8f5489
                                                      • Instruction ID: c1d2c26e88aa94980ffe67dfac6bd7d50a295345ee777a766fb4e460deb72057
                                                      • Opcode Fuzzy Hash: dc57967ba496cb9fa87c876900bc4ec708939eb30f216a426589b6743f8f5489
                                                      • Instruction Fuzzy Hash: 2BD11831900206CADB249F68C865BFFB7F1FF05724F992199E601BB650E3759D80CB91
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00EB8B6E
                                                      • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00EB8B7A
                                                      • __dosmaperr.LIBCMT ref: 00EB8B81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                      • String ID: .
                                                      • API String ID: 2434981716-3963672497
                                                      • Opcode ID: 32aea55759372622fc553463aab4a84ca4088e0854476d22e5198de3f90b4c3e
                                                      • Instruction ID: df7c54745d8ebaca2dfe85e899c3d72eb90f90c0a4d8638daaea3d1671e68e3d
                                                      • Opcode Fuzzy Hash: 32aea55759372622fc553463aab4a84ca4088e0854476d22e5198de3f90b4c3e
                                                      • Instruction Fuzzy Hash: 06414B74604145AFD7249F64D9D0AFB7FE9DB85304B28A19AE885A7352DE318C02D790
                                                      APIs
                                                        • Part of subcall function 00EEB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00EE21D0,?,?,00000034,00000800,?,00000034), ref: 00EEB42D
                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00EE2760
                                                        • Part of subcall function 00EEB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00EE21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00EEB3F8
                                                        • Part of subcall function 00EEB32A: GetWindowThreadProcessId.USER32(?,?), ref: 00EEB355
                                                        • Part of subcall function 00EEB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00EE2194,00000034,?,?,00001004,00000000,00000000), ref: 00EEB365
                                                        • Part of subcall function 00EEB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00EE2194,00000034,?,?,00001004,00000000,00000000), ref: 00EEB37B
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00EE27CD
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00EE281A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                      • String ID: @
                                                      • API String ID: 4150878124-2766056989
                                                      • Opcode ID: c3299a7b624988c416c30892a543e1678236bfa3bdd742e97386f8b66a9ef123
                                                      • Instruction ID: 14c6d6f77e3ef91f3ccaf0e9543a6a5c46c8196e902e6350390198c2327c42c8
                                                      • Opcode Fuzzy Hash: c3299a7b624988c416c30892a543e1678236bfa3bdd742e97386f8b66a9ef123
                                                      • Instruction Fuzzy Hash: DA412F7290021CAFDB10DFA5CD46ADEBBB8EF09700F105099FA55B7181DB706E45CBA1
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\nnn.exe,00000104), ref: 00EB1769
                                                      • _free.LIBCMT ref: 00EB1834
                                                      • _free.LIBCMT ref: 00EB183E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _free$FileModuleName
                                                      • String ID: C:\Users\user\Desktop\nnn.exe
                                                      • API String ID: 2506810119-3771354791
                                                      • Opcode ID: 5df6a9ee802949470b924517c9fce4933df882a41a1a91e253f0f0fbd9078310
                                                      • Instruction ID: c34b9d31b4f03b636a5780b2dcf09427660d0a7d24ec7fa907aa102ef9f33f7d
                                                      • Opcode Fuzzy Hash: 5df6a9ee802949470b924517c9fce4933df882a41a1a91e253f0f0fbd9078310
                                                      • Instruction Fuzzy Hash: B8319F71A00218ABDB21DB999885EDFBBFCFF85320F5051AAF904E7211DA709A40DB90
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00EEC306
                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 00EEC34C
                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00F51990,017254B8), ref: 00EEC395
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Menu$Delete$InfoItem
                                                      • String ID: 0
                                                      • API String ID: 135850232-4108050209
                                                      • Opcode ID: b07a151fd8af8519277f928f727d93dbf5420e51a43ebd25734a789ea7714b83
                                                      • Instruction ID: 76fa497f68d7079874aa8b79d36d67cdf338e29614be13c3c0309db23efa43ed
                                                      • Opcode Fuzzy Hash: b07a151fd8af8519277f928f727d93dbf5420e51a43ebd25734a789ea7714b83
                                                      • Instruction Fuzzy Hash: E341E3312043859FD720DF26D844F5ABBE8AF85314F24966DF9A5A72D2C730E805CB62
                                                      APIs
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00F1CC08,00000000,?,?,?,?), ref: 00F144AA
                                                      • GetWindowLongW.USER32 ref: 00F144C7
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F144D7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$Long
                                                      • String ID: SysTreeView32
                                                      • API String ID: 847901565-1698111956
                                                      • Opcode ID: b21de93615a3f6497cd43ece17677f0e7c7dde2e01c8db2bab3b0da5290bd017
                                                      • Instruction ID: 52f3ba7f47aa1436409d3d681819c39c0456dccc901811cbca41e9ff3b94bfdb
                                                      • Opcode Fuzzy Hash: b21de93615a3f6497cd43ece17677f0e7c7dde2e01c8db2bab3b0da5290bd017
                                                      • Instruction Fuzzy Hash: CC31AF31610205AFDF209E38DC45BDA7BA9EB48334F254315F979A31D0D771EC90AB50
                                                      APIs
                                                      • SysReAllocString.OLEAUT32(?,?), ref: 00EE6EED
                                                      • VariantCopyInd.OLEAUT32(?,?), ref: 00EE6F08
                                                      • VariantClear.OLEAUT32(?), ref: 00EE6F12
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Variant$AllocClearCopyString
                                                      • String ID: *j
                                                      • API String ID: 2173805711-1845181700
                                                      • Opcode ID: 938d3c73fb4081564cd84bb1ddf2718c6055481939f13202dae1c06711b45a7c
                                                      • Instruction ID: 91c2de3dacfa72adfec1524abc3805e5221fcd465731a5212a13c821bd54fe4b
                                                      • Opcode Fuzzy Hash: 938d3c73fb4081564cd84bb1ddf2718c6055481939f13202dae1c06711b45a7c
                                                      • Instruction Fuzzy Hash: 6431B171708299DFCB04EFA5E8909FD37B6FFA5344B101498F8066B2A1CB309912DBD0
                                                      APIs
                                                        • Part of subcall function 00F0335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00F03077,?,?), ref: 00F03378
                                                      • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F0307A
                                                      • _wcslen.LIBCMT ref: 00F0309B
                                                      • htons.WSOCK32(00000000,?,?,00000000), ref: 00F03106
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                      • String ID: 255.255.255.255
                                                      • API String ID: 946324512-2422070025
                                                      • Opcode ID: 728429a04a20bf207a423b8af3bb0e8e701f51e17d08ccdc3f4e3e8ad9687f4e
                                                      • Instruction ID: e4de6c6174fdb2a76a2cb79be05be17ee02697a2405bdd599342bbb4e7791271
                                                      • Opcode Fuzzy Hash: 728429a04a20bf207a423b8af3bb0e8e701f51e17d08ccdc3f4e3e8ad9687f4e
                                                      • Instruction Fuzzy Hash: DA31E735A04205DFCB10CF28C585EAA77E8EF54328F258059E8159B3D2D772EE45F761
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00F13F40
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00F13F54
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F13F78
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window
                                                      • String ID: SysMonthCal32
                                                      • API String ID: 2326795674-1439706946
                                                      • Opcode ID: ea2d689f29535d9d54b103a808f04b97b84954bb56cf4d8c0be3791c3388d781
                                                      • Instruction ID: 536bf78137ab55012fd36e764e381c207b4cd0221cfb5b069e279ec9130ffa35
                                                      • Opcode Fuzzy Hash: ea2d689f29535d9d54b103a808f04b97b84954bb56cf4d8c0be3791c3388d781
                                                      • Instruction Fuzzy Hash: 0921BF32A00219BFDF259F50CC46FEA3B75EB48724F110214FA197B1D0D6B1A895EB90
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00F14705
                                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00F14713
                                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00F1471A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$DestroyWindow
                                                      • String ID: msctls_updown32
                                                      • API String ID: 4014797782-2298589950
                                                      • Opcode ID: b50fe182dbe659a0f97ca10810efc31b9f742706a4c113fe7390cb35f0be6f4c
                                                      • Instruction ID: 068b5aabf4ece2595e26a5e3af8c9ee09667ef1827ce8b4a2fc81939775ee1f6
                                                      • Opcode Fuzzy Hash: b50fe182dbe659a0f97ca10810efc31b9f742706a4c113fe7390cb35f0be6f4c
                                                      • Instruction Fuzzy Hash: 6B2160B5600208AFEB11DF64DCC1DA737EDEB9A7A4B140059FA049B291CB71FC51EB60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                      • API String ID: 176396367-2734436370
                                                      • Opcode ID: 1c2344fe43ffbbeaa446bf69604acaa4968a29d5c78be0c2da871d2db2ed1ae4
                                                      • Instruction ID: 79d12625038d8fbaae03eded12b79c8a1ae5c59c8e9f961edfa9ea8472df6b14
                                                      • Opcode Fuzzy Hash: 1c2344fe43ffbbeaa446bf69604acaa4968a29d5c78be0c2da871d2db2ed1ae4
                                                      • Instruction Fuzzy Hash: 7C218B72204696A6C331BB269C02FFB73E89F95304F106427F949BB083EB51ED85C3A1
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00F13840
                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00F13850
                                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00F13876
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MoveWindow
                                                      • String ID: Listbox
                                                      • API String ID: 3315199576-2633736733
                                                      • Opcode ID: b8639a02e3d57be488092afe7e0a86590a8b05eb5c6bd34a1f59ad655b99321a
                                                      • Instruction ID: 6d72a87f726a8a995fa3398c1d1a9f015b4b40ef8f3861e49ba887ac6c2872e6
                                                      • Opcode Fuzzy Hash: b8639a02e3d57be488092afe7e0a86590a8b05eb5c6bd34a1f59ad655b99321a
                                                      • Instruction Fuzzy Hash: E0219272A14218BBEF219F54DC45FFB376EEF89760F118124F9049B190C675DC92A7A0
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00EF4A08
                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00EF4A5C
                                                      • SetErrorMode.KERNEL32(00000000,?,?,00F1CC08), ref: 00EF4AD0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$InformationVolume
                                                      • String ID: %lu
                                                      • API String ID: 2507767853-685833217
                                                      • Opcode ID: 794e4aedf737ad0dfa295492ca26009987290e831157622e67237ae753479fb6
                                                      • Instruction ID: cc97321c52c6226d41ec9ac6b560e97d11ba2619a159f88a8be6edc5a9d25226
                                                      • Opcode Fuzzy Hash: 794e4aedf737ad0dfa295492ca26009987290e831157622e67237ae753479fb6
                                                      • Instruction Fuzzy Hash: 74318575A40109AFDB10DF54C885EBA7BF8EF05308F148099F909EB252D771ED45CBA1
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00F1424F
                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00F14264
                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00F14271
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: msctls_trackbar32
                                                      • API String ID: 3850602802-1010561917
                                                      • Opcode ID: 66842b70543a4fe48206a46b767fdfefabab3353ba377633417ddf562e6b6816
                                                      • Instruction ID: 5daec33638e5d281114f7bd988d1571bd14669899e1dfb57a40a7cd417b12c22
                                                      • Opcode Fuzzy Hash: 66842b70543a4fe48206a46b767fdfefabab3353ba377633417ddf562e6b6816
                                                      • Instruction Fuzzy Hash: E6110631640248BEEF205F29CC06FEB3BACEFD5B64F110114FA55E2090D271EC91AB10
                                                      APIs
                                                        • Part of subcall function 00E86B57: _wcslen.LIBCMT ref: 00E86B6A
                                                        • Part of subcall function 00EE2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00EE2DC5
                                                        • Part of subcall function 00EE2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00EE2DD6
                                                        • Part of subcall function 00EE2DA7: GetCurrentThreadId.KERNEL32 ref: 00EE2DDD
                                                        • Part of subcall function 00EE2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00EE2DE4
                                                      • GetFocus.USER32 ref: 00EE2F78
                                                        • Part of subcall function 00EE2DEE: GetParent.USER32(00000000), ref: 00EE2DF9
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00EE2FC3
                                                      • EnumChildWindows.USER32(?,00EE303B), ref: 00EE2FEB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                      • String ID: %s%d
                                                      • API String ID: 1272988791-1110647743
                                                      • Opcode ID: 758e08fc9a89e7229a282cd4cd16d107f70b2fcc420368ba1a68c364b5208e9f
                                                      • Instruction ID: 4a874baa2bd35a6b4c3327a3fe8e66fbe42b00a2941b6c8a0925899fc9d7fc3e
                                                      • Opcode Fuzzy Hash: 758e08fc9a89e7229a282cd4cd16d107f70b2fcc420368ba1a68c364b5208e9f
                                                      • Instruction Fuzzy Hash: F711B7756002496BCF147F718C89EED77AAAF94318F049079FA0DBB252DE3099459B60
                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00F158C1
                                                      • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00F158EE
                                                      • DrawMenuBar.USER32(?), ref: 00F158FD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Menu$InfoItem$Draw
                                                      • String ID: 0
                                                      • API String ID: 3227129158-4108050209
                                                      • Opcode ID: c6be9435bfc0bef7dcaae662f23904823b5b7097eea181af5eece77eb61a6671
                                                      • Instruction ID: 6241660ca2b519e4c092a6c6818b4ff7fadaaec7e9d1013c98a26ee92464f2b4
                                                      • Opcode Fuzzy Hash: c6be9435bfc0bef7dcaae662f23904823b5b7097eea181af5eece77eb61a6671
                                                      • Instruction Fuzzy Hash: D2016D32500218EFDB219F11DC44BEEBBB9FB85760F148099E849D6151DB308AC4EF62
                                                      APIs
                                                      • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00EDD3BF
                                                      • FreeLibrary.KERNEL32 ref: 00EDD3E5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeLibraryProc
                                                      • String ID: GetSystemWow64DirectoryW$X64
                                                      • API String ID: 3013587201-2590602151
                                                      • Opcode ID: 3ff562fc48cf142836d19ab786144dfede0505a1aef5f22584692a0ef032837f
                                                      • Instruction ID: 25249b3b2fd4db5e1726f8f84903397c3c8b556ac02147c6b462ae118e7f9fd0
                                                      • Opcode Fuzzy Hash: 3ff562fc48cf142836d19ab786144dfede0505a1aef5f22584692a0ef032837f
                                                      • Instruction Fuzzy Hash: 70F02B318CD621EBDB7516108C64EE97324EF10705F5AB56BFC02F2315E720CD86A6D2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bcf875f035842e1fe8c32e0c037b783c869980f6f4d0589949335bceb0bf5261
                                                      • Instruction ID: 422b0ff8e81a640b5ae0819a801a44d96df48af9712c6595ff1785831b7eb0d8
                                                      • Opcode Fuzzy Hash: bcf875f035842e1fe8c32e0c037b783c869980f6f4d0589949335bceb0bf5261
                                                      • Instruction Fuzzy Hash: 2DC16B75A0024AEFDB14CFA5C894EAEB7B5FF48304F209598E505EB251D771EE81CB90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInitInitializeUninitialize
                                                      • String ID:
                                                      • API String ID: 1998397398-0
                                                      • Opcode ID: a77818e6f5a09e3307a33bed7b00686285a83c18adf9536e60f2a89998745be4
                                                      • Instruction ID: 059c44219a7594832bc00f4a6ccac819a997449372cde660ad7d6a59882aee84
                                                      • Opcode Fuzzy Hash: a77818e6f5a09e3307a33bed7b00686285a83c18adf9536e60f2a89998745be4
                                                      • Instruction Fuzzy Hash: 61A14F756043019FC710EF24C485A2AB7E9FF89714F148859F999AB3A2DB31ED01DB51
                                                      APIs
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00F1FC08,?), ref: 00EE05F0
                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00F1FC08,?), ref: 00EE0608
                                                      • CLSIDFromProgID.OLE32(?,?,00000000,00F1CC40,000000FF,?,00000000,00000800,00000000,?,00F1FC08,?), ref: 00EE062D
                                                      • _memcmp.LIBVCRUNTIME ref: 00EE064E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: FromProg$FreeTask_memcmp
                                                      • String ID:
                                                      • API String ID: 314563124-0
                                                      • Opcode ID: 6855709527d1878755104cfb8b14126fa30a9a935d33a15fa35a03afa2033daa
                                                      • Instruction ID: 6934dbbf17f06018e19bfe838d0380f0b6fe40c4a2a5e955d74438a30084d824
                                                      • Opcode Fuzzy Hash: 6855709527d1878755104cfb8b14126fa30a9a935d33a15fa35a03afa2033daa
                                                      • Instruction Fuzzy Hash: 3D810971A0010AEFCB04DF94C984EEEB7B9FF89315F205558E516BB250DB71AE46CBA0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: bd281f55aee7acb5e9e00849ac9bba97be804954bd0ffea08ea838d7dbdafeed
                                                      • Instruction ID: 61665c490442227b7884e0f065ee1abd6d82ddcb5d134ca824dfdab4f16032b5
                                                      • Opcode Fuzzy Hash: bd281f55aee7acb5e9e00849ac9bba97be804954bd0ffea08ea838d7dbdafeed
                                                      • Instruction Fuzzy Hash: 1C412A31500100AADB296BF88D45FEE3AE5FF47374F1462ADF829F6293E63648425261
                                                      APIs
                                                      • GetWindowRect.USER32(0172E8E0,?), ref: 00F162E2
                                                      • ScreenToClient.USER32(?,?), ref: 00F16315
                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00F16382
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientMoveRectScreen
                                                      • String ID:
                                                      • API String ID: 3880355969-0
                                                      • Opcode ID: 958e087ce0d41a30be4852daea3e73d1aa4380e2bea12548b0242c8470b9172e
                                                      • Instruction ID: 2273d28715747dbad9e4f3d9fb8d9d25963457038195e74ad6a20fa1d4e9ea72
                                                      • Opcode Fuzzy Hash: 958e087ce0d41a30be4852daea3e73d1aa4380e2bea12548b0242c8470b9172e
                                                      • Instruction Fuzzy Hash: ED512974A00249AFDF14DF68D880AEE7BB5FB45360F108169F925DB2A0D770ED81EB90
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00F01AFD
                                                      • WSAGetLastError.WSOCK32 ref: 00F01B0B
                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00F01B8A
                                                      • WSAGetLastError.WSOCK32 ref: 00F01B94
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$socket
                                                      • String ID:
                                                      • API String ID: 1881357543-0
                                                      • Opcode ID: 32ee1bd559ee091309886e006bcb27b899b1acc3bbe2b1d67ed94cce90788fd9
                                                      • Instruction ID: c11673be1ccb46cba034390742a08b4f2964ff309b40fb03a3dfa744bb32ff03
                                                      • Opcode Fuzzy Hash: 32ee1bd559ee091309886e006bcb27b899b1acc3bbe2b1d67ed94cce90788fd9
                                                      • Instruction Fuzzy Hash: 4941B274640200AFEB20AF24C886F6977E5AF84718F54D488FA1AAF7D2D772DD41DB90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9739a614e682005f893c8f5fd1ee1a1fb8d15371de6a3568eb6a8f85ff7bdbc1
                                                      • Instruction ID: f71e6b8f2ea340793ae57eee59f7d8d0216c930fbcb09e61f94734ab23c42fd9
                                                      • Opcode Fuzzy Hash: 9739a614e682005f893c8f5fd1ee1a1fb8d15371de6a3568eb6a8f85ff7bdbc1
                                                      • Instruction Fuzzy Hash: 5E412871A00714AFD7249F78CC41BEBBBE9EF89710F10566EF151EB292E7B1A9018790
                                                      APIs
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00EF5783
                                                      • GetLastError.KERNEL32(?,00000000), ref: 00EF57A9
                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00EF57CE
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00EF57FA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                      • String ID:
                                                      • API String ID: 3321077145-0
                                                      • Opcode ID: 4adfefa824aa020f17a701aa3011f81796561b71aa81055d1b5d227f57009ae2
                                                      • Instruction ID: b92d1a2c4fc02383badd263a9a62d8c23b0d0a715a52f0779d56b33c564eae1c
                                                      • Opcode Fuzzy Hash: 4adfefa824aa020f17a701aa3011f81796561b71aa81055d1b5d227f57009ae2
                                                      • Instruction Fuzzy Hash: D1412B39600654DFCB11EF15C444A5EBBE2AF89724B19D498EA5EAB362CB30FD40CB91
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00EA82D9,?,00EA82D9,?,00000001,?,?,00000001,00EA82D9,00EA82D9), ref: 00EBD910
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00EBD999
                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00EBD9AB
                                                      • __freea.LIBCMT ref: 00EBD9B4
                                                        • Part of subcall function 00EB3820: RtlAllocateHeap.NTDLL(00000000,?,00F51444,?,00E9FDF5,?,?,00E8A976,00000010,00F51440,00E813FC,?,00E813C6,?,00E81129), ref: 00EB3852
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                      • String ID:
                                                      • API String ID: 2652629310-0
                                                      • Opcode ID: 078a28f19451c3425de94234e829cae7bd06271845305c27342ab9d09cbd230d
                                                      • Instruction ID: 188a5191824f86fb7547bce7adb0df0cee26fdee329192d6581a9171feac039d
                                                      • Opcode Fuzzy Hash: 078a28f19451c3425de94234e829cae7bd06271845305c27342ab9d09cbd230d
                                                      • Instruction Fuzzy Hash: 5131AB72A0020AABDF289F65DC41EEF7BA5EB81714F054168FC04EA290EB75DD54CBA0
                                                      APIs
                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00F15352
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F15375
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F15382
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F153A8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$InvalidateMessageRectSend
                                                      • String ID:
                                                      • API String ID: 3340791633-0
                                                      • Opcode ID: d4d113b2e134b80f64c5a798d5e5dc0145c100e9649eed64020fa1d78ec93596
                                                      • Instruction ID: 4e7ab216a5f996dbe93eb4c5f8ef6518a62ce3266865bbaf02e1f1bc90b17fd8
                                                      • Opcode Fuzzy Hash: d4d113b2e134b80f64c5a798d5e5dc0145c100e9649eed64020fa1d78ec93596
                                                      • Instruction Fuzzy Hash: 8831C435E55A0CEFEB349E54CC15BE83767AB84BA0F584106FA24971E1C7B1ADC0BB41
                                                      APIs
                                                      • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00EEABF1
                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 00EEAC0D
                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 00EEAC74
                                                      • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00EEACC6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: e67cf3bb54fb0488cac4f7069c4ec0ff89bef7cded830ef151388320628a7b45
                                                      • Instruction ID: 2451d05a732cf722efaf123722c1ade529aa7ee806587d901a889faa74140c5f
                                                      • Opcode Fuzzy Hash: e67cf3bb54fb0488cac4f7069c4ec0ff89bef7cded830ef151388320628a7b45
                                                      • Instruction Fuzzy Hash: 32312A30A4039C6FEF34CB668C047FAFBA5AB85314F2C622EE485721D1C375A9859792
                                                      APIs
                                                      • ClientToScreen.USER32(?,?), ref: 00F1769A
                                                      • GetWindowRect.USER32(?,?), ref: 00F17710
                                                      • PtInRect.USER32(?,?,00F18B89), ref: 00F17720
                                                      • MessageBeep.USER32(00000000), ref: 00F1778C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                      • String ID:
                                                      • API String ID: 1352109105-0
                                                      • Opcode ID: 27b982ec435353934ec7deff76445c0a3d149b64aff898e698b31673a6c6010e
                                                      • Instruction ID: cb72e16f0dc677fbf0bd07e3d9bf15d28472499780b0fe35f467528fa3865c81
                                                      • Opcode Fuzzy Hash: 27b982ec435353934ec7deff76445c0a3d149b64aff898e698b31673a6c6010e
                                                      • Instruction Fuzzy Hash: 73417E35A053189FDB01EF59C894FE9BBF5BB49314F1581A8E5189B2A1C730A981EF90
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 00F116EB
                                                        • Part of subcall function 00EE3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00EE3A57
                                                        • Part of subcall function 00EE3A3D: GetCurrentThreadId.KERNEL32 ref: 00EE3A5E
                                                        • Part of subcall function 00EE3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00EE25B3), ref: 00EE3A65
                                                      • GetCaretPos.USER32(?), ref: 00F116FF
                                                      • ClientToScreen.USER32(00000000,?), ref: 00F1174C
                                                      • GetForegroundWindow.USER32 ref: 00F11752
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                      • String ID:
                                                      • API String ID: 2759813231-0
                                                      • Opcode ID: 0c418e968ddaa48320b64bc624393f127460b240dc64ae5410e0eb97ad601187
                                                      • Instruction ID: efe26b5ec941fb38c0228bf6e5327c25e67412af95d4b1b95bbab39eaaaf8986
                                                      • Opcode Fuzzy Hash: 0c418e968ddaa48320b64bc624393f127460b240dc64ae5410e0eb97ad601187
                                                      • Instruction Fuzzy Hash: 84316F71E00149AFDB00EFA9C881CEEBBF9EF48304B6490A9E519E7251D731DE45CBA0
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00EED501
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00EED50F
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00EED52F
                                                      • CloseHandle.KERNEL32(00000000), ref: 00EED5DC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 420147892-0
                                                      • Opcode ID: a1c48659411ee051a98f662060424a113d67e0e9670ecfb5c16109a43a21192c
                                                      • Instruction ID: b2fdf799b3083ce451d3601dab81853e3caa3b1a0dc56cca6c2aea0175c12b33
                                                      • Opcode Fuzzy Hash: a1c48659411ee051a98f662060424a113d67e0e9670ecfb5c16109a43a21192c
                                                      • Instruction Fuzzy Hash: 2931AF310083449FD304EF54CC85ABFBBF8EF99344F14092DF589A21A2EB719948CB92
                                                      APIs
                                                        • Part of subcall function 00E99BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E99BB2
                                                      • GetCursorPos.USER32(?), ref: 00F19001
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00ED7711,?,?,?,?,?), ref: 00F19016
                                                      • GetCursorPos.USER32(?), ref: 00F1905E
                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00ED7711,?,?,?), ref: 00F19094
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                      • String ID:
                                                      • API String ID: 2864067406-0
                                                      • Opcode ID: a2d7ac685e38b3b352603b3f11af77395615da72d75771e9e3a3614d7bb0050b
                                                      • Instruction ID: 2f4584668dca944b6820a170f7dbfbc0ea8f2cc8bcd68a83c059714357eaa1c6
                                                      • Opcode Fuzzy Hash: a2d7ac685e38b3b352603b3f11af77395615da72d75771e9e3a3614d7bb0050b
                                                      • Instruction Fuzzy Hash: 32218035A00118AFDB25CFA5C868FEA7BB9FB49361F044065F90557261C371AD90FBA0
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?,00F1CB68), ref: 00EED2FB
                                                      • GetLastError.KERNEL32 ref: 00EED30A
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00EED319
                                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00F1CB68), ref: 00EED376
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                                      • String ID:
                                                      • API String ID: 2267087916-0
                                                      • Opcode ID: 2e3a6f9078da8bdfe6cf7cdcac1fc0b4f1d14d0ed27267a3df5e4ba5741356ab
                                                      • Instruction ID: dbae974abfbf6cd560fc85c35cf99fcffb4adf10a6ee8b25ea7a9baca61515bb
                                                      • Opcode Fuzzy Hash: 2e3a6f9078da8bdfe6cf7cdcac1fc0b4f1d14d0ed27267a3df5e4ba5741356ab
                                                      • Instruction Fuzzy Hash: 5C21A1745482459F8310EF29CC818AEB7E4EE5A328F105A1DF499E72E1D731D945CB93
                                                      APIs
                                                        • Part of subcall function 00EE1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00EE102A
                                                        • Part of subcall function 00EE1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00EE1036
                                                        • Part of subcall function 00EE1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EE1045
                                                        • Part of subcall function 00EE1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00EE104C
                                                        • Part of subcall function 00EE1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EE1062
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00EE15BE
                                                      • _memcmp.LIBVCRUNTIME ref: 00EE15E1
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EE1617
                                                      • HeapFree.KERNEL32(00000000), ref: 00EE161E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                      • String ID:
                                                      • API String ID: 1592001646-0
                                                      • Opcode ID: e61c7594c72009b40d12d89ad5c477c5cf371bde8b93b8e0c30e8ca29254e5d8
                                                      • Instruction ID: 84fb9ca719b468c1c0fac546f2d2e7e7d2ef2306150f7efc9166af6c1393f1e7
                                                      • Opcode Fuzzy Hash: e61c7594c72009b40d12d89ad5c477c5cf371bde8b93b8e0c30e8ca29254e5d8
                                                      • Instruction Fuzzy Hash: BC218E31E40109EFDF00DFA6C945BEEB7B8EF44354F099499E445BB241E730AA45DB90
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00F1280A
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00F12824
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00F12832
                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00F12840
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$AttributesLayered
                                                      • String ID:
                                                      • API String ID: 2169480361-0
                                                      • Opcode ID: 97ca78cd34df33f997bc12a27992d0b336850b3fe8d6a7c3da27fd10b6468522
                                                      • Instruction ID: 785ccd2bad7e075b0421f15bdfc14022064d879b37aa0000f45fb9800e5ee992
                                                      • Opcode Fuzzy Hash: 97ca78cd34df33f997bc12a27992d0b336850b3fe8d6a7c3da27fd10b6468522
                                                      • Instruction Fuzzy Hash: 78210331604114AFD7149B64CC44FEA7B9AEF45324F198158F42A8B2E2CB75FC92DBD0
                                                      APIs
                                                        • Part of subcall function 00EE8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00EE790A,?,000000FF,?,00EE8754,00000000,?,0000001C,?,?), ref: 00EE8D8C
                                                        • Part of subcall function 00EE8D7D: lstrcpyW.KERNEL32(00000000,?,?,00EE790A,?,000000FF,?,00EE8754,00000000,?,0000001C,?,?,00000000), ref: 00EE8DB2
                                                        • Part of subcall function 00EE8D7D: lstrcmpiW.KERNEL32(00000000,?,00EE790A,?,000000FF,?,00EE8754,00000000,?,0000001C,?,?), ref: 00EE8DE3
                                                      • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00EE8754,00000000,?,0000001C,?,?,00000000), ref: 00EE7923
                                                      • lstrcpyW.KERNEL32(00000000,?,?,00EE8754,00000000,?,0000001C,?,?,00000000), ref: 00EE7949
                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,00EE8754,00000000,?,0000001C,?,?,00000000), ref: 00EE7984
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: lstrcmpilstrcpylstrlen
                                                      • String ID: cdecl
                                                      • API String ID: 4031866154-3896280584
                                                      • Opcode ID: 1857df898e492be908a83ea390459f5b36e0f2a96d308f0972c678bcb7adf2d8
                                                      • Instruction ID: 8a4f561b3d343929d49c5365e23ebe98ed362204f6a25ce3a32d7b64be9d8dca
                                                      • Opcode Fuzzy Hash: 1857df898e492be908a83ea390459f5b36e0f2a96d308f0972c678bcb7adf2d8
                                                      • Instruction Fuzzy Hash: 2711293A200389ABCB155F35DC44E7A77E9FF85354B11902AF886D7265EB32D801D791
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00F17D0B
                                                      • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00F17D2A
                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00F17D42
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00EFB7AD,00000000), ref: 00F17D6B
                                                        • Part of subcall function 00E99BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E99BB2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$Long
                                                      • String ID:
                                                      • API String ID: 847901565-0
                                                      • Opcode ID: 8a3d7c369d5fb5fdf2f95066d7604faab2b1bdccfb88bfbbeee1a5e2613799c9
                                                      • Instruction ID: ade470fd91f9c26888bc3bb2eded90a97c16a74ec3f215eec0af830f36298cf4
                                                      • Opcode Fuzzy Hash: 8a3d7c369d5fb5fdf2f95066d7604faab2b1bdccfb88bfbbeee1a5e2613799c9
                                                      • Instruction Fuzzy Hash: 7D11C032604718AFCB10AF28DC04AE63BA5BF45375B158724F939D72F0D7309991EB80
                                                      APIs
                                                      • SendMessageW.USER32(?,00001060,?,00000004), ref: 00F156BB
                                                      • _wcslen.LIBCMT ref: 00F156CD
                                                      • _wcslen.LIBCMT ref: 00F156D8
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F15816
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend_wcslen
                                                      • String ID:
                                                      • API String ID: 455545452-0
                                                      • Opcode ID: e64ac3bc59e9cf7a8323e4b295e8fac6091f8b92197ef27747c499aee8e4ba50
                                                      • Instruction ID: 5b1387672ce0836cf80a79ced7c3562f31502839b0f3febf881f6371ead7ea50
                                                      • Opcode Fuzzy Hash: e64ac3bc59e9cf7a8323e4b295e8fac6091f8b92197ef27747c499aee8e4ba50
                                                      • Instruction Fuzzy Hash: 38110672A00609D6DF20DF61CC81AEE77ACEF95B74F504026F905D6081E770D9C4EBA0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ea6eb4871bc45d43f62759eea1c325be27c5c236583c38581962b673572785ed
                                                      • Instruction ID: 4bb58f5e53b1f6a28db80564c666ddfa0010aad2e1074fd90af741d7c3c1eeab
                                                      • Opcode Fuzzy Hash: ea6eb4871bc45d43f62759eea1c325be27c5c236583c38581962b673572785ed
                                                      • Instruction Fuzzy Hash: C901D1B220A71A7EF62126786CD0FE7665CDF817BAF71236AF621B11D2DB60CC005170
                                                      APIs
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00EE1A47
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00EE1A59
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00EE1A6F
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00EE1A8A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: e8458578bff4c0d02f341ed023a363ed220c9d8f448fbc6ec00cbd9f31fd7881
                                                      • Instruction ID: 5abddd354d64ec08bc4d07f5e3519d71ffe37cc5f92bae33b9900bec6c367070
                                                      • Opcode Fuzzy Hash: e8458578bff4c0d02f341ed023a363ed220c9d8f448fbc6ec00cbd9f31fd7881
                                                      • Instruction Fuzzy Hash: 6411393AD01219FFEB10DBA5CD85FADBB78EB08750F2000A1EA04B7290D6716E90DB94
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00EEE1FD
                                                      • MessageBoxW.USER32(?,?,?,?), ref: 00EEE230
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00EEE246
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00EEE24D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                      • String ID:
                                                      • API String ID: 2880819207-0
                                                      • Opcode ID: 18dea5b8bd84c964ff53c0abe86d9c7f4ea9445c841a4a6979e04d69e52a8d74
                                                      • Instruction ID: 3677ff9e5816c609f8665c3316ea0f4424cbc048425b18c45559f774b0b79f0c
                                                      • Opcode Fuzzy Hash: 18dea5b8bd84c964ff53c0abe86d9c7f4ea9445c841a4a6979e04d69e52a8d74
                                                      • Instruction Fuzzy Hash: 7911087690435CBBC7019FA9AC05BDE7FACAB4A315F008215FA24F3390D2B0DD0497A0
                                                      APIs
                                                      • CreateThread.KERNEL32(00000000,?,00EACFF9,00000000,00000004,00000000), ref: 00EAD218
                                                      • GetLastError.KERNEL32 ref: 00EAD224
                                                      • __dosmaperr.LIBCMT ref: 00EAD22B
                                                      • ResumeThread.KERNEL32(00000000), ref: 00EAD249
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                      • String ID:
                                                      • API String ID: 173952441-0
                                                      • Opcode ID: a683300a6ac407c6a291c6fe9e4e36c5d8f1a3c5967c6601dfbd58c13f602fed
                                                      • Instruction ID: ccf7ae5ef13e857f3d72857207330d6fd625219843e3b03fcb7a115017d45ce6
                                                      • Opcode Fuzzy Hash: a683300a6ac407c6a291c6fe9e4e36c5d8f1a3c5967c6601dfbd58c13f602fed
                                                      • Instruction Fuzzy Hash: EE010876409108BBC7115BA5DC05BAA7A99DF8B330F105219F926BA0E0CB70A800C6B0
                                                      APIs
                                                        • Part of subcall function 00E99BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E99BB2
                                                      • GetClientRect.USER32(?,?), ref: 00F19F31
                                                      • GetCursorPos.USER32(?), ref: 00F19F3B
                                                      • ScreenToClient.USER32(?,?), ref: 00F19F46
                                                      • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00F19F7A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Client$CursorLongProcRectScreenWindow
                                                      • String ID:
                                                      • API String ID: 4127811313-0
                                                      • Opcode ID: 15df21134d517df35c306c2160f170576388e1e14d629004ec0748efa696d877
                                                      • Instruction ID: 85ea5d9d7ce9be1a865d4e8c9a279d888df6c484e6f5c322e21f2bbc86f4f611
                                                      • Opcode Fuzzy Hash: 15df21134d517df35c306c2160f170576388e1e14d629004ec0748efa696d877
                                                      • Instruction Fuzzy Hash: AB11333290421ABBDB10EFA8C8999EE77B9FB05321F004455F911E3141D3B4BA82EBE1
                                                      APIs
                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00E8604C
                                                      • GetStockObject.GDI32(00000011), ref: 00E86060
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E8606A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CreateMessageObjectSendStockWindow
                                                      • String ID:
                                                      • API String ID: 3970641297-0
                                                      • Opcode ID: 3275e6093f68b1fb18f682e3e5a6143928f986588410b03581c41c67292171ce
                                                      • Instruction ID: 3ca37400110e4a5d5696e9e5160cfa489887569780892c7e9872214bf0f298b0
                                                      • Opcode Fuzzy Hash: 3275e6093f68b1fb18f682e3e5a6143928f986588410b03581c41c67292171ce
                                                      • Instruction Fuzzy Hash: 8211AD7210150CBFEF225FA48C54EEABB69FF083A8F015205FA0866150C732DC60EBA0
                                                      APIs
                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 00EA3B56
                                                        • Part of subcall function 00EA3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00EA3AD2
                                                        • Part of subcall function 00EA3AA3: ___AdjustPointer.LIBCMT ref: 00EA3AED
                                                      • _UnwindNestedFrames.LIBCMT ref: 00EA3B6B
                                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00EA3B7C
                                                      • CallCatchBlock.LIBVCRUNTIME ref: 00EA3BA4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                      • String ID:
                                                      • API String ID: 737400349-0
                                                      • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                      • Instruction ID: aced855509fe34021b5ebc2758200dfd440bc381eb152b1439bbc9d61a48e809
                                                      • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                      • Instruction Fuzzy Hash: 0E012D72100148BBDF115EA5DC42EEB7FAAEF8E754F045014FE586A121C772E961DBA0
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00E813C6,00000000,00000000,?,00EB301A,00E813C6,00000000,00000000,00000000,?,00EB328B,00000006,FlsSetValue), ref: 00EB30A5
                                                      • GetLastError.KERNEL32(?,00EB301A,00E813C6,00000000,00000000,00000000,?,00EB328B,00000006,FlsSetValue,00F22290,FlsSetValue,00000000,00000364,?,00EB2E46), ref: 00EB30B1
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00EB301A,00E813C6,00000000,00000000,00000000,?,00EB328B,00000006,FlsSetValue,00F22290,FlsSetValue,00000000), ref: 00EB30BF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3177248105-0
                                                      • Opcode ID: 25b63cc8c5d96c9d247592402890c4033f3100de8ed497a41acf60989c3c66cb
                                                      • Instruction ID: 5128057b5c68b63a735d8ca15ea0f461fc26a78923802421b9a0058200c5e58e
                                                      • Opcode Fuzzy Hash: 25b63cc8c5d96c9d247592402890c4033f3100de8ed497a41acf60989c3c66cb
                                                      • Instruction Fuzzy Hash: CA01F236785336ABCB315B79AC46AE77B98AF05BA5B215620F906F3140CB21D901C6E0
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00EE747F
                                                      • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00EE7497
                                                      • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00EE74AC
                                                      • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00EE74CA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Type$Register$FileLoadModuleNameUser
                                                      • String ID:
                                                      • API String ID: 1352324309-0
                                                      • Opcode ID: 3e0dd9de953d340fa912edf48c0e232590ec8444cbc250c07e54b66fa35fc458
                                                      • Instruction ID: d13c4004dbf12b7cf7c3e304f132041dd003bb93fcbc89b2f82c015f36177acd
                                                      • Opcode Fuzzy Hash: 3e0dd9de953d340fa912edf48c0e232590ec8444cbc250c07e54b66fa35fc458
                                                      • Instruction Fuzzy Hash: 2E11A1B5249358ABE720CF55DC08FD27FFCEB00B04F109569A6A6E6191D770E904DB90
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00EEACD3,?,00008000), ref: 00EEB0C4
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00EEACD3,?,00008000), ref: 00EEB0E9
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00EEACD3,?,00008000), ref: 00EEB0F3
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00EEACD3,?,00008000), ref: 00EEB126
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CounterPerformanceQuerySleep
                                                      • String ID:
                                                      • API String ID: 2875609808-0
                                                      • Opcode ID: 38c92656510a48282648102248e9da6f50d32c2244e78e0e7119948e2d22b54e
                                                      • Instruction ID: dec3061355e6b8f2970068d8751ec77724b201de5b16d7423135d2a417e1dae2
                                                      • Opcode Fuzzy Hash: 38c92656510a48282648102248e9da6f50d32c2244e78e0e7119948e2d22b54e
                                                      • Instruction Fuzzy Hash: FC115B31C4166CE7CF04AFE6E9A87EFBB78FF49721F119086D941B2281CB305650AB91
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00EE2DC5
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00EE2DD6
                                                      • GetCurrentThreadId.KERNEL32 ref: 00EE2DDD
                                                      • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00EE2DE4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 2710830443-0
                                                      • Opcode ID: f88e93e500a6fbde8d4c1489a34c9984d2d6a37deab5e3443c2c5e9e517908bb
                                                      • Instruction ID: ed8b24a3bb138f5b5102ad63b35aa37f4c7d0cec4957ad7ff4a95c8a03ef7475
                                                      • Opcode Fuzzy Hash: f88e93e500a6fbde8d4c1489a34c9984d2d6a37deab5e3443c2c5e9e517908bb
                                                      • Instruction Fuzzy Hash: 9EE06D7158122C7BD7201BA39C0DEEB3E6CEB42BA1F015119B309E1080DBA08840D6F0
                                                      APIs
                                                        • Part of subcall function 00E99639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E99693
                                                        • Part of subcall function 00E99639: SelectObject.GDI32(?,00000000), ref: 00E996A2
                                                        • Part of subcall function 00E99639: BeginPath.GDI32(?), ref: 00E996B9
                                                        • Part of subcall function 00E99639: SelectObject.GDI32(?,00000000), ref: 00E996E2
                                                      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00F18887
                                                      • LineTo.GDI32(?,?,?), ref: 00F18894
                                                      • EndPath.GDI32(?), ref: 00F188A4
                                                      • StrokePath.GDI32(?), ref: 00F188B2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                      • String ID:
                                                      • API String ID: 1539411459-0
                                                      • Opcode ID: 66e39c1d00017e79fc0a041de3764904e632343a027c0cdf865e466b55a8ca0a
                                                      • Instruction ID: 407deb4269c702cde8323bf5a7fb3415053090d2231a11ff727375b73c8a02bb
                                                      • Opcode Fuzzy Hash: 66e39c1d00017e79fc0a041de3764904e632343a027c0cdf865e466b55a8ca0a
                                                      • Instruction Fuzzy Hash: B6F05E3608125CFADB125F94AC0AFCE3F59AF0A321F058000FB11A50E2C7755551EFE9
                                                      APIs
                                                      • GetSysColor.USER32(00000008), ref: 00E998CC
                                                      • SetTextColor.GDI32(?,?), ref: 00E998D6
                                                      • SetBkMode.GDI32(?,00000001), ref: 00E998E9
                                                      • GetStockObject.GDI32(00000005), ref: 00E998F1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Color$ModeObjectStockText
                                                      • String ID:
                                                      • API String ID: 4037423528-0
                                                      • Opcode ID: 4acbffce2b59a095cd2e8f25643f12b21fbd4bdc997f84f705cfe0c386207a5a
                                                      • Instruction ID: 3650c6d357416f47ce8a7ffb5b6500e60aee7ec8b2ad2c123cfa296a37d6e39e
                                                      • Opcode Fuzzy Hash: 4acbffce2b59a095cd2e8f25643f12b21fbd4bdc997f84f705cfe0c386207a5a
                                                      • Instruction Fuzzy Hash: 1EE065312C4244BADB215B74BC09BD83F11EB11736F14C21AF6F5640E1C3714641AB11
                                                      APIs
                                                      • GetCurrentThread.KERNEL32 ref: 00EE1634
                                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,00EE11D9), ref: 00EE163B
                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00EE11D9), ref: 00EE1648
                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,00EE11D9), ref: 00EE164F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CurrentOpenProcessThreadToken
                                                      • String ID:
                                                      • API String ID: 3974789173-0
                                                      • Opcode ID: 5034fad71d28fdbe7a4ceaab07e358875c28c15cc37b78f0c7ec1a716f31ee8f
                                                      • Instruction ID: 946708fcb0dd44ee688651b9b2d2d0a4732a9ed6b58a24804d1dd4fd8685e3df
                                                      • Opcode Fuzzy Hash: 5034fad71d28fdbe7a4ceaab07e358875c28c15cc37b78f0c7ec1a716f31ee8f
                                                      • Instruction Fuzzy Hash: 95E08631641215DBD7201FA19D0DBC63B7CBF44795F16C848F245D9080D6344580DB90
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 00EDD858
                                                      • GetDC.USER32(00000000), ref: 00EDD862
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00EDD882
                                                      • ReleaseDC.USER32(?), ref: 00EDD8A3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: 3274c60a97a140cbe530fbbe026d6ee627906668dcf4c99981a8fe4eec202f75
                                                      • Instruction ID: 2691e23c50ad36f45d8ad22de96ab0f7cc821ce52ff8b36eedc434c084ad8667
                                                      • Opcode Fuzzy Hash: 3274c60a97a140cbe530fbbe026d6ee627906668dcf4c99981a8fe4eec202f75
                                                      • Instruction Fuzzy Hash: 5AE01AB4844208EFCF41AFA0D8086ADBBF2FB08310F25E009E80EE7250C7384901BF90
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 00EDD86C
                                                      • GetDC.USER32(00000000), ref: 00EDD876
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00EDD882
                                                      • ReleaseDC.USER32(?), ref: 00EDD8A3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: 97878f561f7fc4fbb5b47c32a2f18dabd8ae17e72c2c4e9987068377367424b5
                                                      • Instruction ID: 7569b16628a86b25e83d5ab81bbb6298a9e3b66534f16e85a186659e8b8200ce
                                                      • Opcode Fuzzy Hash: 97878f561f7fc4fbb5b47c32a2f18dabd8ae17e72c2c4e9987068377367424b5
                                                      • Instruction Fuzzy Hash: 51E09A75D44208DFCF51AFA0D8086ADBBF5BB08311B15A449E94EE7250C7385901AF90
                                                      APIs
                                                        • Part of subcall function 00E87620: _wcslen.LIBCMT ref: 00E87625
                                                      • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00EF4ED4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Connection_wcslen
                                                      • String ID: *$LPT
                                                      • API String ID: 1725874428-3443410124
                                                      • Opcode ID: f2c27f1b4e75fdd54c6f910b421eb5a8354d40f6e9b6ea228c3c758ddc4351ae
                                                      • Instruction ID: 2dd5478f788eed110d0b51068e8e4d9784d63ca2a9cbf93f4bcf5c86c8b12dfb
                                                      • Opcode Fuzzy Hash: f2c27f1b4e75fdd54c6f910b421eb5a8354d40f6e9b6ea228c3c758ddc4351ae
                                                      • Instruction Fuzzy Hash: 759163B5A002089FCB14DF54C484EBABBF1BF45318F19A099E549AF3A2D731ED85CB91
                                                      APIs
                                                      • __startOneArgErrorHandling.LIBCMT ref: 00EAE30D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandling__start
                                                      • String ID: pow
                                                      • API String ID: 3213639722-2276729525
                                                      • Opcode ID: 40eaa614bacc2d59bc64537566e8b764ed7af0dabb411eb986b07a4a9782428a
                                                      • Instruction ID: 4b87c2420fdb516b795c98db40094756e1f472ba6964d84cdf912a6357fd5937
                                                      • Opcode Fuzzy Hash: 40eaa614bacc2d59bc64537566e8b764ed7af0dabb411eb986b07a4a9782428a
                                                      • Instruction Fuzzy Hash: 5B518D61A0C20696CB157714C9013FB3BE8EF86784F30799CE0D67A7E8EB34DC959A46
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #
                                                      • API String ID: 0-1885708031
                                                      • Opcode ID: 4bf7b3e3b5a9a6fb33020abcd601f399acc1ea1d9e32383c243f2a9c7f43a4e9
                                                      • Instruction ID: ab430129ea2e2b6c74bd9bf34df5eed4c5f5ebc24d6e107b1bcd04e1f170aa0d
                                                      • Opcode Fuzzy Hash: 4bf7b3e3b5a9a6fb33020abcd601f399acc1ea1d9e32383c243f2a9c7f43a4e9
                                                      • Instruction Fuzzy Hash: F0510F35900246DFDF19EF68C4856FA7BA8EF15314F246056E891BF3A0D6309D43CBA0
                                                      APIs
                                                      • Sleep.KERNEL32(00000000), ref: 00E9F2A2
                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 00E9F2BB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: GlobalMemorySleepStatus
                                                      • String ID: @
                                                      • API String ID: 2783356886-2766056989
                                                      • Opcode ID: 9fac522cde3f8a2285dfedf2f1ad4f78febf5dc90b7a4005c73283bddbbc87ea
                                                      • Instruction ID: e9536d5f82764b6782aee01dc97b0d5f123515965278f3c83ca0fbbfea5738c9
                                                      • Opcode Fuzzy Hash: 9fac522cde3f8a2285dfedf2f1ad4f78febf5dc90b7a4005c73283bddbbc87ea
                                                      • Instruction Fuzzy Hash: D25158715087489BE320AF10EC86BAFBBF8FF85314F91884DF1D961195EB308529CB66
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00F057E0
                                                      • _wcslen.LIBCMT ref: 00F057EC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper_wcslen
                                                      • String ID: CALLARGARRAY
                                                      • API String ID: 157775604-1150593374
                                                      • Opcode ID: 8466591f48c83938047bc3e3cfae2fec7f5b41b5e6d7434db9c179d92f71b1b2
                                                      • Instruction ID: 29d41d436f490faf058f4e880d571d73d1c6830caf156f6596b50dd018c59e63
                                                      • Opcode Fuzzy Hash: 8466591f48c83938047bc3e3cfae2fec7f5b41b5e6d7434db9c179d92f71b1b2
                                                      • Instruction Fuzzy Hash: 74418F31E002099FCB14DFA9C8819BEBBF5EF59720F149069E905A7292E7709D81EF90
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 00EFD130
                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00EFD13A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CrackInternet_wcslen
                                                      • String ID: |
                                                      • API String ID: 596671847-2343686810
                                                      • Opcode ID: c21b64ce75f0f5158e8da50d7c0cd853a365ad76945c003f4c301487fcdddf43
                                                      • Instruction ID: 48937a569583d5ff393ec80bb51349e46e0cb91368ae70f979029f2d044a79fb
                                                      • Opcode Fuzzy Hash: c21b64ce75f0f5158e8da50d7c0cd853a365ad76945c003f4c301487fcdddf43
                                                      • Instruction Fuzzy Hash: EB313E71D01219ABCF15EFA4CC85AEEBFBAFF05304F001059F919B6162E731AA16DB60
                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?,?), ref: 00F13621
                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00F1365C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$DestroyMove
                                                      • String ID: static
                                                      • API String ID: 2139405536-2160076837
                                                      • Opcode ID: 1f5ea66e105ebe283f40c1b8c14e1cdc2eff1ae940c2f084d1fa837183a6698c
                                                      • Instruction ID: 6d9ad86155f40873c570b6e1570f89870a70e8dcf9d29ff9e8cfb5ad4aec75c6
                                                      • Opcode Fuzzy Hash: 1f5ea66e105ebe283f40c1b8c14e1cdc2eff1ae940c2f084d1fa837183a6698c
                                                      • Instruction Fuzzy Hash: 0C318D71500204AEDB209F28DC80EFB73A9FF88764F10961DF9A997280DA35AD91E760
                                                      APIs
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00F1461F
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F14634
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: '
                                                      • API String ID: 3850602802-1997036262
                                                      • Opcode ID: c105b27aba3936f0a26e3a45180192131c1f8283602fe23a19aa3d1ddc8f1004
                                                      • Instruction ID: fa6b251d15cde91ee2e2ad59dc00260e1e68d332b4c59e480bf7729d21b7a276
                                                      • Opcode Fuzzy Hash: c105b27aba3936f0a26e3a45180192131c1f8283602fe23a19aa3d1ddc8f1004
                                                      • Instruction Fuzzy Hash: FC313975A0030A9FDF14CFA9C990BDABBB6FF49314F14406AE904AB381D770A981DF90
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00F1327C
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F13287
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: Combobox
                                                      • API String ID: 3850602802-2096851135
                                                      • Opcode ID: ab162c40ad7e4c1c14a892601d28c9e3a6dccac9fd69c1864cc7e7960b72d4e3
                                                      • Instruction ID: b7f5a3a828d63ac67e0d85b8869cf21a2fa9f6041ce12fbe39a259925de6d162
                                                      • Opcode Fuzzy Hash: ab162c40ad7e4c1c14a892601d28c9e3a6dccac9fd69c1864cc7e7960b72d4e3
                                                      • Instruction Fuzzy Hash: 1F11B2717002487FEF21AE54DC80EFB3BABEB983A4F104128F918A7290D6319D91A760
                                                      APIs
                                                        • Part of subcall function 00E8600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00E8604C
                                                        • Part of subcall function 00E8600E: GetStockObject.GDI32(00000011), ref: 00E86060
                                                        • Part of subcall function 00E8600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E8606A
                                                      • GetWindowRect.USER32(00000000,?), ref: 00F1377A
                                                      • GetSysColor.USER32(00000012), ref: 00F13794
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                      • String ID: static
                                                      • API String ID: 1983116058-2160076837
                                                      • Opcode ID: ec4ad39a7388f6167a150114d47722748eb96fc3aadb8292a0711c8601c03150
                                                      • Instruction ID: e431fca8ab70442329150aa6c2a77732c21614e7e3e846610a36da72c6d12ce1
                                                      • Opcode Fuzzy Hash: ec4ad39a7388f6167a150114d47722748eb96fc3aadb8292a0711c8601c03150
                                                      • Instruction Fuzzy Hash: 131126B261020AAFDF11DFA8CC46AEA7BB9FB08354F014914F955E2250E735E851ABA0
                                                      APIs
                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00EFCD7D
                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00EFCDA6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Internet$OpenOption
                                                      • String ID: <local>
                                                      • API String ID: 942729171-4266983199
                                                      • Opcode ID: 622736f424601c43d3b63fcb92d370dbb662abf8d1e18e7a0b8dec1a604306eb
                                                      • Instruction ID: 5ebfdba4e108f4cc52866a1fe6e946e6534c2c1de0ed1e356286f913dcd6cee6
                                                      • Opcode Fuzzy Hash: 622736f424601c43d3b63fcb92d370dbb662abf8d1e18e7a0b8dec1a604306eb
                                                      • Instruction Fuzzy Hash: 2A11CA7124563D79D7344B668C45EFBBE5CEF127A4F705225B209A3080D7719941D6F0
                                                      APIs
                                                      • GetWindowTextLengthW.USER32(00000000), ref: 00F134AB
                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00F134BA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: LengthMessageSendTextWindow
                                                      • String ID: edit
                                                      • API String ID: 2978978980-2167791130
                                                      • Opcode ID: 9e7e24f9072bcaab3f192fd6220e417b91647759d73be5649f956b21a8b3e5ab
                                                      • Instruction ID: c892485430c2709bccf9f57297b3c74950d866c1420c27b5ce15aff143be680e
                                                      • Opcode Fuzzy Hash: 9e7e24f9072bcaab3f192fd6220e417b91647759d73be5649f956b21a8b3e5ab
                                                      • Instruction Fuzzy Hash: 92118F71500208AFEF218E64DC44AEB37AAEB15374F504324FA65931D4C771EC91A750
                                                      APIs
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                      • CharUpperBuffW.USER32(?,?,?), ref: 00EE6CB6
                                                      • _wcslen.LIBCMT ref: 00EE6CC2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharUpper
                                                      • String ID: STOP
                                                      • API String ID: 1256254125-2411985666
                                                      • Opcode ID: 47a913f9ceb15619160299a668eab4eddd7fb98eb92a75517b63c129406ca393
                                                      • Instruction ID: ed29957438f18279a2ba7bdc0d22c145b7d5da31d6d99bee9a96703528cf63fd
                                                      • Opcode Fuzzy Hash: 47a913f9ceb15619160299a668eab4eddd7fb98eb92a75517b63c129406ca393
                                                      • Instruction Fuzzy Hash: 4401E532A0056A8A8B10AEBECC409BFB7E5EA717547501924E856B6195EA31D8008750
                                                      APIs
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                        • Part of subcall function 00EE3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EE3CCA
                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00EE1D4C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: be1298466d5ed07a756341eaa80a0f6e95630c14a370476d71820c5a6b54fcb9
                                                      • Instruction ID: 5abf238541fa495c24b40a81edc998e23d6e6a7a4d3e64ad0b6471e074b50252
                                                      • Opcode Fuzzy Hash: be1298466d5ed07a756341eaa80a0f6e95630c14a370476d71820c5a6b54fcb9
                                                      • Instruction Fuzzy Hash: A1012831A0121CABCB08FBA0CC15CFEB7A8EB42350B141549F83A772C2EA3199488760
                                                      APIs
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                        • Part of subcall function 00EE3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EE3CCA
                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00EE1C46
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: c27ced3c4face63e725f4641741acc5ef0591a72c5565f80eb814d4e2e4cbf34
                                                      • Instruction ID: 80aec641248c1338f65fdfe9b778907aa37e379964ed33abd4107c0d56202f11
                                                      • Opcode Fuzzy Hash: c27ced3c4face63e725f4641741acc5ef0591a72c5565f80eb814d4e2e4cbf34
                                                      • Instruction Fuzzy Hash: 0501FC71B8114C67CB08F7A1C955AFFB7E89B11340F241055B80AB3182EA359E4897B1
                                                      APIs
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                        • Part of subcall function 00EE3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EE3CCA
                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00EE1CC8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: 2cc80c99e0fa1cf2bca9843582408d37dc2c4dad5fcc75390deb4f642c68c0b6
                                                      • Instruction ID: fe9a2471b851ba2db00959c643e64d76591834e4c7a56bc1a6ac9f3ed2ea5db3
                                                      • Opcode Fuzzy Hash: 2cc80c99e0fa1cf2bca9843582408d37dc2c4dad5fcc75390deb4f642c68c0b6
                                                      • Instruction Fuzzy Hash: 5101DB71A8115C67CB08F7A1CA15AFEF7E89B11740F342015B80AB3282EA35DF48D771
                                                      APIs
                                                        • Part of subcall function 00E89CB3: _wcslen.LIBCMT ref: 00E89CBD
                                                        • Part of subcall function 00EE3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EE3CCA
                                                      • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00EE1DD3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: d496d63026a5901306d0a61bc7e1122ee1e04953ccd8caf87cf4a7446bb34509
                                                      • Instruction ID: 02fba8cb5a020c3aa9f7d5347d0e36273d37ca9c4d3532c71be5744046891be7
                                                      • Opcode Fuzzy Hash: d496d63026a5901306d0a61bc7e1122ee1e04953ccd8caf87cf4a7446bb34509
                                                      • Instruction Fuzzy Hash: 2EF0F471E4121C67CB08F7A5CC56AFEB7A8AB01740F182915B82A732C2EB7199088360
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: _wcslen
                                                      • String ID: 3, 3, 16, 1
                                                      • API String ID: 176396367-3042988571
                                                      • Opcode ID: 87004348170733393fb80d77aa4f94cad547fba39139f76ae50d21b2d09fe956
                                                      • Instruction ID: a393cf95b76cf57307fedc1841e28a26db0a47753625b188f0545061f4e3e646
                                                      • Opcode Fuzzy Hash: 87004348170733393fb80d77aa4f94cad547fba39139f76ae50d21b2d09fe956
                                                      • Instruction Fuzzy Hash: ECE02B4AE0436190D33136799CC197F96CDCFCA760710286BF981D62E6EAD4EDA1B3A1
                                                      APIs
                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00EE0B23
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: AutoIt$Error allocating memory.
                                                      • API String ID: 2030045667-4017498283
                                                      • Opcode ID: 4b9d456773bafb0c65b42d528448df5c1810caf535d1c55f04b9727803da703f
                                                      • Instruction ID: 9c95ca6d58d2c1e4cf332af3faebd04de6a0d8913e0fdf9eed9b02219be006ee
                                                      • Opcode Fuzzy Hash: 4b9d456773bafb0c65b42d528448df5c1810caf535d1c55f04b9727803da703f
                                                      • Instruction Fuzzy Hash: D9E0D83128430827D21036547C03FC97AC48F06F20F10542AFB48B94C38AD2649016EA
                                                      APIs
                                                        • Part of subcall function 00E9F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00EA0D71,?,?,?,00E8100A), ref: 00E9F7CE
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,00E8100A), ref: 00EA0D75
                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00E8100A), ref: 00EA0D84
                                                      Strings
                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00EA0D7F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                      • API String ID: 55579361-631824599
                                                      • Opcode ID: c4e72b18b879daaca39c75f7c782402b3ddde4901883e21e3bf11ebdad927325
                                                      • Instruction ID: f03007771bf3f38d19915193f385efa6a80a7a4af81ae043513c254409a003b3
                                                      • Opcode Fuzzy Hash: c4e72b18b879daaca39c75f7c782402b3ddde4901883e21e3bf11ebdad927325
                                                      • Instruction Fuzzy Hash: BCE092742007418BD3709FB8D4083827BE0BF05744F008D2DE486DA651DBF4F4889BD1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: LocalTime
                                                      • String ID: %.3d$X64
                                                      • API String ID: 481472006-1077770165
                                                      • Opcode ID: fb0ffa0cdd192fe6954bfe2cd78b9cc4ba5cb212446aedb11e22dd4d6ae7a1c8
                                                      • Instruction ID: 7c21b72076794662e09b988aff28b202543b6ef335a20dc6ffcde9473289aa99
                                                      • Opcode Fuzzy Hash: fb0ffa0cdd192fe6954bfe2cd78b9cc4ba5cb212446aedb11e22dd4d6ae7a1c8
                                                      • Instruction Fuzzy Hash: 12D012A184C118EACF509AD0CC458F9B3BCEB18341F50A453FC06F1150E634C50A6B61
                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F1236C
                                                      • PostMessageW.USER32(00000000), ref: 00F12373
                                                        • Part of subcall function 00EEE97B: Sleep.KERNEL32 ref: 00EEE9F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: 4c18ca3b7bd4c29faaca404e60194f322ea447e43d166870e678318b60e332cd
                                                      • Instruction ID: a0826131f315b1bab49423be98027003c920da7b980866f331c5285d3a3edf94
                                                      • Opcode Fuzzy Hash: 4c18ca3b7bd4c29faaca404e60194f322ea447e43d166870e678318b60e332cd
                                                      • Instruction Fuzzy Hash: 8CD022323C03047BE264B370DC0FFC6BA449B00B00F0189027705EA1D0C8F0B800DA84
                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F1232C
                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00F1233F
                                                        • Part of subcall function 00EEE97B: Sleep.KERNEL32 ref: 00EEE9F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: 8eb8753f7ade3384be188a91229e3a021fa3afe5c26e61d14c17ec998a1782fa
                                                      • Instruction ID: 4351db4346060e745275b6525bd591625e5c134b4379c31f5aee8b3a06211bdc
                                                      • Opcode Fuzzy Hash: 8eb8753f7ade3384be188a91229e3a021fa3afe5c26e61d14c17ec998a1782fa
                                                      • Instruction Fuzzy Hash: 22D022323C0304BBE264B370DC0FFC6BA449B00B00F0189027709EA1D0C8F0A800DA80
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00EBBE93
                                                      • GetLastError.KERNEL32 ref: 00EBBEA1
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00EBBEFC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1726621853.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                      • Associated: 00000000.00000002.1726603881.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F1C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726688264.0000000000F42000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726737427.0000000000F4C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1726755663.0000000000F54000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_e80000_nnn.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                      • String ID:
                                                      • API String ID: 1717984340-0
                                                      • Opcode ID: fa08bae52517edc0efb6b3e10be7b5daf1ad0e9fd9fb2aa3b62c917a0993b42e
                                                      • Instruction ID: 4a22cbc09a886a1a4b22e192855deae39f580b613f8502dfa6c1bad48c9b8425
                                                      • Opcode Fuzzy Hash: fa08bae52517edc0efb6b3e10be7b5daf1ad0e9fd9fb2aa3b62c917a0993b42e
                                                      • Instruction Fuzzy Hash: 0841F73470020AAFCF218FA5CC44AFB7BA9EF42314F156169F959BB1A1DBB09D01DB60