Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EPIRTURMEROOO0060.exe

Overview

General Information

Sample name:EPIRTURMEROOO0060.exe
Analysis ID:1580113
MD5:6b2561c0b680c9e681b71663cd6afb1e
SHA1:39d5ad324e919744f94c5281af5d612422657fc2
SHA256:e0663b19ffa16445efed5a1c70bd92ab61a65faef5535fe7f43c81f3b86ea2c2
Tags:exeMassLoggeruser-threatcat_ch
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code references suspicious native API functions
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to detect sleep reduction / modifications
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • EPIRTURMEROOO0060.exe (PID: 6772 cmdline: "C:\Users\user\Desktop\EPIRTURMEROOO0060.exe" MD5: 6B2561C0B680C9E681B71663CD6AFB1E)
    • RegSvcs.exe (PID: 6888 cmdline: "C:\Users\user\Desktop\EPIRTURMEROOO0060.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "serverche399@gpsamsterdamqroup.com", "Password": "     j4YX(KT7UCZ1      ", "Server": "fiber13.dnsiaas.com", "To": "almightstephen@gmail.com", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xf1a7:$a1: get_encryptedPassword
        • 0xf4cf:$a2: get_encryptedUsername
        • 0xef42:$a3: get_timePasswordChanged
        • 0xf063:$a4: get_passwordField
        • 0xf1bd:$a5: set_encryptedPassword
        • 0x10b19:$a7: get_logins
        • 0x107ca:$a8: GetOutlookPasswords
        • 0x105bc:$a9: StartKeylogger
        • 0x10a69:$a10: KeyLoggerEventArgs
        • 0x10619:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmpMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x141ab:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x136a9:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x139b7:$a4: \Orbitum\User Data\Default\Login Data
        • 0x147af:$a5: \Kometa\User Data\Default\Login Data
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0xf1a7:$a1: get_encryptedPassword
              • 0xf4cf:$a2: get_encryptedUsername
              • 0xef42:$a3: get_timePasswordChanged
              • 0xf063:$a4: get_passwordField
              • 0xf1bd:$a5: set_encryptedPassword
              • 0x10b19:$a7: get_logins
              • 0x107ca:$a8: GetOutlookPasswords
              • 0x105bc:$a9: StartKeylogger
              • 0x10a69:$a10: KeyLoggerEventArgs
              • 0x10619:$a11: KeyLoggerEventArgsEventHandler
              0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x141ab:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x136a9:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x139b7:$a4: \Orbitum\User Data\Default\Login Data
              • 0x147af:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 10 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-24T00:25:13.665092+010028032742Potentially Bad Traffic192.168.2.449730193.122.6.16880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "serverche399@gpsamsterdamqroup.com", "Password": " j4YX(KT7UCZ1 ", "Server": "fiber13.dnsiaas.com", "To": "almightstephen@gmail.com", "Port": 587}
              Source: EPIRTURMEROOO0060.exeReversingLabs: Detection: 55%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: EPIRTURMEROOO0060.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: EPIRTURMEROOO0060.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49731 version: TLS 1.0
              Source: Binary string: wntdll.pdbUGP source: EPIRTURMEROOO0060.exe, 00000000.00000003.1718566429.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000003.1719605893.0000000003630000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: EPIRTURMEROOO0060.exe, 00000000.00000003.1718566429.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000003.1719605893.0000000003630000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F9DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F9DBBE
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA68EE FindFirstFileW,FindClose,0_2_00FA68EE
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00FA698F
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F9D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F9D076
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F9D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F9D3A9
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FA9642
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FA979D
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00FA9B2B
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00FA5C97
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 030C5782h1_2_030C5366
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 030C51B9h1_2_030C4F08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 030C5782h1_2_030C56AF
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
              Source: Joe Sandbox ViewIP Address: 172.67.177.134 172.67.177.134
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 193.122.6.168:80
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49731 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FACE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00FACE44
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: RegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
              Source: RegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2948549193.00000000031DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegSvcs.exe, 00000001.00000002.2948549193.0000000003171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: RegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
              Source: EPIRTURMEROOO0060.exe, 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
              Source: RegSvcs.exe, 00000001.00000002.2949391644.0000000006560000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
              Source: RegSvcs.exe, 00000001.00000002.2948549193.000000000320D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000001.00000002.2948549193.000000000320D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
              Source: RegSvcs.exe, 00000001.00000002.2948549193.0000000003171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: EPIRTURMEROOO0060.exe, 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
              Source: RegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: EPIRTURMEROOO0060.exe, 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
              Source: RegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FAEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00FAEAFF
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FAED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00FAED6A
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FAEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00FAEAFF
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F9AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00F9AA57
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FC9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00FC9576

              System Summary

              barindex
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: EPIRTURMEROOO0060.exe PID: 6772, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RegSvcs.exe PID: 6888, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: EPIRTURMEROOO0060.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: EPIRTURMEROOO0060.exe, 00000000.00000000.1692916411.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d22333c6-c
              Source: EPIRTURMEROOO0060.exe, 00000000.00000000.1692916411.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_216857df-3
              Source: EPIRTURMEROOO0060.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c469a9b4-e
              Source: EPIRTURMEROOO0060.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_67dff195-b
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F9D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00F9D5EB
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F91201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00F91201
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F9E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00F9E8F6
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F380600_2_00F38060
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA20460_2_00FA2046
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F982980_2_00F98298
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F6E4FF0_2_00F6E4FF
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F6676B0_2_00F6676B
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FC48730_2_00FC4873
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F3CAF00_2_00F3CAF0
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F5CAA00_2_00F5CAA0
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F4CC390_2_00F4CC39
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F66DD90_2_00F66DD9
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F391C00_2_00F391C0
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F4B1190_2_00F4B119
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F513940_2_00F51394
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F517060_2_00F51706
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F5781B0_2_00F5781B
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F519B00_2_00F519B0
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F4997D0_2_00F4997D
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F379200_2_00F37920
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F57A4A0_2_00F57A4A
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F57CA70_2_00F57CA7
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F51C770_2_00F51C77
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F69EEE0_2_00F69EEE
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FBBE440_2_00FBBE44
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F51F320_2_00F51F32
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_011A2A300_2_011A2A30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030CC1681_2_030CC168
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030C27B91_2_030C27B9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030CCA581_2_030CCA58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030C4F081_2_030C4F08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030C7E681_2_030C7E68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030CC3861_2_030CC386
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030CB9E01_2_030CB9E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030C7E591_2_030C7E59
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030C4EF81_2_030C4EF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030C2DD11_2_030C2DD1
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: String function: 00F50A30 appears 46 times
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: String function: 00F4F9F2 appears 31 times
              Source: EPIRTURMEROOO0060.exe, 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs EPIRTURMEROOO0060.exe
              Source: EPIRTURMEROOO0060.exe, 00000000.00000003.1719235163.0000000003753000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs EPIRTURMEROOO0060.exe
              Source: EPIRTURMEROOO0060.exe, 00000000.00000003.1719353574.00000000038FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs EPIRTURMEROOO0060.exe
              Source: EPIRTURMEROOO0060.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: EPIRTURMEROOO0060.exe PID: 6772, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RegSvcs.exe PID: 6888, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@2/2
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA37B5 GetLastError,FormatMessageW,0_2_00FA37B5
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F910BF AdjustTokenPrivileges,CloseHandle,0_2_00F910BF
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F916C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00F916C3
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00FA51CD
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FBA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00FBA67C
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00FA648E
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F342A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00F342A2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeFile created: C:\Users\user\AppData\Local\Temp\aut22DD.tmpJump to behavior
              Source: EPIRTURMEROOO0060.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RegSvcs.exe, 00000001.00000002.2948549193.0000000003260000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2948549193.0000000003250000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2948549193.000000000326E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: EPIRTURMEROOO0060.exeReversingLabs: Detection: 55%
              Source: unknownProcess created: C:\Users\user\Desktop\EPIRTURMEROOO0060.exe "C:\Users\user\Desktop\EPIRTURMEROOO0060.exe"
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\EPIRTURMEROOO0060.exe"
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\EPIRTURMEROOO0060.exe"Jump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: EPIRTURMEROOO0060.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: EPIRTURMEROOO0060.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: EPIRTURMEROOO0060.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: EPIRTURMEROOO0060.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: EPIRTURMEROOO0060.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: EPIRTURMEROOO0060.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: EPIRTURMEROOO0060.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: EPIRTURMEROOO0060.exe, 00000000.00000003.1718566429.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000003.1719605893.0000000003630000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: EPIRTURMEROOO0060.exe, 00000000.00000003.1718566429.00000000037D0000.00000004.00001000.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000003.1719605893.0000000003630000.00000004.00001000.00020000.00000000.sdmp
              Source: EPIRTURMEROOO0060.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: EPIRTURMEROOO0060.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: EPIRTURMEROOO0060.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: EPIRTURMEROOO0060.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: EPIRTURMEROOO0060.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F342DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F342DE
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F9C9FE push esi; ret 0_2_00F9CA01
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F50A76 push ecx; ret 0_2_00F50A89
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F9CA33 push esi; ret 0_2_00F9CA36
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030CF273 push ebp; retf 1_2_030CF281
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F4F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F4F98E
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FC1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00FC1C41
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F3D85A0_2_00F3D85A
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeAPI/Special instruction interceptor: Address: 11A2654
              Source: EPIRTURMEROOO0060.exe, 00000000.00000003.1694026953.00000000011B5000.00000004.00000020.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000003.1708062602.00000000011B5000.00000004.00000020.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000002.1720499207.00000000011B5000.00000004.00000020.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000003.1694502114.00000000011B5000.00000004.00000020.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000003.1694706474.00000000011B5000.00000004.00000020.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000003.1706659609.00000000011A0000.00000004.00000020.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000003.1693969080.000000000119D000.00000004.00000020.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000003.1697704862.00000000011B5000.00000004.00000020.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000003.1694427573.00000000011B5000.00000004.00000020.00020000.00000000.sdmp, EPIRTURMEROOO0060.exe, 00000000.00000003.1694862399.00000000011B5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeAPI coverage: 4.8 %
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F9DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F9DBBE
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA68EE FindFirstFileW,FindClose,0_2_00FA68EE
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00FA698F
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F9D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F9D076
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F9D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F9D3A9
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FA9642
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FA979D
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00FA9B2B
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00FA5C97
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F342DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F342DE
              Source: RegSvcs.exe, 00000001.00000002.2947867505.00000000013AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_030CC168 LdrInitializeThunk,LdrInitializeThunk,1_2_030CC168
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FAEAA2 BlockInput,0_2_00FAEAA2
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F62622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F62622
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F342DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F342DE
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F54CE8 mov eax, dword ptr fs:[00000030h]0_2_00F54CE8
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_011A2920 mov eax, dword ptr fs:[00000030h]0_2_011A2920
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_011A28C0 mov eax, dword ptr fs:[00000030h]0_2_011A28C0
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_011A12A0 mov eax, dword ptr fs:[00000030h]0_2_011A12A0
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F90B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00F90B62
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F62622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F62622
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F5083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F5083F
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F509D5 SetUnhandledExceptionFilter,0_2_00F509D5
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F50C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00F50C21
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
              Source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: E1B008Jump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F91201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00F91201
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F72BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F72BA5
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F9B226 SendInput,keybd_event,0_2_00F9B226
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FB22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00FB22DA
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\EPIRTURMEROOO0060.exe"Jump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F90B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00F90B62
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F91663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00F91663
              Source: EPIRTURMEROOO0060.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: EPIRTURMEROOO0060.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F50698 cpuid 0_2_00F50698
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FA8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00FA8195
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F8D27A GetUserNameW,0_2_00F8D27A
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F6BB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00F6BB6F
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00F342DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F342DE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: EPIRTURMEROOO0060.exe PID: 6772, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6888, type: MEMORYSTR
              Source: Yara matchFile source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: EPIRTURMEROOO0060.exe PID: 6772, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6888, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: EPIRTURMEROOO0060.exeBinary or memory string: WIN_81
              Source: EPIRTURMEROOO0060.exeBinary or memory string: WIN_XP
              Source: EPIRTURMEROOO0060.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
              Source: EPIRTURMEROOO0060.exeBinary or memory string: WIN_XPe
              Source: EPIRTURMEROOO0060.exeBinary or memory string: WIN_VISTA
              Source: EPIRTURMEROOO0060.exeBinary or memory string: WIN_7
              Source: EPIRTURMEROOO0060.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2948549193.0000000003295000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: EPIRTURMEROOO0060.exe PID: 6772, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6888, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: EPIRTURMEROOO0060.exe PID: 6772, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6888, type: MEMORYSTR
              Source: Yara matchFile source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.EPIRTURMEROOO0060.exe.c80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: EPIRTURMEROOO0060.exe PID: 6772, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6888, type: MEMORYSTR
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FB1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00FB1204
              Source: C:\Users\user\Desktop\EPIRTURMEROOO0060.exeCode function: 0_2_00FB1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00FB1806
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              11
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              121
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              3
              Obfuscated Files or Information
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS127
              System Information Discovery
              Distributed Component Object Model121
              Input Capture
              13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              2
              Valid Accounts
              LSA Secrets321
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
              Access Token Manipulation
              Cached Domain Credentials2
              Process Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items212
              Process Injection
              DCSync1
              Application Window Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
              System Owner/User Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Network Configuration Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              EPIRTURMEROOO0060.exe55%ReversingLabsWin32.Trojan.AutoitInject
              EPIRTURMEROOO0060.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              172.67.177.134
              truefalse
                high
                checkip.dyndns.com
                193.122.6.168
                truefalse
                  high
                  checkip.dyndns.org
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                      high
                      https://reallyfreegeoip.org/xml/8.46.123.189false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.org/xml/8.46.123.189lRegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.comdRegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://crl.microsoftRegSvcs.exe, 00000001.00000002.2949391644.0000000006560000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.org/qEPIRTURMEROOO0060.exe, 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgdRegSvcs.exe, 00000001.00000002.2948549193.000000000320D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/8.46.123.189dRegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.2948549193.000000000320D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.orgdRegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgRegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2948549193.00000000031DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.comRegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://checkip.dyndns.org/dRegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.2948549193.0000000003171000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.telegram.org/bot-/sendDocument?chat_id=EPIRTURMEROOO0060.exe, 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    high
                                                    https://reallyfreegeoip.org/xml/EPIRTURMEROOO0060.exe, 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2948549193.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      193.122.6.168
                                                      checkip.dyndns.comUnited States
                                                      31898ORACLE-BMC-31898USfalse
                                                      172.67.177.134
                                                      reallyfreegeoip.orgUnited States
                                                      13335CLOUDFLARENETUSfalse
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1580113
                                                      Start date and time:2024-12-24 00:24:07 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 5m 43s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:6
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:EPIRTURMEROOO0060.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@3/4@2/2
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 99%
                                                      • Number of executed functions: 54
                                                      • Number of non-executed functions: 289
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                      • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.63
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                      • VT rate limit hit for: EPIRTURMEROOO0060.exe
                                                      No simulations
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      193.122.6.168Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      PAYMENT SWIFT AND SOA TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      SWIFT091816-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      172.67.177.134HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                        Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                          rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                            Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                              YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                                                PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  HUSDGHCE23ED.exeGet hashmaliciousMassLogger RATBrowse
                                                                    66776676676.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                      RFQ December-January Forcast and TCL.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                        Invoice.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          checkip.dyndns.comProforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 193.122.6.168
                                                                          Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 193.122.6.168
                                                                          PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 193.122.130.0
                                                                          Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 193.122.130.0
                                                                          rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 193.122.130.0
                                                                          Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 158.101.44.242
                                                                          Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 158.101.44.242
                                                                          Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 132.226.247.73
                                                                          reallyfreegeoip.orgProforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 104.21.67.152
                                                                          Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 104.21.67.152
                                                                          Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          ORACLE-BMC-31898USProforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 193.122.6.168
                                                                          HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 193.122.6.168
                                                                          MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 193.122.130.0
                                                                          Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 193.122.130.0
                                                                          rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 193.122.130.0
                                                                          nshkmips.elfGet hashmaliciousMiraiBrowse
                                                                          • 132.145.36.70
                                                                          Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 158.101.44.242
                                                                          Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 158.101.44.242
                                                                          nshkarm.elfGet hashmaliciousMiraiBrowse
                                                                          • 140.238.15.102
                                                                          nshsh4.elfGet hashmaliciousMiraiBrowse
                                                                          • 140.238.98.44
                                                                          CLOUDFLARENETUShttps://en.newsnowbangla.com/archives/69912Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                                                                          • 104.17.25.14
                                                                          https://u48917305.ct.sendgrid.net/ls/click?upn=u001.ztQPJiWtq2gO8V-2Ftd7SxY9UCAq3VScTPSloeIw5UEMPd6e3nbPRvJ98moPTqmrdQ1eNbvwZHJ-2BEb4HrooVFNCTltmXW6SgRONKSmPzdFoWfDQT97cczFZ0vj7M2xBd2izDTi-2BL-2BoVqB8yVzV2GW7vOPvy3s9yVghrOS5vs-2BSnWyzJMkXQxVEReq4oLCDet7QAOvo_JkpSD-2Bg6VoLAQppUKMb-2BxDh4v4nbOeQFT31aoN-2FLkhvFCzY6wdlGM7RTNIi47OKR1tTaghG8tTKssArDNPSXAfX9wO6nsZ2FHn-2FunyaOti-2FaII-2FnbKYDXJOImW-2Bs9f4tYnWj8rqO7L0kp4KNRHBDo0iHoL8DEOGc8GMtzqzsIqERel6-2FxJyY4DBnsnUTOc2I4HCPKA6lxcCEXMtxEA1-2FnQ-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                                          • 104.17.25.14
                                                                          Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 104.21.67.152
                                                                          Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          https://www.canva.com/design/DAGaHpv1g1M/bVE7B2sT8b8T3P-e2xb64w/view?utm_content=DAGaHpv1g1M&utm_campaign=designshare&utm_medium=link2&utm_source=uniquelinks&utlId=h1ee3678e45Get hashmaliciousHTMLPhisherBrowse
                                                                          • 172.67.74.152
                                                                          Violated Heroine_91zbZ-1.exeGet hashmaliciousUnknownBrowse
                                                                          • 104.18.20.226
                                                                          Play Aud.htmlGet hashmaliciousUnknownBrowse
                                                                          • 104.17.25.14
                                                                          https://flowto.it/8tooc2sec?fc=0Get hashmaliciousUnknownBrowse
                                                                          • 104.18.35.227
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          54328bd36c14bd82ddaa0c04b25ed9adProforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          PARATRANSFARI REMINDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          Order_12232024.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          rTTSWIFTCOPIES.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          Ziraat_Bankasi_Swift_Mesaji_TXB04958T.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          Statement_3029_from_Cross_Traders_and_Logistics_ltd.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 172.67.177.134
                                                                          Browser.Daemon.exeGet hashmaliciousUnknownBrowse
                                                                          • 172.67.177.134
                                                                          No context
                                                                          Process:C:\Users\user\Desktop\EPIRTURMEROOO0060.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):93696
                                                                          Entropy (8bit):6.8149694850955855
                                                                          Encrypted:false
                                                                          SSDEEP:1536:SdN20iXqMSQzcoJkrGkYu9nxqf5hpnr8GJpXItFGGGJcmGVxZxRgjpeQK8y:SVMSQzcoJkrBYutxqffZ8eX6GGGJc1ZB
                                                                          MD5:301CAAB968E759F55A523E3FBBB26501
                                                                          SHA1:F6EAE475AADBB79B204C4D442C47114DAC8C36E6
                                                                          SHA-256:156B9467A5DA58C5B9ADBC142C200334723625711A2F747D0BFEF7A04CAE7482
                                                                          SHA-512:A9CE9BDF92E9EBADB8C2BA39A31C0268D612BDC91342C5A879D79EC3A9EB2CB5F24CCD69FAE268085288E74921CACF99A76680873ACFFDF8E1875875543FB376
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:...XP9TMQVVR..57.57ME1EB.XS9TMUVVRCU57V57ME1EBNXS9TMUVVRCU57.57MK..LN.Z.u.T..s.=\DvEE""C$/n;2W:"!v47c'@Yv\Ym.~.b#77\z@X\rRCU57V5g.E1.CMX...UVVRCU57.55LN0.BN<R9TEUVVRCU..W57mE1E.OXS9.MUvVRCW57R57ME1EBHXS9TMUVV.BU55V57ME1GB..S9DMUFVRCU%7V%7ME1EB^XS9TMUVVRCUq.W5`ME1E.OX.<TMUVVRCU57V57ME1EBN.R9XMUVVRCU57V57ME1EBNXS9TMUVVRCU57V57ME1EBNXS9TMUVVRCU5.V5?ME1EBNXS9TM]vVR.U57V57ME1EB`,6A MUV.0BU5.V57)D1E@NXS9TMUVVRCU57v57-kC60-XS9.HUVV.BU51V57+D1EBNXS9TMUVVR.U5wxGR!*REBBXS9T.TVVPCU5[W57ME1EBNXS9TM.VV.CU57V57ME1EBNXS9..TVVRCU}7V55M@1..NXS.TMVVVR.U51..7M.1EBNXS9TMUVVRCU57V57ME1EBNXS9TMUVVRCU57V57M.L.M..P'.VVRCU56T63KM9EBNXS9TM+VVR.U57.57Mr1EBkXS99MUVrRCUK7V5IME1!BNX!9TM4VVR.U57957M+1EB0XS9JO}IVRI..7T..ME;Eh.+r9TG.WVRG&.7V?.OE1A1mXS3.NUVR!gU5=.17MAB`BNR.<TMQ|.R@.#1V5,"}1EHN[.,RMUM|tCW..V5=Mo.EA.MU9TV.tVP.\57R.a>X1EDf.S9^9\VVP._57R.)OmrEBDrqGGMUR}RiwK#V53fE.g<[XS=.M.t(DCU1.V..3R1EFeXy?~/U$.^C%6X757Km.EBDp.9TKU|lR=[57R7X.E1OddbS..MUPVz.U51V..M;.EBJtTGgMUR}D=d57R.15E1C1.XS3q.fVVVk.57\5..E..BN^S..MUP
                                                                          Process:C:\Users\user\Desktop\EPIRTURMEROOO0060.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):15010
                                                                          Entropy (8bit):7.585673340317947
                                                                          Encrypted:false
                                                                          SSDEEP:384:M9/RFE4uzlhGGa8RZv4a1EQZR0Ct9RY4BTCCUDRUUYdKl:MR9uZQGa83v4KEhCR3jBMl
                                                                          MD5:0E5C87F8C71FFA93DB56639835B8D573
                                                                          SHA1:8D711FBFA435D2F99EDFECB0039370D7252BCE7F
                                                                          SHA-256:A85282EBD9D0566E2C1DE7033EF76A224CB298F8D8ABB06BE09B4938F4F2C52F
                                                                          SHA-512:B1C22FC38825ECE990D4AB748ED2EDD6B339CD803167EA7ED00D813C7EEE9D13A7A22541E972971A21526176454218E25FCB7D75EB3EB8B2D7281F1533B32295
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:EA06.....Zo.........SP.n......5e...`.....|....T...3...(.6&.....9vp.=...G.....7@..9......$..k...........c}V.....?.P...p...Y@Q?.{..'..c.D.&.N. .'.9e.D.&`...D..' ...D...s...D...S.(......sP...h...M.Q?.y..G.c.D....Q.......O......60..........vh...0.7..!.....)^...t.C........$..C......l>[......!....|.0...&d.....Hz..a....l?..uo.....P......V0....j......|......l.....A.?.. Bg.8.l.E..Ed.L...?.. Bg.....Y..>@.............@..'.....8|.?..u.........l. O..]e...O..!e...& ....#s.......3.Y....9.......9..M.7?............l?...F..........C7....g .........x2..8.a...?..j..+4.....W?..j....Y..M. ?.0....Q...d}S0{.......M.".@...Z........V....n.....Q>...'.N...r..(.-........0W.........(....... 6..p.....6zh......?.....O8....lCN....i..?..8}@L..E.i.....61...f#q....>.N....4..M.Q?.q.........D..0N..V.A..M.>K0i..d.h.&...%.Y...|.*..<..aw.].3c..H.@B?...G..1...' ....k|.A.O..#.....}V`....#..H|.P!..d....0z....Y..>K..G.*/....G.7c.H..b....W..1....?.01..b.!...@.?..o.F|....p9......S.!..nb.!....zb0..
                                                                          Process:C:\Users\user\Desktop\EPIRTURMEROOO0060.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):65996
                                                                          Entropy (8bit):7.899258065335145
                                                                          Encrypted:false
                                                                          SSDEEP:1536:t5V/Srlc/7lfcjV6binHpdNHRFjR8ddqDn/5yuYx:t5lSrGfcBLLRFtadqDhc
                                                                          MD5:83D1D8C03D2CF951522C5F256530BB96
                                                                          SHA1:CF05AD591AC1033C85983116384DE6EA0AE33E10
                                                                          SHA-256:952A630049CF6388BC0B8D07A507BB3A876640CCB9B5352533722BA2FFDB1D2D
                                                                          SHA-512:94E16B580061DF141ABBE8BF300534EA5310887F5E88977079610083FE263DC0598B6C2734E286CCA2E7263FA572A1C8EA2EBDDCD5F22D20C92D3C33CF6667F9
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:EA06..n..F;...M...-.k7.Mf..,.B.V*`..T.X..f.z...i....X.X....w.....j..../=.Q..Z,.EC.K...^u"...{...Y.W+6...-b........\..,f....a4:mc...l..5...i..V.N.T.5J(..5{Z..om..<T..B)M.....2..5.@..T*..j.a.=.]..h.........P..W.1.q.X,....eg.._6b.9...~@..D^.5...v..`B..;`.M.2....0...SyM.cE..,|7i..[k.....c%H..>@............Vkw.Q.R.UJ.B...8.Z.P.B+up...+V.D.,>>.>..._@...6.1.....mR.V..# ..k.7..@<...k.L..x...BO....bmT.L.t...f.`......... ."..,N@..!....R@....a!.,&.............`.XR...MZ.I....H.^.E..m..].sT..j.j..M....z}.cA..k.9.R.U.T.6z..{.......N.t.y....R.j.`)D.E}..i...YR..i......U...m./E..).Y.R...U..:..A.....-.....k.......2.}..E.Q.W.=..U._jV...GV....X.y[.T..m..(.P...Z?...4Z5..y...Y&.C...y..m..!....K..-.).l.`..<.Y.>.d.T.0JmV.V.D.~....;.QhT..R.g.nh.. .a..h.......\y.`......X.....P...F0..C.....E..mP..N.T..j.j...g..s{/..!.Cg5k/..V.P..jU.k7...E:.W....ym.C..jui...G..@R..L.0...1.$......&..'g@.U.T.."(..........:=..7..i.:m.kG.G@,.L`...Ue.9.Zc...\..:.R.a;.... .p.n.X..).>OZ...J...
                                                                          Process:C:\Users\user\Desktop\EPIRTURMEROOO0060.exe
                                                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):172054
                                                                          Entropy (8bit):3.1814870752264017
                                                                          Encrypted:false
                                                                          SSDEEP:48:sb3feqfCpfS6ftqfA0f9fWf9fZ1fi20fq0fFfY6fofi51fK0fi0fCfZ1fK0f70fs:iaN7VHDhLOaDf8Q7+g/PCkjrk6GklX
                                                                          MD5:66FA7BFE30811B5D87701D5CBC3B3D85
                                                                          SHA1:A6841DAD239525D7234769C185D4FCD009228B95
                                                                          SHA-256:DDC2ED5120C9B4824A23C4F7E73DD0E91E288BA7DABA2483295811CAFDB06849
                                                                          SHA-512:B2FA2C52D43631D2004C22E3B787028D2FF59AAED3725B8A5CD46E356D1E5C7C636A100F8ECF57EE0B067379C702B501E9F969900B6F02FE5E9C23E1BF9DF896
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:hixjs0hixjsxhixjs5hixjs5hixjs8hixjsbhixjsehixjschixjs8hixjs1hixjsehixjschixjschixjschixjs0hixjs2hixjs0hixjs0hixjs0hixjs0hixjs5hixjs6hixjs5hixjs7hixjsbhixjs8hixjs6hixjsbhixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjs5hixjs8hixjs4hixjsbhixjs9hixjs6hixjs5hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjsdhixjs8hixjs6hixjsbhixjsahixjs7hixjs2hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs5hixjs5hixjs8hixjs8hixjsbhixjs8hixjs6hixjsehixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjs5hixjs8hixjsahixjsbhixjs9hixjs6hixjs5hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjsdhixjs8hixjschixjsbhixjsahixjs6hixjschixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs5hixjs5hixjs8hixjsehixjsbhixjs8hixjs3hixjs3hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjs5hixjs9hixjs0hixjsbhixjs9hixjs3hixjs2hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjsdhixj
                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Entropy (8bit):6.80923297076633
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:EPIRTURMEROOO0060.exe
                                                                          File size:1'021'952 bytes
                                                                          MD5:6b2561c0b680c9e681b71663cd6afb1e
                                                                          SHA1:39d5ad324e919744f94c5281af5d612422657fc2
                                                                          SHA256:e0663b19ffa16445efed5a1c70bd92ab61a65faef5535fe7f43c81f3b86ea2c2
                                                                          SHA512:bc370c1bbda036cd74354aa3f9d33d230ffbab9c27b39e95b1e6a862d5a806b3a59cd90e79ce5a9a155989797ecbcfbb61a73334acd6723472d3bea7b028616e
                                                                          SSDEEP:24576:9qDEvCTbMWu7rQYlBQcBiT6rprG8a3MexIUCk:9TvC/MTQYxsWR7a3MYIUC
                                                                          TLSH:CA25AE0273C1D062FF9B92334F9AF6515BBC69260123A61F13A81D79BE701B1563E7A3
                                                                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                          Icon Hash:aaf3e3e3938382a0
                                                                          Entrypoint:0x420577
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x6768A085 [Sun Dec 22 23:28:05 2024 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:5
                                                                          OS Version Minor:1
                                                                          File Version Major:5
                                                                          File Version Minor:1
                                                                          Subsystem Version Major:5
                                                                          Subsystem Version Minor:1
                                                                          Import Hash:948cc502fe9226992dce9417f952fce3
                                                                          Instruction
                                                                          call 00007F2FD12B7813h
                                                                          jmp 00007F2FD12B711Fh
                                                                          push ebp
                                                                          mov ebp, esp
                                                                          push esi
                                                                          push dword ptr [ebp+08h]
                                                                          mov esi, ecx
                                                                          call 00007F2FD12B72FDh
                                                                          mov dword ptr [esi], 0049FDF0h
                                                                          mov eax, esi
                                                                          pop esi
                                                                          pop ebp
                                                                          retn 0004h
                                                                          and dword ptr [ecx+04h], 00000000h
                                                                          mov eax, ecx
                                                                          and dword ptr [ecx+08h], 00000000h
                                                                          mov dword ptr [ecx+04h], 0049FDF8h
                                                                          mov dword ptr [ecx], 0049FDF0h
                                                                          ret
                                                                          push ebp
                                                                          mov ebp, esp
                                                                          push esi
                                                                          push dword ptr [ebp+08h]
                                                                          mov esi, ecx
                                                                          call 00007F2FD12B72CAh
                                                                          mov dword ptr [esi], 0049FE0Ch
                                                                          mov eax, esi
                                                                          pop esi
                                                                          pop ebp
                                                                          retn 0004h
                                                                          and dword ptr [ecx+04h], 00000000h
                                                                          mov eax, ecx
                                                                          and dword ptr [ecx+08h], 00000000h
                                                                          mov dword ptr [ecx+04h], 0049FE14h
                                                                          mov dword ptr [ecx], 0049FE0Ch
                                                                          ret
                                                                          push ebp
                                                                          mov ebp, esp
                                                                          push esi
                                                                          mov esi, ecx
                                                                          lea eax, dword ptr [esi+04h]
                                                                          mov dword ptr [esi], 0049FDD0h
                                                                          and dword ptr [eax], 00000000h
                                                                          and dword ptr [eax+04h], 00000000h
                                                                          push eax
                                                                          mov eax, dword ptr [ebp+08h]
                                                                          add eax, 04h
                                                                          push eax
                                                                          call 00007F2FD12B9EBDh
                                                                          pop ecx
                                                                          pop ecx
                                                                          mov eax, esi
                                                                          pop esi
                                                                          pop ebp
                                                                          retn 0004h
                                                                          lea eax, dword ptr [ecx+04h]
                                                                          mov dword ptr [ecx], 0049FDD0h
                                                                          push eax
                                                                          call 00007F2FD12B9F08h
                                                                          pop ecx
                                                                          ret
                                                                          push ebp
                                                                          mov ebp, esp
                                                                          push esi
                                                                          mov esi, ecx
                                                                          lea eax, dword ptr [esi+04h]
                                                                          mov dword ptr [esi], 0049FDD0h
                                                                          push eax
                                                                          call 00007F2FD12B9EF1h
                                                                          test byte ptr [ebp+08h], 00000001h
                                                                          pop ecx
                                                                          Programming Language:
                                                                          • [ C ] VS2008 SP1 build 30729
                                                                          • [IMP] VS2008 SP1 build 30729
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x22c68.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xf70000x7594.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .rsrc0xd40000x22c680x22e001e9369cff1ca86a2058de132f7d18734False0.8100008400537635data7.568860966929109IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0xf70000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                          RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                          RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                          RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                          RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                          RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                          RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                          RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                          RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                          RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                          RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                          RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                          RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                          RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                          RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                          RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                          RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                          RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                          RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                          RT_RCDATA0xdc7b80x19f2edata1.0003857516512051
                                                                          RT_GROUP_ICON0xf66e80x76dataEnglishGreat Britain0.6610169491525424
                                                                          RT_GROUP_ICON0xf67600x14dataEnglishGreat Britain1.25
                                                                          RT_GROUP_ICON0xf67740x14dataEnglishGreat Britain1.15
                                                                          RT_GROUP_ICON0xf67880x14dataEnglishGreat Britain1.25
                                                                          RT_VERSION0xf679c0xdcdataEnglishGreat Britain0.6181818181818182
                                                                          RT_MANIFEST0xf68780x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                          DLLImport
                                                                          WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                          MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                          WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                          PSAPI.DLLGetProcessMemoryInfo
                                                                          IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                          USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                          UxTheme.dllIsThemeActive
                                                                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                          USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                          GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                          SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                          OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          EnglishGreat Britain
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2024-12-24T00:25:13.665092+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730193.122.6.16880TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 24, 2024 00:25:03.778125048 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 24, 2024 00:25:03.897664070 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 24, 2024 00:25:03.897773981 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 24, 2024 00:25:03.898113966 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 24, 2024 00:25:04.017611027 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 24, 2024 00:25:10.440392971 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 24, 2024 00:25:10.448407888 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 24, 2024 00:25:10.569942951 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 24, 2024 00:25:13.609966040 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 24, 2024 00:25:13.665091991 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 24, 2024 00:25:13.757952929 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 24, 2024 00:25:13.757972956 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 24, 2024 00:25:13.758048058 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 24, 2024 00:25:13.768800974 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 24, 2024 00:25:13.768815041 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 24, 2024 00:25:14.993458033 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 24, 2024 00:25:14.993542910 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 24, 2024 00:25:15.000452995 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 24, 2024 00:25:15.000462055 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 24, 2024 00:25:15.000916004 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 24, 2024 00:25:15.055593967 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 24, 2024 00:25:15.061484098 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 24, 2024 00:25:15.107330084 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 24, 2024 00:25:15.439342022 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 24, 2024 00:25:15.439423084 CET44349731172.67.177.134192.168.2.4
                                                                          Dec 24, 2024 00:25:15.439481974 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 24, 2024 00:25:15.449326038 CET49731443192.168.2.4172.67.177.134
                                                                          Dec 24, 2024 00:26:18.610745907 CET8049730193.122.6.168192.168.2.4
                                                                          Dec 24, 2024 00:26:18.610958099 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 24, 2024 00:26:53.618545055 CET4973080192.168.2.4193.122.6.168
                                                                          Dec 24, 2024 00:26:53.738219976 CET8049730193.122.6.168192.168.2.4
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 24, 2024 00:25:03.633675098 CET5486953192.168.2.41.1.1.1
                                                                          Dec 24, 2024 00:25:03.770874023 CET53548691.1.1.1192.168.2.4
                                                                          Dec 24, 2024 00:25:13.611897945 CET6022853192.168.2.41.1.1.1
                                                                          Dec 24, 2024 00:25:13.756112099 CET53602281.1.1.1192.168.2.4
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Dec 24, 2024 00:25:03.633675098 CET192.168.2.41.1.1.10x4691Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                          Dec 24, 2024 00:25:13.611897945 CET192.168.2.41.1.1.10x547cStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Dec 24, 2024 00:25:03.770874023 CET1.1.1.1192.168.2.40x4691No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                          Dec 24, 2024 00:25:03.770874023 CET1.1.1.1192.168.2.40x4691No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                          Dec 24, 2024 00:25:03.770874023 CET1.1.1.1192.168.2.40x4691No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                          Dec 24, 2024 00:25:03.770874023 CET1.1.1.1192.168.2.40x4691No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                          Dec 24, 2024 00:25:03.770874023 CET1.1.1.1192.168.2.40x4691No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                          Dec 24, 2024 00:25:03.770874023 CET1.1.1.1192.168.2.40x4691No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                          Dec 24, 2024 00:25:13.756112099 CET1.1.1.1192.168.2.40x547cNo error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                          Dec 24, 2024 00:25:13.756112099 CET1.1.1.1192.168.2.40x547cNo error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                          • reallyfreegeoip.org
                                                                          • checkip.dyndns.org
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.449730193.122.6.168806888C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 24, 2024 00:25:03.898113966 CET151OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Connection: Keep-Alive
                                                                          Dec 24, 2024 00:25:10.440392971 CET273INHTTP/1.1 200 OK
                                                                          Date: Mon, 23 Dec 2024 23:25:10 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 104
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                          Dec 24, 2024 00:25:10.448407888 CET127OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Dec 24, 2024 00:25:13.609966040 CET273INHTTP/1.1 200 OK
                                                                          Date: Mon, 23 Dec 2024 23:25:13 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 104
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.449731172.67.177.1344436888C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-12-23 23:25:15 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                          Host: reallyfreegeoip.org
                                                                          Connection: Keep-Alive
                                                                          2024-12-23 23:25:15 UTC864INHTTP/1.1 200 OK
                                                                          Date: Mon, 23 Dec 2024 23:25:15 GMT
                                                                          Content-Type: text/xml
                                                                          Content-Length: 362
                                                                          Connection: close
                                                                          Age: 311104
                                                                          Cache-Control: max-age=31536000
                                                                          cf-cache-status: HIT
                                                                          last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5PzUpm0%2BeL2FYNzYg2CU8E1k1RdK9NOsUxU0%2FUKdXLuEpGLSS0tUhhJ%2B%2BcFdWOujArtu0X92CZx7qFxw%2BvriJGg%2FXlTGuj1scRh8MNJDOG1GctXlxWJ2m1Zb%2BGjwjgz0%2FpWA8zEJ"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8f6c1c1a6bae41e9-EWR
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1800&min_rtt=1761&rtt_var=688&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1658148&cwnd=249&unsent_bytes=0&cid=687cfa94290c213c&ts=462&x=0"
                                                                          2024-12-23 23:25:15 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:18:24:59
                                                                          Start date:23/12/2024
                                                                          Path:C:\Users\user\Desktop\EPIRTURMEROOO0060.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\EPIRTURMEROOO0060.exe"
                                                                          Imagebase:0xf30000
                                                                          File size:1'021'952 bytes
                                                                          MD5 hash:6B2561C0B680C9E681B71663CD6AFB1E
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.1720260774.0000000000C80000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:1
                                                                          Start time:18:25:02
                                                                          Start date:23/12/2024
                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\EPIRTURMEROOO0060.exe"
                                                                          Imagebase:0xdb0000
                                                                          File size:45'984 bytes
                                                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2948549193.0000000003295000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.2947695905.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:3.4%
                                                                            Dynamic/Decrypted Code Coverage:0.4%
                                                                            Signature Coverage:3%
                                                                            Total number of Nodes:2000
                                                                            Total number of Limit Nodes:57
                                                                            execution_graph 91896 f31033 91901 f34c91 91896->91901 91900 f31042 91909 f3a961 91901->91909 91906 f34d9c 91907 f31038 91906->91907 91917 f351f7 22 API calls __fread_nolock 91906->91917 91908 f500a3 29 API calls __onexit 91907->91908 91908->91900 91918 f4fe0b 91909->91918 91911 f3a976 91928 f4fddb 91911->91928 91913 f34cff 91914 f33af0 91913->91914 91953 f33b1c 91914->91953 91917->91906 91920 f4fddb 91918->91920 91921 f4fdfa 91920->91921 91924 f4fdfc 91920->91924 91938 f5ea0c 91920->91938 91945 f54ead 7 API calls 2 library calls 91920->91945 91921->91911 91923 f5066d 91947 f532a4 RaiseException 91923->91947 91924->91923 91946 f532a4 RaiseException 91924->91946 91927 f5068a 91927->91911 91930 f4fde0 91928->91930 91929 f5ea0c ___std_exception_copy 21 API calls 91929->91930 91930->91929 91931 f4fdfa 91930->91931 91934 f4fdfc 91930->91934 91950 f54ead 7 API calls 2 library calls 91930->91950 91931->91913 91933 f5066d 91952 f532a4 RaiseException 91933->91952 91934->91933 91951 f532a4 RaiseException 91934->91951 91937 f5068a 91937->91913 91942 f63820 _free 91938->91942 91939 f6385e 91949 f5f2d9 20 API calls _free 91939->91949 91940 f63849 RtlAllocateHeap 91940->91942 91943 f6385c 91940->91943 91942->91939 91942->91940 91948 f54ead 7 API calls 2 library calls 91942->91948 91943->91920 91945->91920 91946->91923 91947->91927 91948->91942 91949->91943 91950->91930 91951->91933 91952->91937 91954 f33b0f 91953->91954 91955 f33b29 91953->91955 91954->91906 91955->91954 91956 f33b30 RegOpenKeyExW 91955->91956 91956->91954 91957 f33b4a RegQueryValueExW 91956->91957 91958 f33b80 RegCloseKey 91957->91958 91959 f33b6b 91957->91959 91958->91954 91959->91958 91960 f825fb 91963 f82605 91960->91963 91961 f3dbaf Sleep 91965 f3dbc0 91961->91965 91975 f3dbcb 91961->91975 91969 f82630 91963->91969 92006 f3d880 91963->92006 92151 f4e300 23 API calls 91963->92151 91964 f82b74 Sleep 91966 f82b90 91964->91966 91967 f82b85 91964->91967 92148 f4e551 timeGetTime 91965->92148 91971 f82bdb 91966->91971 92007 f3d9b8 messages 91966->92007 92190 f9d4dc 47 API calls 91966->92190 92189 f4e551 timeGetTime 91967->92189 92152 f39cb3 91969->92152 91979 f82c0b GetExitCodeProcess 91971->91979 91985 f82c51 91971->91985 91971->92007 91977 f82a5a 91975->91977 91978 f82a51 91975->91978 91988 f3dc56 91975->91988 91990 f82a58 91975->91990 91975->92007 92186 fc29bf GetForegroundWindow 91977->92186 92185 fc29bf GetForegroundWindow 91978->92185 91982 f82c21 WaitForSingleObject 91979->91982 91983 f82c37 CloseHandle 91979->91983 91980 f8267c 92159 fa3a2a 23 API calls 91980->92159 91982->91983 91982->92007 91983->91985 91986 f82ca9 Sleep 91985->91986 91986->92007 91988->92007 91989 f82b47 92188 f9e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 91989->92188 91990->91988 91990->91989 91990->92007 92187 fb5658 23 API calls 91990->92187 91994 f828ce 92160 f3ec40 91994->92160 91995 f3dae8 91999 f3daf9 messages 91995->91999 91995->92007 91999->91961 92000 f3dac8 92184 fa359c 82 API calls __wsopen_s 92000->92184 92003 f81dda timeGetTime 92149 f4e300 23 API calls 92003->92149 92005 f3da04 timeGetTime 92005->92006 92006->91961 92006->91964 92006->91994 92006->91995 92006->92000 92006->92003 92006->92005 92006->92007 92009 f3dfd0 92006->92009 92032 f41310 92006->92032 92089 f3dd50 256 API calls 92006->92089 92090 f3bf40 92006->92090 92150 fa3a2a 23 API calls 92006->92150 92010 f3e010 92009->92010 92028 f3e0dc messages 92010->92028 92197 f50242 5 API calls __Init_thread_wait 92010->92197 92013 f82fca 92015 f3a961 22 API calls 92013->92015 92013->92028 92014 f3a961 22 API calls 92014->92028 92017 f82fe4 92015->92017 92198 f500a3 29 API calls __onexit 92017->92198 92020 f82fee 92199 f501f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92020->92199 92024 f3ec40 256 API calls 92024->92028 92026 f404f0 22 API calls 92026->92028 92027 f3e3e1 92027->92006 92028->92014 92028->92024 92028->92026 92028->92027 92029 fa359c 82 API calls 92028->92029 92191 f3a8c7 92028->92191 92195 f3a81b 41 API calls 92028->92195 92196 f4a308 256 API calls 92028->92196 92200 f50242 5 API calls __Init_thread_wait 92028->92200 92201 f500a3 29 API calls __onexit 92028->92201 92202 f501f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92028->92202 92203 fb47d4 256 API calls 92028->92203 92204 fb68c1 256 API calls 92028->92204 92029->92028 92033 f41376 92032->92033 92034 f417b0 92032->92034 92036 f41390 92033->92036 92037 f86331 92033->92037 92434 f50242 5 API calls __Init_thread_wait 92034->92434 92205 f41940 92036->92205 92038 f8633d 92037->92038 92439 fb709c 256 API calls 92037->92439 92038->92006 92040 f417ba 92042 f417fb 92040->92042 92044 f39cb3 22 API calls 92040->92044 92047 f86346 92042->92047 92049 f4182c 92042->92049 92053 f417d4 92044->92053 92045 f41940 9 API calls 92046 f413b6 92045->92046 92046->92042 92048 f413ec 92046->92048 92440 fa359c 82 API calls __wsopen_s 92047->92440 92048->92047 92073 f41408 __fread_nolock 92048->92073 92436 f3aceb 23 API calls messages 92049->92436 92052 f41839 92437 f4d217 256 API calls 92052->92437 92435 f501f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92053->92435 92056 f8636e 92441 fa359c 82 API calls __wsopen_s 92056->92441 92057 f4152f 92059 f4153c 92057->92059 92060 f863d1 92057->92060 92063 f41940 9 API calls 92059->92063 92443 fb5745 54 API calls _wcslen 92060->92443 92061 f41872 92438 f4faeb 23 API calls 92061->92438 92065 f41549 92063->92065 92064 f4fddb 22 API calls 92064->92073 92069 f41940 9 API calls 92065->92069 92077 f415c7 messages 92065->92077 92066 f4fe0b 22 API calls 92066->92073 92067 f4171d 92067->92006 92072 f41563 92069->92072 92071 f3ec40 256 API calls 92071->92073 92072->92077 92080 f3a8c7 22 API calls 92072->92080 92073->92052 92073->92056 92073->92057 92073->92064 92073->92066 92073->92071 92074 f863b2 92073->92074 92073->92077 92442 fa359c 82 API calls __wsopen_s 92074->92442 92076 f41940 9 API calls 92076->92077 92077->92061 92077->92076 92079 f4167b messages 92077->92079 92215 faf0ec 92077->92215 92224 fb958b 92077->92224 92227 fb959f 92077->92227 92230 fa744a 92077->92230 92287 f9d4ce 92077->92287 92290 fa6ef1 92077->92290 92370 f34f39 92077->92370 92376 f4effa 92077->92376 92444 fa359c 82 API calls __wsopen_s 92077->92444 92079->92067 92433 f4ce17 22 API calls messages 92079->92433 92080->92077 92089->92006 93653 f3adf0 92090->93653 92092 f3bf9d 92093 f3bfa9 92092->92093 92094 f804b6 92092->92094 92096 f804c6 92093->92096 92097 f3c01e 92093->92097 93672 fa359c 82 API calls __wsopen_s 92094->93672 93673 fa359c 82 API calls __wsopen_s 92096->93673 93658 f3ac91 92097->93658 92101 f3c7da 92104 f4fe0b 22 API calls 92101->92104 92113 f3c808 __fread_nolock 92104->92113 92107 f804f5 92110 f8055a 92107->92110 93674 f4d217 256 API calls 92107->93674 92109 f3af8a 22 API calls 92132 f3c039 __fread_nolock messages 92109->92132 92147 f3c603 92110->92147 93675 fa359c 82 API calls __wsopen_s 92110->93675 92111 f8091a 93685 fa3209 23 API calls 92111->93685 92112 f4fe0b 22 API calls 92139 f3c350 __fread_nolock messages 92112->92139 92113->92112 92114 f97120 22 API calls 92114->92132 92117 f3ec40 256 API calls 92117->92132 92118 f808a5 92119 f3ec40 256 API calls 92118->92119 92121 f808cf 92119->92121 92121->92147 93683 f3a81b 41 API calls 92121->93683 92122 f80591 93676 fa359c 82 API calls __wsopen_s 92122->93676 92123 f808f6 93684 fa359c 82 API calls __wsopen_s 92123->93684 92128 f3bbe0 40 API calls 92128->92132 92129 f3c3ac 92129->92006 92131 f3c237 92133 f3c253 92131->92133 92134 f3a8c7 22 API calls 92131->92134 92132->92101 92132->92107 92132->92109 92132->92110 92132->92111 92132->92113 92132->92114 92132->92117 92132->92118 92132->92122 92132->92123 92132->92128 92132->92131 92135 f4fddb 22 API calls 92132->92135 92140 f809bf 92132->92140 92146 f4fe0b 22 API calls 92132->92146 92132->92147 93662 f3ad81 92132->93662 93677 f97099 22 API calls __fread_nolock 92132->93677 93678 fb5745 54 API calls _wcslen 92132->93678 93679 f4aa42 22 API calls messages 92132->93679 93680 f9f05c 40 API calls 92132->93680 93681 f3a993 41 API calls 92132->93681 93682 f3aceb 23 API calls messages 92132->93682 92136 f80976 92133->92136 92142 f3c297 messages 92133->92142 92134->92133 92135->92132 93686 f3aceb 23 API calls messages 92136->93686 92139->92129 93671 f4ce17 22 API calls messages 92139->93671 92140->92147 93687 fa359c 82 API calls __wsopen_s 92140->93687 92142->92140 93669 f3aceb 23 API calls messages 92142->93669 92143 f3c335 92143->92140 92144 f3c342 92143->92144 93670 f3a704 22 API calls messages 92144->93670 92146->92132 92147->92006 92148->91975 92149->92006 92150->92006 92151->91963 92153 f39cc2 _wcslen 92152->92153 92154 f4fe0b 22 API calls 92153->92154 92155 f39cea __fread_nolock 92154->92155 92156 f4fddb 22 API calls 92155->92156 92157 f39d00 92156->92157 92158 f3a993 41 API calls 92157->92158 92158->91980 92159->92007 92181 f3ec76 messages 92160->92181 92161 f50242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 92161->92181 92162 f500a3 29 API calls pre_c_initialization 92162->92181 92163 f501f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 92163->92181 92164 f4fddb 22 API calls 92164->92181 92165 f84beb 93701 fa359c 82 API calls __wsopen_s 92165->93701 92166 f3fef7 92172 f3a8c7 22 API calls 92166->92172 92178 f3ed9d messages 92166->92178 92169 f84600 92176 f3a8c7 22 API calls 92169->92176 92169->92178 92170 f84b0b 93699 fa359c 82 API calls __wsopen_s 92170->93699 92171 f3f3ae messages 92171->92178 93698 fa359c 82 API calls __wsopen_s 92171->93698 92172->92178 92175 f3a8c7 22 API calls 92175->92181 92176->92178 92178->92000 92179 f3fbe3 92179->92171 92179->92178 92182 f84bdc 92179->92182 92180 f3a961 22 API calls 92180->92181 92181->92161 92181->92162 92181->92163 92181->92164 92181->92165 92181->92166 92181->92169 92181->92170 92181->92171 92181->92175 92181->92178 92181->92179 92181->92180 93696 f401e0 256 API calls 2 library calls 92181->93696 93697 f406a0 41 API calls messages 92181->93697 93700 fa359c 82 API calls __wsopen_s 92182->93700 92184->92007 92185->91990 92186->91990 92187->91989 92188->91988 92189->91966 92190->91971 92192 f3a8db 92191->92192 92194 f3a8ea __fread_nolock 92191->92194 92193 f4fe0b 22 API calls 92192->92193 92192->92194 92193->92194 92194->92028 92195->92028 92196->92028 92197->92013 92198->92020 92199->92028 92200->92028 92201->92028 92202->92028 92203->92028 92204->92028 92206 f41981 92205->92206 92207 f4195d 92205->92207 92445 f50242 5 API calls __Init_thread_wait 92206->92445 92214 f413a0 92207->92214 92447 f50242 5 API calls __Init_thread_wait 92207->92447 92209 f4198b 92209->92207 92446 f501f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92209->92446 92211 f48727 92211->92214 92448 f501f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92211->92448 92214->92045 92449 f37510 92215->92449 92219 faf136 92220 faf15b 92219->92220 92221 f3ec40 256 API calls 92219->92221 92223 faf15f 92220->92223 92500 f39c6e 92220->92500 92221->92220 92223->92077 92572 fb7f59 92224->92572 92226 fb959b 92226->92077 92228 fb7f59 120 API calls 92227->92228 92229 fb95af 92228->92229 92229->92077 92231 fa7474 92230->92231 92232 fa7469 92230->92232 92235 f3a961 22 API calls 92231->92235 92271 fa7554 92231->92271 92705 f3b567 92232->92705 92234 f4fddb 22 API calls 92236 fa7587 92234->92236 92237 fa7495 92235->92237 92238 f4fe0b 22 API calls 92236->92238 92239 f3a961 22 API calls 92237->92239 92240 fa7598 92238->92240 92241 fa749e 92239->92241 92678 f36246 92240->92678 92243 f37510 53 API calls 92241->92243 92245 fa74aa 92243->92245 92710 f3525f 92245->92710 92246 f3a961 22 API calls 92248 fa75ab 92246->92248 92249 f36246 CloseHandle 92248->92249 92251 fa75b2 92249->92251 92250 fa74bf 92752 f36350 92250->92752 92253 f37510 53 API calls 92251->92253 92255 fa75be 92253->92255 92257 f36246 CloseHandle 92255->92257 92256 fa754a 92260 f3b567 39 API calls 92256->92260 92262 fa75c8 92257->92262 92258 f9d4ce 4 API calls 92259 fa7502 92258->92259 92259->92256 92261 fa7506 92259->92261 92260->92271 92263 f39cb3 22 API calls 92261->92263 92682 f35745 92262->92682 92265 fa7513 92263->92265 92761 f9d2c1 26 API calls 92265->92761 92268 fa75ea 92690 f353de 92268->92690 92269 fa76de GetLastError 92270 fa76f7 92269->92270 92765 f36216 CloseHandle messages 92270->92765 92271->92234 92276 fa76a4 92271->92276 92274 fa751c 92274->92256 92275 fa75f8 92762 f353c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 92275->92762 92276->92077 92278 fa7645 92279 f4fddb 22 API calls 92278->92279 92282 fa7679 92279->92282 92280 fa7619 92763 f9ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 92280->92763 92281 fa75ff 92281->92278 92281->92280 92283 f3a961 22 API calls 92282->92283 92285 fa7686 92283->92285 92285->92276 92764 f9417d 22 API calls __fread_nolock 92285->92764 92803 f9dbbe lstrlenW 92287->92803 92291 f3a961 22 API calls 92290->92291 92292 fa6f1d 92291->92292 92293 f3a961 22 API calls 92292->92293 92294 fa6f26 92293->92294 92295 fa6f3a 92294->92295 92296 f3b567 39 API calls 92294->92296 92297 f37510 53 API calls 92295->92297 92296->92295 92304 fa6f57 _wcslen 92297->92304 92298 fa70bf 92808 f34ecb 92298->92808 92299 fa6fbc 92301 f37510 53 API calls 92299->92301 92302 fa6fc8 92301->92302 92307 f3a8c7 22 API calls 92302->92307 92311 fa6fdb 92302->92311 92304->92298 92304->92299 92369 fa70e9 92304->92369 92305 fa70e5 92306 f3a961 22 API calls 92305->92306 92305->92369 92309 fa711a 92306->92309 92307->92311 92308 f34ecb 94 API calls 92308->92305 92310 f3a961 22 API calls 92309->92310 92314 fa7126 92310->92314 92312 fa7027 92311->92312 92315 fa7005 92311->92315 92318 f3a8c7 22 API calls 92311->92318 92313 f37510 53 API calls 92312->92313 92316 fa7034 92313->92316 92317 f3a961 22 API calls 92314->92317 92939 f333c6 92315->92939 92320 fa703d 92316->92320 92321 fa7047 92316->92321 92322 fa712f 92317->92322 92318->92315 92324 f3a8c7 22 API calls 92320->92324 92948 f9e199 GetFileAttributesW 92321->92948 92326 f3a961 22 API calls 92322->92326 92323 fa700f 92327 f37510 53 API calls 92323->92327 92324->92321 92329 fa7138 92326->92329 92330 fa701b 92327->92330 92328 fa7050 92331 fa7063 92328->92331 92334 f34c6d 22 API calls 92328->92334 92332 f37510 53 API calls 92329->92332 92333 f36350 22 API calls 92330->92333 92336 f37510 53 API calls 92331->92336 92341 fa7069 92331->92341 92335 fa7145 92332->92335 92333->92312 92334->92331 92338 f3525f 22 API calls 92335->92338 92337 fa70a0 92336->92337 92949 f9d076 57 API calls 92337->92949 92340 fa7166 92338->92340 92342 f34c6d 22 API calls 92340->92342 92341->92369 92343 fa7175 92342->92343 92344 fa71a9 92343->92344 92346 f34c6d 22 API calls 92343->92346 92345 f3a8c7 22 API calls 92344->92345 92348 fa71ba 92345->92348 92347 fa7186 92346->92347 92347->92344 92350 f36b57 22 API calls 92347->92350 92349 f36350 22 API calls 92348->92349 92351 fa71c8 92349->92351 92352 fa719b 92350->92352 92353 f36350 22 API calls 92351->92353 92354 f36b57 22 API calls 92352->92354 92355 fa71d6 92353->92355 92354->92344 92356 f36350 22 API calls 92355->92356 92357 fa71e4 92356->92357 92358 f37510 53 API calls 92357->92358 92359 fa71f0 92358->92359 92830 f9d7bc 92359->92830 92361 fa7201 92362 f9d4ce 4 API calls 92361->92362 92363 fa720b 92362->92363 92364 f37510 53 API calls 92363->92364 92368 fa7239 92363->92368 92365 fa7229 92364->92365 92884 fa2947 92365->92884 92367 f34f39 68 API calls 92367->92369 92368->92367 92369->92077 92371 f34f43 92370->92371 92373 f34f4a 92370->92373 92372 f5e678 67 API calls 92371->92372 92372->92373 92374 f34f6a FreeLibrary 92373->92374 92375 f34f59 92373->92375 92374->92375 92375->92077 92377 f39c6e 22 API calls 92376->92377 92378 f4f012 92377->92378 92379 f8f0a8 92378->92379 92381 f4fddb 22 API calls 92378->92381 92384 f4f0a4 92379->92384 93600 fa9caa 39 API calls 92379->93600 92382 f4f02b 92381->92382 92383 f4fe0b 22 API calls 92382->92383 92385 f4f03c 92383->92385 92388 f3b567 39 API calls 92384->92388 92392 f4f0b1 92384->92392 92386 f36246 CloseHandle 92385->92386 92387 f4f047 92386->92387 92389 f3a961 22 API calls 92387->92389 92390 f8f10a 92388->92390 92391 f4f04f 92389->92391 92390->92392 92393 f8f112 92390->92393 92394 f36246 CloseHandle 92391->92394 92395 f4fa5b 3 API calls 92392->92395 92396 f3b567 39 API calls 92393->92396 92397 f4f056 92394->92397 92401 f4f0b8 92395->92401 92396->92401 92398 f37510 53 API calls 92397->92398 92399 f4f062 92398->92399 92400 f36246 CloseHandle 92399->92400 92402 f4f06c 92400->92402 92403 f4f0d3 92401->92403 92404 f8f127 92401->92404 92405 f35745 5 API calls 92402->92405 92406 f36270 22 API calls 92403->92406 92407 f4fe0b 22 API calls 92404->92407 92409 f4f07d 92405->92409 92410 f4f0db 92406->92410 92408 f8f12c 92407->92408 92412 f8f140 92408->92412 93601 f4f866 ReadFile SetFilePointerEx 92408->93601 92413 f4f085 92409->92413 92414 f8f0a0 92409->92414 93581 f4f141 92410->93581 92423 f8f144 __fread_nolock 92412->92423 93602 fa0e85 22 API calls ___scrt_fastfail 92412->93602 92419 f353de 27 API calls 92413->92419 93599 f36216 CloseHandle messages 92414->93599 92415 f4f0ea 92415->92423 93596 f362b5 22 API calls 92415->93596 92421 f4f093 92419->92421 93595 f353c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 92421->93595 92424 f4f0fe 92427 f4f138 92424->92427 92428 f36246 CloseHandle 92424->92428 92425 f8f069 93598 f9ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 92425->93598 92426 f4f09a 92426->92384 92426->92425 92427->92077 92430 f4f12c 92428->92430 92430->92427 93597 f36216 CloseHandle messages 92430->93597 92431 f8f080 92431->92384 92433->92079 92434->92040 92435->92042 92436->92052 92437->92061 92438->92061 92439->92038 92440->92077 92441->92077 92442->92077 92443->92072 92444->92077 92445->92209 92446->92207 92447->92211 92448->92214 92450 f37525 92449->92450 92466 f37522 92449->92466 92451 f3755b 92450->92451 92452 f3752d 92450->92452 92453 f750f6 92451->92453 92456 f3756d 92451->92456 92463 f7500f 92451->92463 92514 f551c6 26 API calls 92452->92514 92517 f55183 26 API calls 92453->92517 92515 f4fb21 51 API calls 92456->92515 92457 f3753d 92460 f4fddb 22 API calls 92457->92460 92458 f7510e 92458->92458 92462 f37547 92460->92462 92464 f39cb3 22 API calls 92462->92464 92465 f4fe0b 22 API calls 92463->92465 92471 f75088 92463->92471 92464->92466 92467 f75058 92465->92467 92472 f39e90 92466->92472 92468 f4fddb 22 API calls 92467->92468 92469 f7507f 92468->92469 92470 f39cb3 22 API calls 92469->92470 92470->92471 92516 f4fb21 51 API calls 92471->92516 92518 f36270 92472->92518 92474 f39fd2 92524 f3a4a1 92474->92524 92476 f39fec 92476->92219 92479 f3a6c3 22 API calls 92499 f39eb5 92479->92499 92480 f7f7c4 92547 f996e2 84 API calls __wsopen_s 92480->92547 92481 f7f699 92487 f4fddb 22 API calls 92481->92487 92483 f3a405 92483->92476 92548 f996e2 84 API calls __wsopen_s 92483->92548 92486 f7f7d2 92489 f3a4a1 22 API calls 92486->92489 92488 f7f754 92487->92488 92491 f4fe0b 22 API calls 92488->92491 92490 f7f7e8 92489->92490 92490->92476 92493 f3a12c __fread_nolock 92491->92493 92493->92480 92493->92483 92495 f3a4a1 22 API calls 92495->92499 92497 f3a0db CharUpperBuffW 92543 f3a673 22 API calls 92497->92543 92499->92474 92499->92479 92499->92480 92499->92481 92499->92483 92499->92493 92499->92495 92523 f34573 41 API calls _wcslen 92499->92523 92532 f3a587 92499->92532 92537 f3aec9 92499->92537 92544 f348c8 23 API calls 92499->92544 92545 f349bd 22 API calls __fread_nolock 92499->92545 92546 f3a673 22 API calls 92499->92546 92501 f7f545 92500->92501 92502 f39c7e 92500->92502 92503 f7f556 92501->92503 92549 f36b57 92501->92549 92507 f4fddb 22 API calls 92502->92507 92561 f3a6c3 92503->92561 92506 f7f560 92506->92506 92508 f39c91 92507->92508 92509 f39c9a 92508->92509 92510 f39cac 92508->92510 92512 f39cb3 22 API calls 92509->92512 92511 f3a961 22 API calls 92510->92511 92513 f39ca2 92511->92513 92512->92513 92513->92223 92514->92457 92515->92457 92516->92453 92517->92458 92519 f4fe0b 22 API calls 92518->92519 92520 f36295 92519->92520 92521 f4fddb 22 API calls 92520->92521 92522 f362a3 92521->92522 92522->92499 92523->92499 92525 f3a52b 92524->92525 92531 f3a4b1 __fread_nolock 92524->92531 92527 f4fe0b 22 API calls 92525->92527 92526 f4fddb 22 API calls 92528 f3a4b8 92526->92528 92527->92531 92529 f4fddb 22 API calls 92528->92529 92530 f3a4d6 92528->92530 92529->92530 92530->92476 92531->92526 92533 f3a598 __fread_nolock 92532->92533 92534 f3a59d 92532->92534 92533->92499 92535 f7f80f 92534->92535 92536 f4fe0b 22 API calls 92534->92536 92536->92533 92538 f3aed9 __fread_nolock 92537->92538 92539 f3aedc 92537->92539 92538->92497 92540 f4fddb 22 API calls 92539->92540 92541 f3aee7 92540->92541 92542 f4fe0b 22 API calls 92541->92542 92542->92538 92543->92499 92544->92499 92545->92499 92546->92499 92547->92486 92548->92476 92550 f36b67 _wcslen 92549->92550 92551 f74ba1 92549->92551 92554 f36ba2 92550->92554 92555 f36b7d 92550->92555 92568 f393b2 92551->92568 92553 f74baa 92553->92553 92557 f4fddb 22 API calls 92554->92557 92567 f36f34 22 API calls 92555->92567 92558 f36bae 92557->92558 92560 f4fe0b 22 API calls 92558->92560 92559 f36b85 __fread_nolock 92559->92503 92560->92559 92562 f3a6d0 92561->92562 92563 f3a6dd 92561->92563 92562->92506 92564 f4fddb 22 API calls 92563->92564 92565 f3a6e7 92564->92565 92566 f4fe0b 22 API calls 92565->92566 92566->92562 92567->92559 92569 f393c0 92568->92569 92571 f393c9 __fread_nolock 92568->92571 92570 f3aec9 22 API calls 92569->92570 92569->92571 92570->92571 92571->92553 92573 f37510 53 API calls 92572->92573 92574 fb7f90 92573->92574 92577 fb7fd5 messages 92574->92577 92610 fb8cd3 92574->92610 92576 fb8049 92576->92577 92583 f37510 53 API calls 92576->92583 92597 fb8281 92576->92597 92642 f9417d 22 API calls __fread_nolock 92576->92642 92643 fb851d 42 API calls _strftime 92576->92643 92577->92226 92578 fb844f 92651 fb8ee4 60 API calls 92578->92651 92579 fb828f 92623 fb7e86 92579->92623 92582 fb845e 92582->92579 92584 fb846a 92582->92584 92583->92576 92584->92577 92589 fb82c8 92638 f4fc70 92589->92638 92592 fb82e8 92644 fa359c 82 API calls __wsopen_s 92592->92644 92593 fb8302 92645 f363eb 22 API calls 92593->92645 92596 fb82f3 GetCurrentProcess TerminateProcess 92596->92593 92597->92578 92597->92579 92598 fb8311 92646 f36a50 22 API calls 92598->92646 92600 fb832a 92609 fb8352 92600->92609 92647 f404f0 22 API calls 92600->92647 92602 fb84c5 92602->92577 92605 fb84d9 FreeLibrary 92602->92605 92603 fb8341 92648 fb8b7b 75 API calls 92603->92648 92605->92577 92609->92602 92649 f404f0 22 API calls 92609->92649 92650 f3aceb 23 API calls messages 92609->92650 92652 fb8b7b 75 API calls 92609->92652 92611 f3aec9 22 API calls 92610->92611 92612 fb8cee CharLowerBuffW 92611->92612 92653 f98e54 92612->92653 92616 f3a961 22 API calls 92617 fb8d2a 92616->92617 92660 f36d25 92617->92660 92619 fb8d3e 92620 f393b2 22 API calls 92619->92620 92622 fb8d48 _wcslen 92620->92622 92621 fb8e5e _wcslen 92621->92576 92622->92621 92673 fb851d 42 API calls _strftime 92622->92673 92624 fb7ea1 92623->92624 92628 fb7eec 92623->92628 92625 f4fe0b 22 API calls 92624->92625 92626 fb7ec3 92625->92626 92627 f4fddb 22 API calls 92626->92627 92626->92628 92627->92626 92629 fb9096 92628->92629 92630 fb92ab messages 92629->92630 92635 fb90ba _strcat _wcslen 92629->92635 92630->92589 92631 f3b567 39 API calls 92631->92635 92632 f3b38f 39 API calls 92632->92635 92633 f3b6b5 39 API calls 92633->92635 92634 f37510 53 API calls 92634->92635 92635->92630 92635->92631 92635->92632 92635->92633 92635->92634 92636 f5ea0c 21 API calls ___std_exception_copy 92635->92636 92677 f9efae 24 API calls _wcslen 92635->92677 92636->92635 92639 f4fc85 92638->92639 92640 f4fd1d VirtualProtect 92639->92640 92641 f4fceb 92639->92641 92640->92641 92641->92592 92641->92593 92642->92576 92643->92576 92644->92596 92645->92598 92646->92600 92647->92603 92648->92609 92649->92609 92650->92609 92651->92582 92652->92609 92654 f98e74 _wcslen 92653->92654 92655 f98f63 92654->92655 92658 f98ea9 92654->92658 92659 f98f68 92654->92659 92655->92616 92655->92622 92658->92655 92674 f4ce60 41 API calls 92658->92674 92659->92655 92675 f4ce60 41 API calls 92659->92675 92661 f36d91 92660->92661 92662 f36d34 92660->92662 92663 f393b2 22 API calls 92661->92663 92662->92661 92664 f36d3f 92662->92664 92665 f36d62 __fread_nolock 92663->92665 92666 f36d5a 92664->92666 92667 f74c9d 92664->92667 92665->92619 92676 f36f34 22 API calls 92666->92676 92668 f4fddb 22 API calls 92667->92668 92670 f74ca7 92668->92670 92671 f4fe0b 22 API calls 92670->92671 92672 f74cda 92671->92672 92673->92621 92674->92658 92675->92659 92676->92665 92677->92635 92679 f36250 92678->92679 92680 f3625f 92678->92680 92679->92246 92680->92679 92681 f36264 CloseHandle 92680->92681 92681->92679 92683 f74035 92682->92683 92684 f3575c CreateFileW 92682->92684 92685 f3577b 92683->92685 92686 f7403b CreateFileW 92683->92686 92684->92685 92685->92268 92685->92269 92686->92685 92687 f74063 92686->92687 92766 f354c6 92687->92766 92691 f353f3 92690->92691 92704 f353f0 messages 92690->92704 92692 f354c6 3 API calls 92691->92692 92691->92704 92693 f35410 92692->92693 92694 f73f4b 92693->92694 92695 f3541d 92693->92695 92781 f4fa5b 92694->92781 92696 f4fe0b 22 API calls 92695->92696 92698 f35429 92696->92698 92772 f35722 92698->92772 92703 f354c6 3 API calls 92703->92704 92704->92275 92706 f3b578 92705->92706 92707 f3b57f 92705->92707 92706->92707 92787 f562d1 39 API calls 92706->92787 92707->92231 92709 f3b5c2 92709->92231 92711 f3a961 22 API calls 92710->92711 92712 f35275 92711->92712 92713 f3a961 22 API calls 92712->92713 92714 f3527d 92713->92714 92715 f3a961 22 API calls 92714->92715 92716 f35285 92715->92716 92717 f3a961 22 API calls 92716->92717 92718 f3528d 92717->92718 92719 f73df5 92718->92719 92720 f352c1 92718->92720 92721 f3a8c7 22 API calls 92719->92721 92722 f36d25 22 API calls 92720->92722 92723 f73dfe 92721->92723 92724 f352cf 92722->92724 92725 f3a6c3 22 API calls 92723->92725 92726 f393b2 22 API calls 92724->92726 92728 f35304 92725->92728 92727 f352d9 92726->92727 92727->92728 92729 f36d25 22 API calls 92727->92729 92730 f35349 92728->92730 92731 f35325 92728->92731 92738 f73e20 92728->92738 92733 f352fa 92729->92733 92732 f36d25 22 API calls 92730->92732 92731->92730 92788 f34c6d 92731->92788 92734 f3535a 92732->92734 92735 f393b2 22 API calls 92733->92735 92736 f35370 92734->92736 92742 f3a8c7 22 API calls 92734->92742 92735->92728 92739 f35384 92736->92739 92744 f3a8c7 22 API calls 92736->92744 92741 f36b57 22 API calls 92738->92741 92743 f3538f 92739->92743 92746 f3a8c7 22 API calls 92739->92746 92747 f73ee0 92741->92747 92742->92736 92748 f3a8c7 22 API calls 92743->92748 92750 f3539a 92743->92750 92744->92739 92745 f36d25 22 API calls 92745->92730 92746->92743 92747->92730 92749 f34c6d 22 API calls 92747->92749 92791 f349bd 22 API calls __fread_nolock 92747->92791 92748->92750 92749->92747 92750->92250 92753 f36362 92752->92753 92754 f74a51 92752->92754 92792 f36373 92753->92792 92802 f34a88 22 API calls __fread_nolock 92754->92802 92757 f3636e 92757->92256 92757->92258 92758 f74a5b 92759 f3a8c7 22 API calls 92758->92759 92760 f74a67 92758->92760 92759->92760 92761->92274 92762->92281 92763->92278 92764->92276 92765->92276 92771 f354dd 92766->92771 92767 f35564 SetFilePointerEx SetFilePointerEx 92769 f35530 92767->92769 92768 f73f9c SetFilePointerEx 92769->92685 92770 f73f8b 92770->92768 92771->92767 92771->92768 92771->92769 92771->92770 92773 f4fddb 22 API calls 92772->92773 92774 f35433 92773->92774 92775 f39a40 92774->92775 92776 f39abb 92775->92776 92780 f39a4e 92775->92780 92786 f4e40f SetFilePointerEx 92776->92786 92777 f3543f 92777->92703 92779 f39a8c ReadFile 92779->92777 92779->92780 92780->92777 92780->92779 92782 f354c6 3 API calls 92781->92782 92783 f4fa79 92782->92783 92784 f354c6 3 API calls 92783->92784 92785 f4fa9a 92784->92785 92785->92704 92786->92780 92787->92709 92789 f3aec9 22 API calls 92788->92789 92790 f34c78 92789->92790 92790->92730 92790->92745 92791->92747 92793 f363b6 __fread_nolock 92792->92793 92794 f36382 92792->92794 92793->92757 92794->92793 92795 f74a82 92794->92795 92796 f363a9 92794->92796 92798 f4fddb 22 API calls 92795->92798 92797 f3a587 22 API calls 92796->92797 92797->92793 92799 f74a91 92798->92799 92800 f4fe0b 22 API calls 92799->92800 92801 f74ac5 __fread_nolock 92800->92801 92802->92758 92804 f9dbdc GetFileAttributesW 92803->92804 92805 f9d4d5 92803->92805 92804->92805 92806 f9dbe8 FindFirstFileW 92804->92806 92805->92077 92806->92805 92807 f9dbf9 FindClose 92806->92807 92807->92805 92950 f34e90 LoadLibraryA 92808->92950 92813 f34ef6 LoadLibraryExW 92958 f34e59 LoadLibraryA 92813->92958 92814 f73ccf 92815 f34f39 68 API calls 92814->92815 92817 f73cd6 92815->92817 92819 f34e59 3 API calls 92817->92819 92821 f73cde 92819->92821 92980 f350f5 92821->92980 92822 f34f20 92822->92821 92823 f34f2c 92822->92823 92824 f34f39 68 API calls 92823->92824 92826 f34f31 92824->92826 92826->92305 92826->92308 92829 f73d05 92831 f9d7d8 92830->92831 92832 f9d7f3 92831->92832 92833 f9d7dd 92831->92833 92834 f3a961 22 API calls 92832->92834 92835 f3a8c7 22 API calls 92833->92835 92883 f9d7ee 92833->92883 92836 f9d7fb 92834->92836 92835->92883 92837 f3a961 22 API calls 92836->92837 92838 f9d803 92837->92838 92839 f3a961 22 API calls 92838->92839 92840 f9d80e 92839->92840 92841 f3a961 22 API calls 92840->92841 92842 f9d816 92841->92842 92843 f3a961 22 API calls 92842->92843 92844 f9d81e 92843->92844 92845 f3a961 22 API calls 92844->92845 92846 f9d826 92845->92846 92847 f3a961 22 API calls 92846->92847 92848 f9d82e 92847->92848 92849 f3a961 22 API calls 92848->92849 92850 f9d836 92849->92850 92851 f3525f 22 API calls 92850->92851 92852 f9d84d 92851->92852 92853 f3525f 22 API calls 92852->92853 92854 f9d866 92853->92854 92855 f34c6d 22 API calls 92854->92855 92856 f9d872 92855->92856 92857 f9d885 92856->92857 92859 f393b2 22 API calls 92856->92859 92858 f34c6d 22 API calls 92857->92858 92860 f9d88e 92858->92860 92859->92857 92861 f9d89e 92860->92861 92862 f393b2 22 API calls 92860->92862 92863 f9d8b0 92861->92863 92864 f3a8c7 22 API calls 92861->92864 92862->92861 92865 f36350 22 API calls 92863->92865 92864->92863 92866 f9d8bb 92865->92866 93229 f9d978 22 API calls 92866->93229 92868 f9d8ca 93230 f9d978 22 API calls 92868->93230 92870 f9d8dd 92871 f34c6d 22 API calls 92870->92871 92872 f9d8e7 92871->92872 92873 f9d8ec 92872->92873 92874 f9d8fe 92872->92874 92875 f333c6 22 API calls 92873->92875 92876 f34c6d 22 API calls 92874->92876 92877 f9d8f9 92875->92877 92878 f9d907 92876->92878 92881 f36350 22 API calls 92877->92881 92879 f9d925 92878->92879 92880 f333c6 22 API calls 92878->92880 92882 f36350 22 API calls 92879->92882 92880->92877 92881->92879 92882->92883 92883->92361 92885 fa2954 __wsopen_s 92884->92885 92886 f4fe0b 22 API calls 92885->92886 92887 fa2971 92886->92887 92888 f35722 22 API calls 92887->92888 92889 fa297b 92888->92889 93231 fa274e 92889->93231 92891 fa2986 92892 f3511f 64 API calls 92891->92892 92893 fa299b 92892->92893 92894 fa29bf 92893->92894 92895 fa2a6c 92893->92895 93260 fa2e66 75 API calls 92894->93260 93263 fa2e66 75 API calls 92895->93263 92898 fa29c4 92902 fa2a75 messages 92898->92902 93261 f5d583 26 API calls 92898->93261 92900 f350f5 40 API calls 92901 fa2a91 92900->92901 92903 f350f5 40 API calls 92901->92903 92902->92368 92904 fa2aa1 92903->92904 92906 f350f5 40 API calls 92904->92906 92905 fa29ed 93262 f5d583 26 API calls 92905->93262 92908 fa2abc 92906->92908 92909 f350f5 40 API calls 92908->92909 92910 fa2acc 92909->92910 92911 f350f5 40 API calls 92910->92911 92913 fa2ae7 92911->92913 92912 fa2a38 92912->92900 92912->92902 92914 f350f5 40 API calls 92913->92914 92915 fa2af7 92914->92915 92916 f350f5 40 API calls 92915->92916 92917 fa2b07 92916->92917 92918 f350f5 40 API calls 92917->92918 92919 fa2b17 92918->92919 93234 fa3017 GetTempPathW GetTempFileNameW 92919->93234 92921 fa2b22 92922 f5e5eb 29 API calls 92921->92922 92932 fa2b33 92922->92932 92923 fa2bed 93244 f5e678 92923->93244 92925 fa2bf8 92927 fa2bfe DeleteFileW 92925->92927 92928 fa2c12 92925->92928 92926 f350f5 40 API calls 92926->92932 92927->92902 92929 fa2c91 CopyFileW 92928->92929 92935 fa2c18 92928->92935 92930 fa2cb9 DeleteFileW 92929->92930 92931 fa2ca7 DeleteFileW 92929->92931 93257 fa2fd8 CreateFileW 92930->93257 92931->92902 92932->92902 92932->92923 92932->92926 93235 f5dbb3 92932->93235 93264 fa22ce 92935->93264 92938 fa2c80 DeleteFileW 92938->92902 92940 f730bb 92939->92940 92941 f333dd 92939->92941 92943 f4fddb 22 API calls 92940->92943 93571 f333ee 92941->93571 92945 f730c5 _wcslen 92943->92945 92944 f333e8 92944->92323 92946 f4fe0b 22 API calls 92945->92946 92947 f730fe __fread_nolock 92946->92947 92948->92328 92949->92341 92951 f34ec6 92950->92951 92952 f34ea8 GetProcAddress 92950->92952 92955 f5e5eb 92951->92955 92953 f34eb8 92952->92953 92953->92951 92954 f34ebf FreeLibrary 92953->92954 92954->92951 92986 f5e52a 92955->92986 92957 f34eea 92957->92813 92957->92814 92959 f34e6e GetProcAddress 92958->92959 92960 f34e8d 92958->92960 92961 f34e7e 92959->92961 92963 f34f80 92960->92963 92961->92960 92962 f34e86 FreeLibrary 92961->92962 92962->92960 92964 f4fe0b 22 API calls 92963->92964 92965 f34f95 92964->92965 92966 f35722 22 API calls 92965->92966 92967 f34fa1 __fread_nolock 92966->92967 92968 f350a5 92967->92968 92969 f73d1d 92967->92969 92979 f34fdc 92967->92979 93054 f342a2 CreateStreamOnHGlobal 92968->93054 93065 fa304d 74 API calls 92969->93065 92972 f73d22 92974 f3511f 64 API calls 92972->92974 92973 f350f5 40 API calls 92973->92979 92975 f73d45 92974->92975 92976 f350f5 40 API calls 92975->92976 92978 f3506e messages 92976->92978 92978->92822 92979->92972 92979->92973 92979->92978 93060 f3511f 92979->93060 92981 f35107 92980->92981 92982 f73d70 92980->92982 93087 f5e8c4 92981->93087 92985 fa28fe 27 API calls 92985->92829 92988 f5e536 __FrameHandler3::FrameUnwindToState 92986->92988 92987 f5e544 93011 f5f2d9 20 API calls _free 92987->93011 92988->92987 92991 f5e574 92988->92991 92990 f5e549 93012 f627ec 26 API calls pre_c_initialization 92990->93012 92993 f5e586 92991->92993 92994 f5e579 92991->92994 93003 f68061 92993->93003 93013 f5f2d9 20 API calls _free 92994->93013 92997 f5e58f 92998 f5e595 92997->92998 92999 f5e5a2 92997->92999 93014 f5f2d9 20 API calls _free 92998->93014 93015 f5e5d4 LeaveCriticalSection __fread_nolock 92999->93015 93000 f5e554 __wsopen_s 93000->92957 93004 f6806d __FrameHandler3::FrameUnwindToState 93003->93004 93016 f62f5e EnterCriticalSection 93004->93016 93006 f6807b 93017 f680fb 93006->93017 93010 f680ac __wsopen_s 93010->92997 93011->92990 93012->93000 93013->93000 93014->93000 93015->93000 93016->93006 93023 f6811e 93017->93023 93018 f68177 93035 f64c7d 93018->93035 93023->93018 93026 f68088 93023->93026 93033 f5918d EnterCriticalSection 93023->93033 93034 f591a1 LeaveCriticalSection 93023->93034 93024 f68189 93024->93026 93048 f63405 11 API calls 2 library calls 93024->93048 93030 f680b7 93026->93030 93027 f681a8 93049 f5918d EnterCriticalSection 93027->93049 93053 f62fa6 LeaveCriticalSection 93030->93053 93032 f680be 93032->93010 93033->93023 93034->93023 93036 f64c8a _free 93035->93036 93037 f64cca 93036->93037 93038 f64cb5 RtlAllocateHeap 93036->93038 93050 f54ead 7 API calls 2 library calls 93036->93050 93051 f5f2d9 20 API calls _free 93037->93051 93038->93036 93039 f64cc8 93038->93039 93042 f629c8 93039->93042 93043 f629d3 RtlFreeHeap 93042->93043 93044 f629fc _free 93042->93044 93043->93044 93045 f629e8 93043->93045 93044->93024 93052 f5f2d9 20 API calls _free 93045->93052 93047 f629ee GetLastError 93047->93044 93048->93027 93049->93026 93050->93036 93051->93039 93052->93047 93053->93032 93055 f342bc FindResourceExW 93054->93055 93059 f342d9 93054->93059 93056 f735ba LoadResource 93055->93056 93055->93059 93057 f735cf SizeofResource 93056->93057 93056->93059 93058 f735e3 LockResource 93057->93058 93057->93059 93058->93059 93059->92979 93061 f73d90 93060->93061 93062 f3512e 93060->93062 93066 f5ece3 93062->93066 93065->92972 93069 f5eaaa 93066->93069 93068 f3513c 93068->92979 93072 f5eab6 __FrameHandler3::FrameUnwindToState 93069->93072 93070 f5eac2 93082 f5f2d9 20 API calls _free 93070->93082 93072->93070 93073 f5eae8 93072->93073 93084 f5918d EnterCriticalSection 93073->93084 93074 f5eac7 93083 f627ec 26 API calls pre_c_initialization 93074->93083 93077 f5eaf4 93085 f5ec0a 62 API calls 2 library calls 93077->93085 93079 f5eb08 93086 f5eb27 LeaveCriticalSection __fread_nolock 93079->93086 93081 f5ead2 __wsopen_s 93081->93068 93082->93074 93083->93081 93084->93077 93085->93079 93086->93081 93090 f5e8e1 93087->93090 93089 f35118 93089->92985 93091 f5e8ed __FrameHandler3::FrameUnwindToState 93090->93091 93092 f5e92d 93091->93092 93093 f5e925 __wsopen_s 93091->93093 93098 f5e900 ___scrt_fastfail 93091->93098 93103 f5918d EnterCriticalSection 93092->93103 93093->93089 93096 f5e937 93104 f5e6f8 93096->93104 93117 f5f2d9 20 API calls _free 93098->93117 93099 f5e91a 93118 f627ec 26 API calls pre_c_initialization 93099->93118 93103->93096 93107 f5e70a ___scrt_fastfail 93104->93107 93110 f5e727 93104->93110 93105 f5e717 93192 f5f2d9 20 API calls _free 93105->93192 93107->93105 93107->93110 93112 f5e76a __fread_nolock 93107->93112 93108 f5e71c 93193 f627ec 26 API calls pre_c_initialization 93108->93193 93119 f5e96c LeaveCriticalSection __fread_nolock 93110->93119 93111 f5e886 ___scrt_fastfail 93195 f5f2d9 20 API calls _free 93111->93195 93112->93110 93112->93111 93120 f5d955 93112->93120 93127 f68d45 93112->93127 93194 f5cf78 26 API calls 4 library calls 93112->93194 93117->93099 93118->93093 93119->93093 93121 f5d976 93120->93121 93122 f5d961 93120->93122 93121->93112 93196 f5f2d9 20 API calls _free 93122->93196 93124 f5d966 93197 f627ec 26 API calls pre_c_initialization 93124->93197 93126 f5d971 93126->93112 93128 f68d57 93127->93128 93129 f68d6f 93127->93129 93207 f5f2c6 20 API calls _free 93128->93207 93131 f690d9 93129->93131 93134 f68db4 93129->93134 93223 f5f2c6 20 API calls _free 93131->93223 93132 f68d5c 93208 f5f2d9 20 API calls _free 93132->93208 93137 f68dbf 93134->93137 93138 f68d64 93134->93138 93145 f68def 93134->93145 93136 f690de 93224 f5f2d9 20 API calls _free 93136->93224 93209 f5f2c6 20 API calls _free 93137->93209 93138->93112 93141 f68dcc 93225 f627ec 26 API calls pre_c_initialization 93141->93225 93142 f68dc4 93210 f5f2d9 20 API calls _free 93142->93210 93146 f68e08 93145->93146 93147 f68e2e 93145->93147 93148 f68e4a 93145->93148 93146->93147 93154 f68e15 93146->93154 93211 f5f2c6 20 API calls _free 93147->93211 93214 f63820 21 API calls _free 93148->93214 93150 f68e33 93212 f5f2d9 20 API calls _free 93150->93212 93198 f6f89b 93154->93198 93155 f68e61 93158 f629c8 _free 20 API calls 93155->93158 93156 f68e3a 93213 f627ec 26 API calls pre_c_initialization 93156->93213 93157 f68fb3 93160 f69029 93157->93160 93163 f68fcc GetConsoleMode 93157->93163 93161 f68e6a 93158->93161 93162 f6902d ReadFile 93160->93162 93164 f629c8 _free 20 API calls 93161->93164 93165 f69047 93162->93165 93166 f690a1 GetLastError 93162->93166 93163->93160 93167 f68fdd 93163->93167 93168 f68e71 93164->93168 93165->93166 93171 f6901e 93165->93171 93169 f69005 93166->93169 93170 f690ae 93166->93170 93167->93162 93172 f68fe3 ReadConsoleW 93167->93172 93173 f68e96 93168->93173 93174 f68e7b 93168->93174 93179 f68e45 __fread_nolock 93169->93179 93218 f5f2a3 20 API calls 2 library calls 93169->93218 93221 f5f2d9 20 API calls _free 93170->93221 93171->93179 93186 f69083 93171->93186 93187 f6906c 93171->93187 93172->93171 93178 f68fff GetLastError 93172->93178 93217 f69424 28 API calls __wsopen_s 93173->93217 93215 f5f2d9 20 API calls _free 93174->93215 93178->93169 93180 f629c8 _free 20 API calls 93179->93180 93180->93138 93181 f68e80 93216 f5f2c6 20 API calls _free 93181->93216 93182 f690b3 93222 f5f2c6 20 API calls _free 93182->93222 93186->93179 93189 f6909a 93186->93189 93219 f68a61 31 API calls 4 library calls 93187->93219 93220 f688a1 29 API calls __wsopen_s 93189->93220 93191 f6909f 93191->93179 93192->93108 93193->93110 93194->93112 93195->93108 93196->93124 93197->93126 93199 f6f8b5 93198->93199 93200 f6f8a8 93198->93200 93202 f6f8c1 93199->93202 93227 f5f2d9 20 API calls _free 93199->93227 93226 f5f2d9 20 API calls _free 93200->93226 93202->93157 93204 f6f8ad 93204->93157 93205 f6f8e2 93228 f627ec 26 API calls pre_c_initialization 93205->93228 93207->93132 93208->93138 93209->93142 93210->93141 93211->93150 93212->93156 93213->93179 93214->93155 93215->93181 93216->93179 93217->93154 93218->93179 93219->93179 93220->93191 93221->93182 93222->93179 93223->93136 93224->93141 93225->93138 93226->93204 93227->93205 93228->93204 93229->92868 93230->92870 93293 f5e4e8 93231->93293 93233 fa275d 93233->92891 93234->92921 93236 f5dbc1 93235->93236 93237 f5dbdd 93235->93237 93236->93237 93238 f5dbe3 93236->93238 93239 f5dbcd 93236->93239 93237->92932 93307 f5d9cc 93238->93307 93310 f5f2d9 20 API calls _free 93239->93310 93242 f5dbd2 93311 f627ec 26 API calls pre_c_initialization 93242->93311 93245 f5e684 __FrameHandler3::FrameUnwindToState 93244->93245 93246 f5e695 93245->93246 93247 f5e6aa 93245->93247 93463 f5f2d9 20 API calls _free 93246->93463 93256 f5e6a5 __wsopen_s 93247->93256 93446 f5918d EnterCriticalSection 93247->93446 93249 f5e69a 93464 f627ec 26 API calls pre_c_initialization 93249->93464 93252 f5e6c6 93447 f5e602 93252->93447 93254 f5e6d1 93465 f5e6ee LeaveCriticalSection __fread_nolock 93254->93465 93256->92925 93258 fa2fff SetFileTime CloseHandle 93257->93258 93259 fa3013 93257->93259 93258->93259 93259->92902 93260->92898 93261->92905 93262->92912 93263->92912 93265 fa22d9 93264->93265 93267 fa22e7 93264->93267 93266 f5e5eb 29 API calls 93265->93266 93266->93267 93268 fa232c 93267->93268 93269 f5e5eb 29 API calls 93267->93269 93292 fa22f0 93267->93292 93539 fa2557 93268->93539 93270 fa2311 93269->93270 93270->93268 93272 fa231a 93270->93272 93276 f5e678 67 API calls 93272->93276 93272->93292 93273 fa2370 93274 fa2374 93273->93274 93275 fa2395 93273->93275 93278 fa2381 93274->93278 93280 f5e678 67 API calls 93274->93280 93543 fa2171 93275->93543 93276->93292 93278->93292 93280->93278 93292->92930 93292->92938 93296 f5e469 93293->93296 93295 f5e505 93295->93233 93297 f5e48c 93296->93297 93298 f5e478 93296->93298 93303 f5e488 __alldvrm 93297->93303 93306 f6333f 11 API calls 2 library calls 93297->93306 93304 f5f2d9 20 API calls _free 93298->93304 93300 f5e47d 93305 f627ec 26 API calls pre_c_initialization 93300->93305 93303->93295 93304->93300 93305->93303 93306->93303 93312 f5d97b 93307->93312 93310->93242 93311->93237 93313 f5d987 __FrameHandler3::FrameUnwindToState 93312->93313 93320 f5918d EnterCriticalSection 93313->93320 93315 f5d995 93321 f5d9f4 93315->93321 93320->93315 93329 f649a1 93321->93329 93330 f5d955 __fread_nolock 26 API calls 93329->93330 93331 f649b0 93330->93331 93332 f6f89b __fread_nolock 26 API calls 93331->93332 93334 f649b6 93332->93334 93333 f5da09 93338 f5da3a 93333->93338 93334->93333 93350 f63820 21 API calls _free 93334->93350 93336 f64a15 93337 f629c8 _free 20 API calls 93336->93337 93337->93333 93344 f5da24 93338->93344 93350->93336 93446->93252 93448 f5e624 93447->93448 93449 f5e60f 93447->93449 93451 f5dc0b 62 API calls 93448->93451 93455 f5e61f 93448->93455 93485 f5f2d9 20 API calls _free 93449->93485 93453 f5e638 93451->93453 93452 f5e614 93486 f627ec 26 API calls pre_c_initialization 93452->93486 93466 f64d7a 93453->93466 93455->93254 93458 f5d955 __fread_nolock 26 API calls 93459 f5e646 93458->93459 93470 f6862f 93459->93470 93463->93249 93464->93256 93465->93256 93467 f5e640 93466->93467 93468 f64d90 93466->93468 93467->93458 93468->93467 93469 f629c8 _free 20 API calls 93468->93469 93469->93467 93471 f68653 93470->93471 93472 f6863e 93470->93472 93490 f5f2c6 20 API calls _free 93472->93490 93485->93452 93486->93455 93540 fa257c 93539->93540 93542 fa2565 __fread_nolock 93539->93542 93541 f5e8c4 __fread_nolock 40 API calls 93540->93541 93541->93542 93542->93273 93544 f5ea0c ___std_exception_copy 21 API calls 93543->93544 93572 f333fe _wcslen 93571->93572 93573 f33411 93572->93573 93574 f7311d 93572->93574 93576 f3a587 22 API calls 93573->93576 93575 f4fddb 22 API calls 93574->93575 93578 f73127 93575->93578 93577 f3341e __fread_nolock 93576->93577 93577->92944 93579 f4fe0b 22 API calls 93578->93579 93580 f73157 __fread_nolock 93579->93580 93582 f4f188 93581->93582 93583 f4f14c 93581->93583 93584 f3a6c3 22 API calls 93582->93584 93583->93582 93585 f4f15b 93583->93585 93591 f9caeb 93584->93591 93587 f4f170 93585->93587 93589 f4f17d 93585->93589 93586 f9cb1a 93586->92415 93603 f4f18e 93587->93603 93610 f9cbf2 26 API calls 93589->93610 93591->93586 93611 f9ca89 ReadFile SetFilePointerEx 93591->93611 93612 f349bd 22 API calls __fread_nolock 93591->93612 93592 f4f179 93592->92415 93595->92426 93596->92424 93597->92427 93598->92431 93599->92379 93600->92379 93601->92412 93602->92423 93613 f4f1d8 93603->93613 93609 f4f1c1 93609->93592 93610->93592 93611->93591 93612->93591 93614 f4fe0b 22 API calls 93613->93614 93615 f4f1ef 93614->93615 93616 f4fddb 22 API calls 93615->93616 93617 f4f1a6 93616->93617 93618 f397b6 93617->93618 93632 f39a1e 93618->93632 93620 f397fc 93620->93609 93624 f36e14 MultiByteToWideChar 93620->93624 93621 f39a40 2 API calls 93622 f397c7 93621->93622 93622->93620 93622->93621 93639 f39b01 22 API calls __fread_nolock 93622->93639 93625 f36e40 93624->93625 93626 f36e87 93624->93626 93628 f4fe0b 22 API calls 93625->93628 93627 f3a6c3 22 API calls 93626->93627 93631 f36e7b 93627->93631 93629 f36e55 MultiByteToWideChar 93628->93629 93640 f36e90 93629->93640 93631->93609 93633 f39a2f 93632->93633 93634 f7f378 93632->93634 93633->93622 93635 f4fddb 22 API calls 93634->93635 93636 f7f382 93635->93636 93637 f4fe0b 22 API calls 93636->93637 93638 f7f397 93637->93638 93639->93622 93641 f36f24 93640->93641 93642 f36ea3 93640->93642 93643 f393b2 22 API calls 93641->93643 93642->93641 93644 f36eaf 93642->93644 93649 f36ec1 __fread_nolock 93643->93649 93645 f36ee7 93644->93645 93646 f36eb9 93644->93646 93648 f4fddb 22 API calls 93645->93648 93652 f36f34 22 API calls 93646->93652 93650 f36ef1 93648->93650 93649->93631 93651 f4fe0b 22 API calls 93650->93651 93651->93649 93652->93649 93654 f3ae01 93653->93654 93657 f3ae1c messages 93653->93657 93655 f3aec9 22 API calls 93654->93655 93656 f3ae09 CharUpperBuffW 93655->93656 93656->93657 93657->92092 93659 f3acae 93658->93659 93660 f3acd1 93659->93660 93688 fa359c 82 API calls __wsopen_s 93659->93688 93660->92132 93663 f3ad92 93662->93663 93664 f7fadb 93662->93664 93665 f4fddb 22 API calls 93663->93665 93666 f3ad99 93665->93666 93689 f3adcd 93666->93689 93669->92143 93670->92139 93671->92139 93672->92096 93673->92147 93674->92110 93675->92147 93676->92147 93677->92132 93678->92132 93679->92132 93680->92132 93681->92132 93682->92132 93683->92123 93684->92147 93685->92131 93686->92140 93687->92147 93688->93660 93693 f3addd 93689->93693 93690 f3adb6 93690->92132 93691 f4fddb 22 API calls 93691->93693 93692 f3a961 22 API calls 93692->93693 93693->93690 93693->93691 93693->93692 93694 f3a8c7 22 API calls 93693->93694 93695 f3adcd 22 API calls 93693->93695 93694->93693 93695->93693 93696->92181 93697->92181 93698->92178 93699->92178 93700->92165 93701->92178 93702 f32e37 93703 f3a961 22 API calls 93702->93703 93704 f32e4d 93703->93704 93781 f34ae3 93704->93781 93706 f32e6b 93795 f33a5a 93706->93795 93708 f32e7f 93709 f39cb3 22 API calls 93708->93709 93710 f32e8c 93709->93710 93711 f34ecb 94 API calls 93710->93711 93712 f32ea5 93711->93712 93713 f72cb0 93712->93713 93714 f32ead 93712->93714 93818 fa2cf9 93713->93818 93717 f3a8c7 22 API calls 93714->93717 93716 f72cc3 93718 f34f39 68 API calls 93716->93718 93719 f72ccf 93716->93719 93720 f32ec3 93717->93720 93718->93719 93722 f34f39 68 API calls 93719->93722 93802 f36f88 22 API calls 93720->93802 93724 f72ce5 93722->93724 93723 f32ecf 93725 f39cb3 22 API calls 93723->93725 93844 f33084 22 API calls 93724->93844 93726 f32edc 93725->93726 93803 f3a81b 41 API calls 93726->93803 93728 f32eec 93731 f39cb3 22 API calls 93728->93731 93730 f72d02 93845 f33084 22 API calls 93730->93845 93733 f32f12 93731->93733 93804 f3a81b 41 API calls 93733->93804 93734 f72d1e 93736 f33a5a 24 API calls 93734->93736 93737 f72d44 93736->93737 93846 f33084 22 API calls 93737->93846 93738 f32f21 93741 f3a961 22 API calls 93738->93741 93740 f72d50 93742 f3a8c7 22 API calls 93740->93742 93743 f32f3f 93741->93743 93744 f72d5e 93742->93744 93805 f33084 22 API calls 93743->93805 93847 f33084 22 API calls 93744->93847 93746 f32f4b 93806 f54a28 40 API calls 3 library calls 93746->93806 93749 f72d6d 93753 f3a8c7 22 API calls 93749->93753 93750 f32f59 93750->93724 93751 f32f63 93750->93751 93807 f54a28 40 API calls 3 library calls 93751->93807 93754 f72d83 93753->93754 93848 f33084 22 API calls 93754->93848 93755 f32f6e 93755->93730 93757 f32f78 93755->93757 93808 f54a28 40 API calls 3 library calls 93757->93808 93758 f72d90 93760 f32f83 93760->93734 93761 f32f8d 93760->93761 93809 f54a28 40 API calls 3 library calls 93761->93809 93763 f32f98 93764 f32fdc 93763->93764 93810 f33084 22 API calls 93763->93810 93764->93749 93765 f32fe8 93764->93765 93765->93758 93812 f363eb 22 API calls 93765->93812 93767 f32fbf 93769 f3a8c7 22 API calls 93767->93769 93771 f32fcd 93769->93771 93770 f32ff8 93813 f36a50 22 API calls 93770->93813 93811 f33084 22 API calls 93771->93811 93774 f33006 93814 f370b0 23 API calls 93774->93814 93778 f33021 93779 f33065 93778->93779 93815 f36f88 22 API calls 93778->93815 93816 f370b0 23 API calls 93778->93816 93817 f33084 22 API calls 93778->93817 93782 f34af0 __wsopen_s 93781->93782 93783 f36b57 22 API calls 93782->93783 93784 f34b22 93782->93784 93783->93784 93785 f34c6d 22 API calls 93784->93785 93794 f34b58 93784->93794 93785->93784 93786 f34c6d 22 API calls 93786->93794 93787 f39cb3 22 API calls 93789 f34c52 93787->93789 93788 f39cb3 22 API calls 93788->93794 93790 f3515f 22 API calls 93789->93790 93792 f34c5e 93790->93792 93792->93706 93793 f34c29 93793->93787 93793->93792 93794->93786 93794->93788 93794->93793 93849 f3515f 93794->93849 93855 f71f50 93795->93855 93798 f39cb3 22 API calls 93799 f33a8d 93798->93799 93857 f33aa2 93799->93857 93801 f33a97 93801->93708 93802->93723 93803->93728 93804->93738 93805->93746 93806->93750 93807->93755 93808->93760 93809->93763 93810->93767 93811->93764 93812->93770 93813->93774 93814->93778 93815->93778 93816->93778 93817->93778 93819 fa2d15 93818->93819 93820 f3511f 64 API calls 93819->93820 93821 fa2d29 93820->93821 93871 fa2e66 75 API calls 93821->93871 93823 fa2d3b 93824 f350f5 40 API calls 93823->93824 93842 fa2d3f 93823->93842 93825 fa2d56 93824->93825 93826 f350f5 40 API calls 93825->93826 93827 fa2d66 93826->93827 93828 f350f5 40 API calls 93827->93828 93829 fa2d81 93828->93829 93830 f350f5 40 API calls 93829->93830 93831 fa2d9c 93830->93831 93832 f3511f 64 API calls 93831->93832 93833 fa2db3 93832->93833 93834 f5ea0c ___std_exception_copy 21 API calls 93833->93834 93835 fa2dba 93834->93835 93836 f5ea0c ___std_exception_copy 21 API calls 93835->93836 93837 fa2dc4 93836->93837 93838 f350f5 40 API calls 93837->93838 93839 fa2dd8 93838->93839 93872 fa28fe 27 API calls 93839->93872 93841 fa2dee 93841->93842 93843 fa22ce 79 API calls 93841->93843 93842->93716 93843->93842 93844->93730 93845->93734 93846->93740 93847->93749 93848->93758 93850 f3516e 93849->93850 93854 f3518f __fread_nolock 93849->93854 93852 f4fe0b 22 API calls 93850->93852 93851 f4fddb 22 API calls 93853 f351a2 93851->93853 93852->93854 93853->93794 93854->93851 93856 f33a67 GetModuleFileNameW 93855->93856 93856->93798 93858 f71f50 __wsopen_s 93857->93858 93859 f33aaf GetFullPathNameW 93858->93859 93860 f33ae9 93859->93860 93861 f33ace 93859->93861 93862 f3a6c3 22 API calls 93860->93862 93863 f36b57 22 API calls 93861->93863 93864 f33ada 93862->93864 93863->93864 93867 f337a0 93864->93867 93868 f337ae 93867->93868 93869 f393b2 22 API calls 93868->93869 93870 f337c2 93869->93870 93870->93801 93871->93823 93872->93841 93873 f3db37 93875 f3d815 93873->93875 93874 f81cdc 93875->93873 93875->93874 93877 f3db73 TranslateMessage DispatchMessageW 93875->93877 93878 f3db8f PeekMessageW 93875->93878 93879 f81cbe TranslateAcceleratorW 93875->93879 93880 f4edf6 IsDialogMessageW GetClassLongW 93875->93880 93877->93878 93878->93875 93879->93875 93880->93875 93881 f33156 93884 f33170 93881->93884 93885 f33187 93884->93885 93886 f331e9 93885->93886 93887 f331eb 93885->93887 93888 f3318c 93885->93888 93889 f331d0 DefWindowProcW 93886->93889 93890 f331f1 93887->93890 93891 f72dfb 93887->93891 93892 f33265 PostQuitMessage 93888->93892 93893 f33199 93888->93893 93894 f3316a 93889->93894 93895 f331f8 93890->93895 93896 f3321d SetTimer RegisterWindowMessageW 93890->93896 93940 f318e2 10 API calls 93891->93940 93892->93894 93898 f331a4 93893->93898 93899 f72e7c 93893->93899 93900 f33201 KillTimer 93895->93900 93901 f72d9c 93895->93901 93896->93894 93903 f33246 CreatePopupMenu 93896->93903 93904 f331ae 93898->93904 93905 f72e68 93898->93905 93954 f9bf30 34 API calls ___scrt_fastfail 93899->93954 93936 f330f2 Shell_NotifyIconW ___scrt_fastfail 93900->93936 93907 f72dd7 MoveWindow 93901->93907 93908 f72da1 93901->93908 93902 f72e1c 93941 f4e499 42 API calls 93902->93941 93903->93894 93912 f72e4d 93904->93912 93913 f331b9 93904->93913 93929 f9c161 93905->93929 93907->93894 93915 f72da7 93908->93915 93916 f72dc6 SetFocus 93908->93916 93912->93889 93953 f90ad7 22 API calls 93912->93953 93918 f331c4 93913->93918 93919 f33253 93913->93919 93914 f72e8e 93914->93889 93914->93894 93915->93918 93920 f72db0 93915->93920 93916->93894 93917 f33214 93937 f33c50 DeleteObject DestroyWindow 93917->93937 93918->93889 93942 f330f2 Shell_NotifyIconW ___scrt_fastfail 93918->93942 93938 f3326f 44 API calls ___scrt_fastfail 93919->93938 93939 f318e2 10 API calls 93920->93939 93925 f33263 93925->93894 93927 f72e41 93943 f33837 93927->93943 93930 f9c179 ___scrt_fastfail 93929->93930 93931 f9c276 93929->93931 93955 f33923 93930->93955 93931->93894 93933 f9c25f KillTimer SetTimer 93933->93931 93934 f9c1a0 93934->93933 93935 f9c251 Shell_NotifyIconW 93934->93935 93935->93933 93936->93917 93937->93894 93938->93925 93939->93894 93940->93902 93941->93918 93942->93927 93944 f33862 ___scrt_fastfail 93943->93944 93977 f34212 93944->93977 93947 f338e8 93949 f73386 Shell_NotifyIconW 93947->93949 93950 f33906 Shell_NotifyIconW 93947->93950 93951 f33923 24 API calls 93950->93951 93952 f3391c 93951->93952 93952->93886 93953->93886 93954->93914 93956 f33a13 93955->93956 93957 f3393f 93955->93957 93956->93934 93958 f36270 22 API calls 93957->93958 93959 f3394d 93958->93959 93960 f73393 LoadStringW 93959->93960 93961 f3395a 93959->93961 93963 f733ad 93960->93963 93962 f36b57 22 API calls 93961->93962 93964 f3396f 93962->93964 93967 f3a8c7 22 API calls 93963->93967 93971 f33994 ___scrt_fastfail 93963->93971 93965 f733c9 93964->93965 93966 f3397c 93964->93966 93969 f36350 22 API calls 93965->93969 93966->93963 93968 f33986 93966->93968 93967->93971 93970 f36350 22 API calls 93968->93970 93972 f733d7 93969->93972 93970->93971 93974 f339f9 Shell_NotifyIconW 93971->93974 93972->93971 93973 f333c6 22 API calls 93972->93973 93975 f733f9 93973->93975 93974->93956 93976 f333c6 22 API calls 93975->93976 93976->93971 93978 f735a4 93977->93978 93979 f338b7 93977->93979 93978->93979 93980 f735ad DestroyIcon 93978->93980 93979->93947 93981 f9c874 42 API calls _strftime 93979->93981 93980->93979 93981->93947 93982 f3105b 93987 f3344d 93982->93987 93984 f3106a 94018 f500a3 29 API calls __onexit 93984->94018 93986 f31074 93988 f3345d __wsopen_s 93987->93988 93989 f3a961 22 API calls 93988->93989 93990 f33513 93989->93990 93991 f33a5a 24 API calls 93990->93991 93992 f3351c 93991->93992 94019 f33357 93992->94019 93995 f333c6 22 API calls 93996 f33535 93995->93996 93997 f3515f 22 API calls 93996->93997 93998 f33544 93997->93998 93999 f3a961 22 API calls 93998->93999 94000 f3354d 93999->94000 94001 f3a6c3 22 API calls 94000->94001 94002 f33556 RegOpenKeyExW 94001->94002 94003 f73176 RegQueryValueExW 94002->94003 94008 f33578 94002->94008 94004 f73193 94003->94004 94005 f7320c RegCloseKey 94003->94005 94006 f4fe0b 22 API calls 94004->94006 94005->94008 94017 f7321e _wcslen 94005->94017 94007 f731ac 94006->94007 94009 f35722 22 API calls 94007->94009 94008->93984 94010 f731b7 RegQueryValueExW 94009->94010 94011 f731d4 94010->94011 94014 f731ee messages 94010->94014 94012 f36b57 22 API calls 94011->94012 94012->94014 94013 f34c6d 22 API calls 94013->94017 94014->94005 94015 f39cb3 22 API calls 94015->94017 94016 f3515f 22 API calls 94016->94017 94017->94008 94017->94013 94017->94015 94017->94016 94018->93986 94020 f71f50 __wsopen_s 94019->94020 94021 f33364 GetFullPathNameW 94020->94021 94022 f33386 94021->94022 94023 f36b57 22 API calls 94022->94023 94024 f333a4 94023->94024 94024->93995 94025 f31098 94030 f342de 94025->94030 94029 f310a7 94031 f3a961 22 API calls 94030->94031 94032 f342f5 GetVersionExW 94031->94032 94033 f36b57 22 API calls 94032->94033 94034 f34342 94033->94034 94035 f393b2 22 API calls 94034->94035 94047 f34378 94034->94047 94036 f3436c 94035->94036 94038 f337a0 22 API calls 94036->94038 94037 f3441b GetCurrentProcess IsWow64Process 94039 f34437 94037->94039 94038->94047 94040 f73824 GetSystemInfo 94039->94040 94041 f3444f LoadLibraryA 94039->94041 94042 f34460 GetProcAddress 94041->94042 94043 f3449c GetSystemInfo 94041->94043 94042->94043 94045 f34470 GetNativeSystemInfo 94042->94045 94046 f34476 94043->94046 94044 f737df 94045->94046 94048 f3109d 94046->94048 94049 f3447a FreeLibrary 94046->94049 94047->94037 94047->94044 94050 f500a3 29 API calls __onexit 94048->94050 94049->94048 94050->94029 94051 f690fa 94052 f69107 94051->94052 94053 f6911f 94051->94053 94101 f5f2d9 20 API calls _free 94052->94101 94057 f6917a 94053->94057 94065 f69117 94053->94065 94103 f6fdc4 21 API calls 2 library calls 94053->94103 94055 f6910c 94102 f627ec 26 API calls pre_c_initialization 94055->94102 94059 f5d955 __fread_nolock 26 API calls 94057->94059 94060 f69192 94059->94060 94071 f68c32 94060->94071 94062 f69199 94063 f5d955 __fread_nolock 26 API calls 94062->94063 94062->94065 94064 f691c5 94063->94064 94064->94065 94066 f5d955 __fread_nolock 26 API calls 94064->94066 94067 f691d3 94066->94067 94067->94065 94068 f5d955 __fread_nolock 26 API calls 94067->94068 94069 f691e3 94068->94069 94070 f5d955 __fread_nolock 26 API calls 94069->94070 94070->94065 94072 f68c3e __FrameHandler3::FrameUnwindToState 94071->94072 94073 f68c46 94072->94073 94074 f68c5e 94072->94074 94105 f5f2c6 20 API calls _free 94073->94105 94076 f68d24 94074->94076 94081 f68c97 94074->94081 94112 f5f2c6 20 API calls _free 94076->94112 94078 f68c4b 94106 f5f2d9 20 API calls _free 94078->94106 94079 f68d29 94113 f5f2d9 20 API calls _free 94079->94113 94083 f68ca6 94081->94083 94084 f68cbb 94081->94084 94107 f5f2c6 20 API calls _free 94083->94107 94104 f65147 EnterCriticalSection 94084->94104 94087 f68cc1 94092 f68cf2 94087->94092 94093 f68cdd 94087->94093 94088 f68cb3 94114 f627ec 26 API calls pre_c_initialization 94088->94114 94089 f68c53 __wsopen_s 94089->94062 94090 f68cab 94108 f5f2d9 20 API calls _free 94090->94108 94096 f68d45 __fread_nolock 38 API calls 94092->94096 94109 f5f2d9 20 API calls _free 94093->94109 94098 f68ced 94096->94098 94097 f68ce2 94110 f5f2c6 20 API calls _free 94097->94110 94111 f68d1c LeaveCriticalSection __wsopen_s 94098->94111 94101->94055 94102->94065 94103->94057 94104->94087 94105->94078 94106->94089 94107->94090 94108->94088 94109->94097 94110->94098 94111->94089 94112->94079 94113->94088 94114->94089 94115 f3f7bf 94116 f3f7d3 94115->94116 94117 f3fcb6 94115->94117 94118 f3fcc2 94116->94118 94120 f4fddb 22 API calls 94116->94120 94152 f3aceb 23 API calls messages 94117->94152 94153 f3aceb 23 API calls messages 94118->94153 94122 f3f7e5 94120->94122 94122->94118 94123 f3f83e 94122->94123 94124 f3fd3d 94122->94124 94126 f41310 256 API calls 94123->94126 94148 f3ed9d messages 94123->94148 94154 fa1155 22 API calls 94124->94154 94147 f3ec76 messages 94126->94147 94127 f4fddb 22 API calls 94127->94147 94128 f3fef7 94133 f3a8c7 22 API calls 94128->94133 94128->94148 94131 f84600 94136 f3a8c7 22 API calls 94131->94136 94131->94148 94132 f84b0b 94156 fa359c 82 API calls __wsopen_s 94132->94156 94133->94148 94136->94148 94138 f3a8c7 22 API calls 94138->94147 94139 f50242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94139->94147 94140 f3fbe3 94143 f84bdc 94140->94143 94140->94148 94149 f3f3ae messages 94140->94149 94141 f3a961 22 API calls 94141->94147 94142 f500a3 29 API calls pre_c_initialization 94142->94147 94157 fa359c 82 API calls __wsopen_s 94143->94157 94145 f84beb 94158 fa359c 82 API calls __wsopen_s 94145->94158 94146 f501f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94146->94147 94147->94127 94147->94128 94147->94131 94147->94132 94147->94138 94147->94139 94147->94140 94147->94141 94147->94142 94147->94145 94147->94146 94147->94148 94147->94149 94150 f401e0 256 API calls 2 library calls 94147->94150 94151 f406a0 41 API calls messages 94147->94151 94149->94148 94155 fa359c 82 API calls __wsopen_s 94149->94155 94150->94147 94151->94147 94152->94118 94153->94124 94154->94148 94155->94148 94156->94148 94157->94145 94158->94148 94159 f83f75 94170 f4ceb1 94159->94170 94161 f83f8b 94163 f84006 94161->94163 94179 f4e300 23 API calls 94161->94179 94164 f3bf40 256 API calls 94163->94164 94165 f84052 94164->94165 94168 f84a88 94165->94168 94181 fa359c 82 API calls __wsopen_s 94165->94181 94167 f83fe6 94167->94165 94180 fa1abf 22 API calls 94167->94180 94171 f4ced2 94170->94171 94172 f4cebf 94170->94172 94173 f4cf05 94171->94173 94174 f4ced7 94171->94174 94182 f3aceb 23 API calls messages 94172->94182 94183 f3aceb 23 API calls messages 94173->94183 94176 f4fddb 22 API calls 94174->94176 94178 f4cec9 94176->94178 94178->94161 94179->94167 94180->94163 94181->94168 94182->94178 94183->94178 94184 f503fb 94185 f50407 __FrameHandler3::FrameUnwindToState 94184->94185 94213 f4feb1 94185->94213 94187 f5040e 94188 f50561 94187->94188 94191 f50438 94187->94191 94240 f5083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 94188->94240 94190 f50568 94241 f54e52 28 API calls _abort 94190->94241 94202 f50477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 94191->94202 94224 f6247d 94191->94224 94193 f5056e 94242 f54e04 28 API calls _abort 94193->94242 94197 f50576 94198 f50457 94200 f504d8 94232 f50959 94200->94232 94202->94200 94236 f54e1a 38 API calls 3 library calls 94202->94236 94204 f504de 94205 f504f3 94204->94205 94237 f50992 GetModuleHandleW 94205->94237 94207 f504fa 94207->94190 94208 f504fe 94207->94208 94209 f50507 94208->94209 94238 f54df5 28 API calls _abort 94208->94238 94239 f50040 13 API calls 2 library calls 94209->94239 94212 f5050f 94212->94198 94214 f4feba 94213->94214 94243 f50698 IsProcessorFeaturePresent 94214->94243 94216 f4fec6 94244 f52c94 10 API calls 3 library calls 94216->94244 94218 f4fecb 94223 f4fecf 94218->94223 94245 f62317 94218->94245 94220 f4fee6 94220->94187 94223->94187 94225 f62494 94224->94225 94226 f50a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94225->94226 94227 f50451 94226->94227 94227->94198 94228 f62421 94227->94228 94229 f62450 94228->94229 94230 f50a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94229->94230 94231 f62479 94230->94231 94231->94202 94304 f52340 94232->94304 94235 f5097f 94235->94204 94236->94200 94237->94207 94238->94209 94239->94212 94240->94190 94241->94193 94242->94197 94243->94216 94244->94218 94249 f6d1f6 94245->94249 94248 f52cbd 8 API calls 3 library calls 94248->94223 94252 f6d213 94249->94252 94253 f6d20f 94249->94253 94251 f4fed8 94251->94220 94251->94248 94252->94253 94255 f64bfb 94252->94255 94267 f50a8c 94253->94267 94256 f64c07 __FrameHandler3::FrameUnwindToState 94255->94256 94274 f62f5e EnterCriticalSection 94256->94274 94258 f64c0e 94275 f650af 94258->94275 94260 f64c1d 94261 f64c2c 94260->94261 94288 f64a8f 29 API calls 94260->94288 94290 f64c48 LeaveCriticalSection _abort 94261->94290 94264 f64c27 94289 f64b45 GetStdHandle GetFileType 94264->94289 94265 f64c3d __wsopen_s 94265->94252 94268 f50a95 94267->94268 94269 f50a97 IsProcessorFeaturePresent 94267->94269 94268->94251 94271 f50c5d 94269->94271 94303 f50c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 94271->94303 94273 f50d40 94273->94251 94274->94258 94276 f650bb __FrameHandler3::FrameUnwindToState 94275->94276 94277 f650df 94276->94277 94278 f650c8 94276->94278 94291 f62f5e EnterCriticalSection 94277->94291 94299 f5f2d9 20 API calls _free 94278->94299 94281 f650cd 94300 f627ec 26 API calls pre_c_initialization 94281->94300 94285 f650d7 __wsopen_s 94285->94260 94286 f65117 94301 f6513e LeaveCriticalSection _abort 94286->94301 94287 f650eb 94287->94286 94292 f65000 94287->94292 94288->94264 94289->94261 94290->94265 94291->94287 94293 f64c7d _free 20 API calls 94292->94293 94294 f65012 94293->94294 94298 f6501f 94294->94298 94302 f63405 11 API calls 2 library calls 94294->94302 94295 f629c8 _free 20 API calls 94296 f65071 94295->94296 94296->94287 94298->94295 94299->94281 94300->94285 94301->94285 94302->94294 94303->94273 94305 f5096c GetStartupInfoW 94304->94305 94305->94235 94306 f32de3 94307 f32df0 __wsopen_s 94306->94307 94308 f32e09 94307->94308 94309 f72c2b ___scrt_fastfail 94307->94309 94310 f33aa2 23 API calls 94308->94310 94311 f72c47 GetOpenFileNameW 94309->94311 94312 f32e12 94310->94312 94313 f72c96 94311->94313 94322 f32da5 94312->94322 94315 f36b57 22 API calls 94313->94315 94317 f72cab 94315->94317 94317->94317 94319 f32e27 94340 f344a8 94319->94340 94323 f71f50 __wsopen_s 94322->94323 94324 f32db2 GetLongPathNameW 94323->94324 94325 f36b57 22 API calls 94324->94325 94326 f32dda 94325->94326 94327 f33598 94326->94327 94328 f3a961 22 API calls 94327->94328 94329 f335aa 94328->94329 94330 f33aa2 23 API calls 94329->94330 94331 f335b5 94330->94331 94332 f335c0 94331->94332 94335 f732eb 94331->94335 94334 f3515f 22 API calls 94332->94334 94336 f335cc 94334->94336 94337 f7330d 94335->94337 94376 f4ce60 41 API calls 94335->94376 94370 f335f3 94336->94370 94339 f335df 94339->94319 94341 f34ecb 94 API calls 94340->94341 94342 f344cd 94341->94342 94343 f73833 94342->94343 94345 f34ecb 94 API calls 94342->94345 94344 fa2cf9 80 API calls 94343->94344 94346 f73848 94344->94346 94347 f344e1 94345->94347 94349 f7384c 94346->94349 94350 f73869 94346->94350 94347->94343 94348 f344e9 94347->94348 94351 f73854 94348->94351 94352 f344f5 94348->94352 94353 f34f39 68 API calls 94349->94353 94354 f4fe0b 22 API calls 94350->94354 94384 f9da5a 82 API calls 94351->94384 94383 f3940c 136 API calls 2 library calls 94352->94383 94353->94351 94369 f738ae 94354->94369 94357 f32e31 94358 f73862 94358->94350 94359 f73a5f 94364 f73a67 94359->94364 94360 f34f39 68 API calls 94360->94364 94361 f3a4a1 22 API calls 94361->94369 94364->94360 94388 f9989b 82 API calls __wsopen_s 94364->94388 94366 f39cb3 22 API calls 94366->94369 94369->94359 94369->94361 94369->94364 94369->94366 94377 f33ff7 94369->94377 94385 f9967e 22 API calls __fread_nolock 94369->94385 94386 f995ad 42 API calls _wcslen 94369->94386 94387 fa0b5a 22 API calls 94369->94387 94371 f33605 94370->94371 94375 f33624 __fread_nolock 94370->94375 94374 f4fe0b 22 API calls 94371->94374 94372 f4fddb 22 API calls 94373 f3363b 94372->94373 94373->94339 94374->94375 94375->94372 94376->94335 94378 f340ae 94377->94378 94379 f3400a 94377->94379 94378->94369 94380 f4fe0b 22 API calls 94379->94380 94381 f3403c 94379->94381 94380->94381 94381->94378 94382 f4fddb 22 API calls 94381->94382 94382->94381 94383->94357 94384->94358 94385->94369 94386->94369 94387->94369 94388->94364 94389 f72ba5 94390 f32b25 94389->94390 94391 f72baf 94389->94391 94417 f32b83 7 API calls 94390->94417 94393 f33a5a 24 API calls 94391->94393 94395 f72bb8 94393->94395 94397 f39cb3 22 API calls 94395->94397 94398 f72bc6 94397->94398 94400 f72bf5 94398->94400 94401 f72bce 94398->94401 94399 f32b2f 94403 f33837 49 API calls 94399->94403 94408 f32b44 94399->94408 94402 f333c6 22 API calls 94400->94402 94404 f333c6 22 API calls 94401->94404 94405 f72bf1 GetForegroundWindow ShellExecuteW 94402->94405 94403->94408 94406 f72bd9 94404->94406 94411 f72c26 94405->94411 94410 f36350 22 API calls 94406->94410 94409 f32b5f 94408->94409 94421 f330f2 Shell_NotifyIconW ___scrt_fastfail 94408->94421 94414 f32b66 SetCurrentDirectoryW 94409->94414 94413 f72be7 94410->94413 94411->94409 94415 f333c6 22 API calls 94413->94415 94416 f32b7a 94414->94416 94415->94405 94422 f32cd4 7 API calls 94417->94422 94419 f32b2a 94420 f32c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 94419->94420 94420->94399 94421->94409 94422->94419 94423 f68402 94428 f681be 94423->94428 94427 f6842a 94433 f681ef try_get_first_available_module 94428->94433 94430 f683ee 94447 f627ec 26 API calls pre_c_initialization 94430->94447 94432 f68343 94432->94427 94440 f70984 94432->94440 94436 f68338 94433->94436 94443 f58e0b 40 API calls 2 library calls 94433->94443 94435 f6838c 94435->94436 94444 f58e0b 40 API calls 2 library calls 94435->94444 94436->94432 94446 f5f2d9 20 API calls _free 94436->94446 94438 f683ab 94438->94436 94445 f58e0b 40 API calls 2 library calls 94438->94445 94448 f70081 94440->94448 94442 f7099f 94442->94427 94443->94435 94444->94438 94445->94436 94446->94430 94447->94432 94450 f7008d __FrameHandler3::FrameUnwindToState 94448->94450 94449 f7009b 94505 f5f2d9 20 API calls _free 94449->94505 94450->94449 94452 f700d4 94450->94452 94459 f7065b 94452->94459 94453 f700a0 94506 f627ec 26 API calls pre_c_initialization 94453->94506 94456 f700aa __wsopen_s 94456->94442 94460 f70678 94459->94460 94461 f706a6 94460->94461 94462 f7068d 94460->94462 94508 f65221 94461->94508 94522 f5f2c6 20 API calls _free 94462->94522 94465 f70692 94523 f5f2d9 20 API calls _free 94465->94523 94466 f706ab 94467 f706b4 94466->94467 94468 f706cb 94466->94468 94524 f5f2c6 20 API calls _free 94467->94524 94521 f7039a CreateFileW 94468->94521 94472 f706b9 94525 f5f2d9 20 API calls _free 94472->94525 94473 f700f8 94507 f70121 LeaveCriticalSection __wsopen_s 94473->94507 94475 f70781 GetFileType 94477 f707d3 94475->94477 94478 f7078c GetLastError 94475->94478 94476 f70756 GetLastError 94527 f5f2a3 20 API calls 2 library calls 94476->94527 94530 f6516a 21 API calls 3 library calls 94477->94530 94528 f5f2a3 20 API calls 2 library calls 94478->94528 94480 f70704 94480->94475 94480->94476 94526 f7039a CreateFileW 94480->94526 94482 f7079a CloseHandle 94482->94465 94484 f707c3 94482->94484 94529 f5f2d9 20 API calls _free 94484->94529 94486 f70749 94486->94475 94486->94476 94488 f707f4 94490 f70840 94488->94490 94531 f705ab 72 API calls 4 library calls 94488->94531 94489 f707c8 94489->94465 94495 f7086d 94490->94495 94532 f7014d 72 API calls 4 library calls 94490->94532 94493 f70866 94494 f7087e 94493->94494 94493->94495 94494->94473 94497 f708fc CloseHandle 94494->94497 94496 f686ae __wsopen_s 29 API calls 94495->94496 94496->94473 94533 f7039a CreateFileW 94497->94533 94499 f70927 94500 f7095d 94499->94500 94501 f70931 GetLastError 94499->94501 94500->94473 94534 f5f2a3 20 API calls 2 library calls 94501->94534 94503 f7093d 94535 f65333 21 API calls 3 library calls 94503->94535 94505->94453 94506->94456 94507->94456 94509 f6522d __FrameHandler3::FrameUnwindToState 94508->94509 94536 f62f5e EnterCriticalSection 94509->94536 94511 f65234 94512 f65259 94511->94512 94517 f652c7 EnterCriticalSection 94511->94517 94519 f6527b 94511->94519 94514 f65000 __wsopen_s 21 API calls 94512->94514 94515 f6525e 94514->94515 94515->94519 94540 f65147 EnterCriticalSection 94515->94540 94516 f652a4 __wsopen_s 94516->94466 94518 f652d4 LeaveCriticalSection 94517->94518 94517->94519 94518->94511 94537 f6532a 94519->94537 94521->94480 94522->94465 94523->94473 94524->94472 94525->94465 94526->94486 94527->94465 94528->94482 94529->94489 94530->94488 94531->94490 94532->94493 94533->94499 94534->94503 94535->94500 94536->94511 94541 f62fa6 LeaveCriticalSection 94537->94541 94539 f65331 94539->94516 94540->94519 94541->94539 94542 f31044 94547 f310f3 94542->94547 94544 f3104a 94583 f500a3 29 API calls __onexit 94544->94583 94546 f31054 94584 f31398 94547->94584 94551 f3116a 94552 f3a961 22 API calls 94551->94552 94553 f31174 94552->94553 94554 f3a961 22 API calls 94553->94554 94555 f3117e 94554->94555 94556 f3a961 22 API calls 94555->94556 94557 f31188 94556->94557 94558 f3a961 22 API calls 94557->94558 94559 f311c6 94558->94559 94560 f3a961 22 API calls 94559->94560 94561 f31292 94560->94561 94594 f3171c 94561->94594 94565 f312c4 94566 f3a961 22 API calls 94565->94566 94567 f312ce 94566->94567 94568 f41940 9 API calls 94567->94568 94569 f312f9 94568->94569 94615 f31aab 94569->94615 94571 f31315 94572 f31325 GetStdHandle 94571->94572 94573 f72485 94572->94573 94574 f3137a 94572->94574 94573->94574 94575 f7248e 94573->94575 94577 f31387 OleInitialize 94574->94577 94576 f4fddb 22 API calls 94575->94576 94578 f72495 94576->94578 94577->94544 94622 fa011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 94578->94622 94580 f7249e 94623 fa0944 CreateThread 94580->94623 94582 f724aa CloseHandle 94582->94574 94583->94546 94624 f313f1 94584->94624 94587 f313f1 22 API calls 94588 f313d0 94587->94588 94589 f3a961 22 API calls 94588->94589 94590 f313dc 94589->94590 94591 f36b57 22 API calls 94590->94591 94592 f31129 94591->94592 94593 f31bc3 6 API calls 94592->94593 94593->94551 94595 f3a961 22 API calls 94594->94595 94596 f3172c 94595->94596 94597 f3a961 22 API calls 94596->94597 94598 f31734 94597->94598 94599 f3a961 22 API calls 94598->94599 94600 f3174f 94599->94600 94601 f4fddb 22 API calls 94600->94601 94602 f3129c 94601->94602 94603 f31b4a 94602->94603 94604 f31b58 94603->94604 94605 f3a961 22 API calls 94604->94605 94606 f31b63 94605->94606 94607 f3a961 22 API calls 94606->94607 94608 f31b6e 94607->94608 94609 f3a961 22 API calls 94608->94609 94610 f31b79 94609->94610 94611 f3a961 22 API calls 94610->94611 94612 f31b84 94611->94612 94613 f4fddb 22 API calls 94612->94613 94614 f31b96 RegisterWindowMessageW 94613->94614 94614->94565 94616 f31abb 94615->94616 94617 f7272d 94615->94617 94619 f4fddb 22 API calls 94616->94619 94631 fa3209 23 API calls 94617->94631 94621 f31ac3 94619->94621 94620 f72738 94621->94571 94622->94580 94623->94582 94632 fa092a 28 API calls 94623->94632 94625 f3a961 22 API calls 94624->94625 94626 f313fc 94625->94626 94627 f3a961 22 API calls 94626->94627 94628 f31404 94627->94628 94629 f3a961 22 API calls 94628->94629 94630 f313c6 94629->94630 94630->94587 94631->94620 94633 11a17e0 94647 119f430 94633->94647 94635 11a1892 94650 11a16d0 94635->94650 94653 11a28c0 GetPEB 94647->94653 94649 119fabb 94649->94635 94651 11a16d9 Sleep 94650->94651 94652 11a16e7 94651->94652 94654 11a28ea 94653->94654 94654->94649 94655 f31cad SystemParametersInfoW

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 f342de-f3434d call f3a961 GetVersionExW call f36b57 5 f73617-f7362a 0->5 6 f34353 0->6 8 f7362b-f7362f 5->8 7 f34355-f34357 6->7 9 f73656 7->9 10 f3435d-f343bc call f393b2 call f337a0 7->10 11 f73632-f7363e 8->11 12 f73631 8->12 16 f7365d-f73660 9->16 29 f343c2-f343c4 10->29 30 f737df-f737e6 10->30 11->8 13 f73640-f73642 11->13 12->11 13->7 15 f73648-f7364f 13->15 15->5 18 f73651 15->18 19 f73666-f736a8 16->19 20 f3441b-f34435 GetCurrentProcess IsWow64Process 16->20 18->9 19->20 24 f736ae-f736b1 19->24 22 f34437 20->22 23 f34494-f3449a 20->23 26 f3443d-f34449 22->26 23->26 27 f736b3-f736bd 24->27 28 f736db-f736e5 24->28 31 f73824-f73828 GetSystemInfo 26->31 32 f3444f-f3445e LoadLibraryA 26->32 33 f736bf-f736c5 27->33 34 f736ca-f736d6 27->34 36 f736e7-f736f3 28->36 37 f736f8-f73702 28->37 29->16 35 f343ca-f343dd 29->35 38 f73806-f73809 30->38 39 f737e8 30->39 44 f34460-f3446e GetProcAddress 32->44 45 f3449c-f344a6 GetSystemInfo 32->45 33->20 34->20 46 f343e3-f343e5 35->46 47 f73726-f7372f 35->47 36->20 40 f73715-f73721 37->40 41 f73704-f73710 37->41 42 f737f4-f737fc 38->42 43 f7380b-f7381a 38->43 48 f737ee 39->48 40->20 41->20 42->38 43->48 51 f7381c-f73822 43->51 44->45 52 f34470-f34474 GetNativeSystemInfo 44->52 53 f34476-f34478 45->53 54 f343eb-f343ee 46->54 55 f7374d-f73762 46->55 49 f73731-f73737 47->49 50 f7373c-f73748 47->50 48->42 49->20 50->20 51->42 52->53 60 f34481-f34493 53->60 61 f3447a-f3447b FreeLibrary 53->61 56 f73791-f73794 54->56 57 f343f4-f3440f 54->57 58 f73764-f7376a 55->58 59 f7376f-f7377b 55->59 56->20 64 f7379a-f737c1 56->64 62 f34415 57->62 63 f73780-f7378c 57->63 58->20 59->20 61->60 62->20 63->20 65 f737c3-f737c9 64->65 66 f737ce-f737da 64->66 65->20 66->20
                                                                            APIs
                                                                            • GetVersionExW.KERNEL32(?), ref: 00F3430D
                                                                              • Part of subcall function 00F36B57: _wcslen.LIBCMT ref: 00F36B6A
                                                                            • GetCurrentProcess.KERNEL32(?,00FCCB64,00000000,?,?), ref: 00F34422
                                                                            • IsWow64Process.KERNEL32(00000000,?,?), ref: 00F34429
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00F34454
                                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00F34466
                                                                            • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00F34474
                                                                            • FreeLibrary.KERNEL32(00000000,?,?), ref: 00F3447B
                                                                            • GetSystemInfo.KERNEL32(?,?,?), ref: 00F344A0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                            • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                            • API String ID: 3290436268-3101561225
                                                                            • Opcode ID: 0a5a52d796d63c77a1e206cec95601a674d7ab1e1deb44d5a01dfb9f425ef548
                                                                            • Instruction ID: add7625ddb78165541183081c440a07b09569081b8cbdc3b62eb43e7702d08f5
                                                                            • Opcode Fuzzy Hash: 0a5a52d796d63c77a1e206cec95601a674d7ab1e1deb44d5a01dfb9f425ef548
                                                                            • Instruction Fuzzy Hash: 3DA1B772D0E2C0DFC737C769B4816957FA47B26314F08D4A9E4C5A3A0AD23AD505FBA2

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 373 f3d85a-f3d87a 374 f3d880-f3d882 373->374 375 f3d888-f3d88c 374->375 376 f3d9fc-f3da02 374->376 377 f3d890-f3d892 375->377 378 f3da04-f3da19 timeGetTime 376->378 379 f3da3d-f3da40 376->379 380 f3d894-f3d89a 377->380 381 f81dc9-f81dcf 378->381 382 f3da1f-f3da25 378->382 379->374 385 f3d8a0-f3d8ae 380->385 386 f3da45-f3da4b 380->386 383 f3da28-f3da2c 381->383 384 f81dd5 381->384 382->383 387 f3da27 382->387 383->379 388 f3da2e 383->388 393 f81dda-f81e10 timeGetTime call f4e300 call fa3a2a 384->393 391 f3d8b4-f3d8ed 385->391 392 f3d9c8-f3d9f9 385->392 389 f3da51-f3da56 386->389 390 f81e15-f81e21 call fa3cb6 386->390 387->383 388->393 394 f3da34-f3da37 388->394 389->380 390->377 402 f82742 390->402 409 f3d8f3-f3d8f6 391->409 410 f3dbaf-f3dbbe Sleep 391->410 393->379 394->379 394->393 407 f8274a-f8275c call f31a05 402->407 413 f82b74-f82b83 Sleep 409->413 414 f3d8fc-f3d8ff 409->414 415 f3dbc0-f3dbcd call f4e551 410->415 416 f3dbdd-f3dbe6 410->416 418 f82bb1-f82bc5 413->418 419 f82b85-f82b92 call f4e551 413->419 414->413 420 f3d905-f3d908 414->420 415->416 433 f3dbcf 415->433 416->392 417 f3dbec-f82a44 416->417 417->392 429 f82a4a 417->429 426 f82bef-f82bf2 418->426 427 f82bc7-f82be3 call f9d4dc 418->427 419->418 441 f82b94 419->441 420->410 424 f3d90e-f3d911 420->424 424->410 432 f3d917-f3d91a 424->432 426->392 430 f82bf8-f82c09 426->430 427->392 445 f82be9-f82bed 427->445 435 f82a79-f82a7d call fc2a35 429->435 436 f82a5a-f82a61 call fc29bf 429->436 437 f82a51-f82a58 call fc29bf 429->437 438 f82a63-f82a67 call fc2a35 429->438 439 f82c0b-f82c1f GetExitCodeProcess 430->439 440 f82c51-f82c5d 430->440 432->410 442 f3d920-f3d923 432->442 443 f3dc56-f3dc5d 433->443 444 f3dbd5-f3dbdb 433->444 459 f82a82-f82a86 435->459 465 f82a6c-f82a70 436->465 437->459 438->465 449 f82c21-f82c31 WaitForSingleObject 439->449 450 f82c37-f82c47 CloseHandle 439->450 452 f82c5f-f82c69 440->452 453 f82c86-f82c8d call f3630c 440->453 455 f82b9e-f82ba6 441->455 456 f82b96-f82b9c 441->456 442->410 457 f3d929-f3d93e 442->457 446 f3dc63-f3dc74 443->446 447 f82a31-f82a39 443->447 444->416 444->443 445->430 446->392 447->407 449->392 449->450 450->440 460 f82c6b 452->460 461 f82c71-f82c84 call fb7e40 452->461 469 f82c92-f82caf Sleep 453->469 455->402 466 f82bac 455->466 456->418 456->455 467 f3d944-f3d946 457->467 468 f82a22-f82a2c 457->468 470 f82a88-f82a96 459->470 471 f82ad0 459->471 460->461 461->469 465->470 473 f82a72 465->473 466->418 467->468 474 f3d94c-f3d955 467->474 468->392 469->392 475 f82a98 470->475 476 f82a9b-f82aab 470->476 471->392 477 f82ad6-f82ad8 471->477 480 f82ada-f82ae3 473->480 481 f82a74 473->481 474->468 482 f3d95b-f3d985 474->482 475->476 483 f82aad 476->483 484 f82ab0-f82ace call f31a05 476->484 477->480 485 f82b53-f82b6f call f9e97b 477->485 486 f82aea-f82b4e call f3cfa0 call fb5658 call f3cfa0 480->486 487 f82ae5-f82ae8 480->487 481->392 488 f3da5b-f3da5e 482->488 489 f3d98b-f3d992 call f3dd50 482->489 483->484 484->471 485->392 486->485 487->485 487->486 494 f3da60-f3da68 call f3dfd0 488->494 495 f3da7f-f3da83 488->495 496 f3d997-f3d99d 489->496 494->496 500 f828ce-f828e2 call f3ec40 495->500 501 f3da89-f3da90 495->501 503 f3d9a3-f3d9b2 496->503 504 f3dae8-f3daf3 496->504 524 f828e7-f828fb call fa359c 500->524 508 f3da97-f3daa6 call f41310 501->508 509 f3dacd-f3dae6 call f3bf40 501->509 512 f3dc79-f3dc7f 503->512 513 f3d9b8-f3d9c0 503->513 515 f3daf9-f3db04 call f4fdcd 504->515 516 f82986-f8299a call f4fe14 call f4fdcd 504->516 523 f3daab-f3daad 508->523 509->523 512->513 522 f3dc85 512->522 513->392 515->410 533 f82a15-f82a1d call f4fdcd 516->533 522->381 523->496 527 f3dab3-f3dac2 523->527 534 f828fd-f82908 524->534 535 f82934-f8293b 524->535 527->496 528 f3dac8 527->528 528->524 533->513 538 f8290a-f8291e call f4fe14 call f4fdcd 534->538 539 f82921-f8292c call f4fdcd 534->539 535->513 537 f82941-f82947 535->537 537->513 542 f8294d 537->542 538->539 539->535 545 f82868-f8286e 542->545 546 f8296a-f82970 542->546 547 f8287f-f82885 542->547 548 f82803-f82818 call f4fe14 542->548 549 f82896-f8289c 542->549 545->513 553 f82874-f8287a call f8fd59 545->553 546->513 552 f82976-f82981 call f3988f 546->552 547->513 554 f8288b-f82891 547->554 548->533 549->513 555 f828a2-f828ac call f3988f 549->555 552->533 553->513 554->513 555->533
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Timetime
                                                                            • String ID:
                                                                            • API String ID: 17336451-0
                                                                            • Opcode ID: ad5b6bcc0f64f104ff6be0b27d37c60e1f612e46ad05614a6f7d0d200a302910
                                                                            • Instruction ID: b066f13a4a93ec3373144604c9c9b4ac38eb601dc258d123c45ae1a7019c6795
                                                                            • Opcode Fuzzy Hash: ad5b6bcc0f64f104ff6be0b27d37c60e1f612e46ad05614a6f7d0d200a302910
                                                                            • Instruction Fuzzy Hash: 7A12EF71A08201DFD728DF24D884BAAB7E1FF85324F148559F89687291D779F844FB82

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1130 f342a2-f342ba CreateStreamOnHGlobal 1131 f342da-f342dd 1130->1131 1132 f342bc-f342d3 FindResourceExW 1130->1132 1133 f342d9 1132->1133 1134 f735ba-f735c9 LoadResource 1132->1134 1133->1131 1134->1133 1135 f735cf-f735dd SizeofResource 1134->1135 1135->1133 1136 f735e3-f735ee LockResource 1135->1136 1136->1133 1137 f735f4-f735fc 1136->1137 1138 f73600-f73612 1137->1138 1138->1133
                                                                            APIs
                                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00F350AA,?,?,00000000,00000000), ref: 00F342B2
                                                                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00F350AA,?,?,00000000,00000000), ref: 00F342C9
                                                                            • LoadResource.KERNEL32(?,00000000,?,?,00F350AA,?,?,00000000,00000000,?,?,?,?,?,?,00F34F20), ref: 00F735BE
                                                                            • SizeofResource.KERNEL32(?,00000000,?,?,00F350AA,?,?,00000000,00000000,?,?,?,?,?,?,00F34F20), ref: 00F735D3
                                                                            • LockResource.KERNEL32(00F350AA,?,?,00F350AA,?,?,00000000,00000000,?,?,?,?,?,?,00F34F20,?), ref: 00F735E6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                            • String ID: SCRIPT
                                                                            • API String ID: 3051347437-3967369404
                                                                            • Opcode ID: a0aadf03291d813e491f98e1fee12d2a54ac37171b742750b0b338bd98b5822a
                                                                            • Instruction ID: b320c983f3fdf10c8e5d0c333f4145b5b0024f30103527a569e19fde8130fe7f
                                                                            • Opcode Fuzzy Hash: a0aadf03291d813e491f98e1fee12d2a54ac37171b742750b0b338bd98b5822a
                                                                            • Instruction Fuzzy Hash: 4811AC70600305BFD7218BA6DD49F677BBDEBC6B61F148169F41696290DB71EC00AA70

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00F32B6B
                                                                              • Part of subcall function 00F33A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,01001418,?,00F32E7F,?,?,?,00000000), ref: 00F33A78
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                            • GetForegroundWindow.USER32(runas,?,?,?,?,?,00FF2224), ref: 00F72C10
                                                                            • ShellExecuteW.SHELL32(00000000,?,?,00FF2224), ref: 00F72C17
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                            • String ID: runas
                                                                            • API String ID: 448630720-4000483414
                                                                            • Opcode ID: cfb05e53a2d1c4f1f6e5dcf7dbdad9438169e8dfe7538a378a7d7bc87805be5a
                                                                            • Instruction ID: 06dc227dbbce5af65847008605180aeaa04927a10a6eac253831f96ecb3b425c
                                                                            • Opcode Fuzzy Hash: cfb05e53a2d1c4f1f6e5dcf7dbdad9438169e8dfe7538a378a7d7bc87805be5a
                                                                            • Instruction Fuzzy Hash: 8511EE316083456AC719FF60DC429BEBBA4AFD1370F44542DF286030A2CFB98A0AF712
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(?,00F75222), ref: 00F9DBCE
                                                                            • GetFileAttributesW.KERNELBASE(?), ref: 00F9DBDD
                                                                            • FindFirstFileW.KERNELBASE(?,?), ref: 00F9DBEE
                                                                            • FindClose.KERNEL32(00000000), ref: 00F9DBFA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                            • String ID:
                                                                            • API String ID: 2695905019-0
                                                                            • Opcode ID: 75fffdaff9b0ad083fba0081a6501b32186d731eaa8d14ec11aadfb397bc611d
                                                                            • Instruction ID: 8d47973c52c62b1c523973df89bb50420c6e60a374bc1d33ebbc8db4de432834
                                                                            • Opcode Fuzzy Hash: 75fffdaff9b0ad083fba0081a6501b32186d731eaa8d14ec11aadfb397bc611d
                                                                            • Instruction Fuzzy Hash: 2BF0E531810918579B206F7CEE0ECAA776C9E01334B244702F83AC30F0EBB05D55EAD5

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00F32D07
                                                                            • RegisterClassExW.USER32(00000030), ref: 00F32D31
                                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F32D42
                                                                            • InitCommonControlsEx.COMCTL32(?), ref: 00F32D5F
                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F32D6F
                                                                            • LoadIconW.USER32(000000A9), ref: 00F32D85
                                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F32D94
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                            • API String ID: 2914291525-1005189915
                                                                            • Opcode ID: 802c25cefd9cdd853e79b0c48f254e529e5763393423b15a69e23185a39db160
                                                                            • Instruction ID: bc9cf779ac6d22711aeb623701922bf92e7c203ce22372a7fcb07c0e9c706fdd
                                                                            • Opcode Fuzzy Hash: 802c25cefd9cdd853e79b0c48f254e529e5763393423b15a69e23185a39db160
                                                                            • Instruction Fuzzy Hash: DB21EFB1D41308AFDB11DFA4E98AB9DBBB4FB08700F00811AFA55A7290D7BA85449F91

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 68 f7065b-f7068b call f7042f 71 f706a6-f706b2 call f65221 68->71 72 f7068d-f70698 call f5f2c6 68->72 78 f706b4-f706c9 call f5f2c6 call f5f2d9 71->78 79 f706cb-f70714 call f7039a 71->79 77 f7069a-f706a1 call f5f2d9 72->77 89 f7097d-f70983 77->89 78->77 87 f70716-f7071f 79->87 88 f70781-f7078a GetFileType 79->88 91 f70756-f7077c GetLastError call f5f2a3 87->91 92 f70721-f70725 87->92 93 f707d3-f707d6 88->93 94 f7078c-f707bd GetLastError call f5f2a3 CloseHandle 88->94 91->77 92->91 98 f70727-f70754 call f7039a 92->98 96 f707df-f707e5 93->96 97 f707d8-f707dd 93->97 94->77 105 f707c3-f707ce call f5f2d9 94->105 101 f707e9-f70837 call f6516a 96->101 102 f707e7 96->102 97->101 98->88 98->91 111 f70847-f7086b call f7014d 101->111 112 f70839-f70845 call f705ab 101->112 102->101 105->77 117 f7087e-f708c1 111->117 118 f7086d 111->118 112->111 119 f7086f-f70879 call f686ae 112->119 121 f708c3-f708c7 117->121 122 f708e2-f708f0 117->122 118->119 119->89 121->122 124 f708c9-f708dd 121->124 125 f708f6-f708fa 122->125 126 f7097b 122->126 124->122 125->126 127 f708fc-f7092f CloseHandle call f7039a 125->127 126->89 130 f70963-f70977 127->130 131 f70931-f7095d GetLastError call f5f2a3 call f65333 127->131 130->126 131->130
                                                                            APIs
                                                                              • Part of subcall function 00F7039A: CreateFileW.KERNELBASE(00000000,00000000,?,00F70704,?,?,00000000,?,00F70704,00000000,0000000C), ref: 00F703B7
                                                                            • GetLastError.KERNEL32 ref: 00F7076F
                                                                            • __dosmaperr.LIBCMT ref: 00F70776
                                                                            • GetFileType.KERNELBASE(00000000), ref: 00F70782
                                                                            • GetLastError.KERNEL32 ref: 00F7078C
                                                                            • __dosmaperr.LIBCMT ref: 00F70795
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00F707B5
                                                                            • CloseHandle.KERNEL32(?), ref: 00F708FF
                                                                            • GetLastError.KERNEL32 ref: 00F70931
                                                                            • __dosmaperr.LIBCMT ref: 00F70938
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                            • String ID: H
                                                                            • API String ID: 4237864984-2852464175
                                                                            • Opcode ID: fcc1eeb2a9753278cf998d619bf9290162a5f14c621780bbcee1e98cde91ff4b
                                                                            • Instruction ID: 4aec7dbcd386d61b678fe6049ff4b85c65e0f7bdc02ccffec7d745c14f64a1d0
                                                                            • Opcode Fuzzy Hash: fcc1eeb2a9753278cf998d619bf9290162a5f14c621780bbcee1e98cde91ff4b
                                                                            • Instruction Fuzzy Hash: 15A12732A101488FDF19AF68DC51BAD3BA0AF46320F14815EF8599B391DB359C17EB92

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 00F33A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,01001418,?,00F32E7F,?,?,?,00000000), ref: 00F33A78
                                                                              • Part of subcall function 00F33357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F33379
                                                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00F3356A
                                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00F7318D
                                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00F731CE
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00F73210
                                                                            • _wcslen.LIBCMT ref: 00F73277
                                                                            • _wcslen.LIBCMT ref: 00F73286
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                            • API String ID: 98802146-2727554177
                                                                            • Opcode ID: 60f2ae1428aaf155738f41df320b520d042b9beaaf9f31eea98f7d91b1526447
                                                                            • Instruction ID: 815a572f4d887de613ad4c38b979fc2d12872018d7f32451026ac883e5606527
                                                                            • Opcode Fuzzy Hash: 60f2ae1428aaf155738f41df320b520d042b9beaaf9f31eea98f7d91b1526447
                                                                            • Instruction Fuzzy Hash: 3171E3714083019EC315EF25DC86D5BBBE8FF84350F40882EF589D31A5EB799A48EB52

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00F32B8E
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00F32B9D
                                                                            • LoadIconW.USER32(00000063), ref: 00F32BB3
                                                                            • LoadIconW.USER32(000000A4), ref: 00F32BC5
                                                                            • LoadIconW.USER32(000000A2), ref: 00F32BD7
                                                                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F32BEF
                                                                            • RegisterClassExW.USER32(?), ref: 00F32C40
                                                                              • Part of subcall function 00F32CD4: GetSysColorBrush.USER32(0000000F), ref: 00F32D07
                                                                              • Part of subcall function 00F32CD4: RegisterClassExW.USER32(00000030), ref: 00F32D31
                                                                              • Part of subcall function 00F32CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F32D42
                                                                              • Part of subcall function 00F32CD4: InitCommonControlsEx.COMCTL32(?), ref: 00F32D5F
                                                                              • Part of subcall function 00F32CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F32D6F
                                                                              • Part of subcall function 00F32CD4: LoadIconW.USER32(000000A9), ref: 00F32D85
                                                                              • Part of subcall function 00F32CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F32D94
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                            • String ID: #$0$AutoIt v3
                                                                            • API String ID: 423443420-4155596026
                                                                            • Opcode ID: 81bfc708a1ed330c6bf990dc081238a5c50aa820fac619a40720dbfe4399ca15
                                                                            • Instruction ID: 01c68936d0e0e64f103438c93bb2f37c41aa85e246aa7d053951dd92085c4737
                                                                            • Opcode Fuzzy Hash: 81bfc708a1ed330c6bf990dc081238a5c50aa820fac619a40720dbfe4399ca15
                                                                            • Instruction Fuzzy Hash: 75214970E00318ABDB229FA5ED49BA97FF5FB48B50F04801AF644A7694D7BA8540DF90

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 209 f33170-f33185 210 f33187-f3318a 209->210 211 f331e5-f331e7 209->211 213 f331eb 210->213 214 f3318c-f33193 210->214 211->210 212 f331e9 211->212 215 f331d0-f331d8 DefWindowProcW 212->215 216 f331f1-f331f6 213->216 217 f72dfb-f72e23 call f318e2 call f4e499 213->217 218 f33265-f3326d PostQuitMessage 214->218 219 f33199-f3319e 214->219 226 f331de-f331e4 215->226 221 f331f8-f331fb 216->221 222 f3321d-f33244 SetTimer RegisterWindowMessageW 216->222 255 f72e28-f72e2f 217->255 220 f33219-f3321b 218->220 224 f331a4-f331a8 219->224 225 f72e7c-f72e90 call f9bf30 219->225 220->226 227 f33201-f33214 KillTimer call f330f2 call f33c50 221->227 228 f72d9c-f72d9f 221->228 222->220 230 f33246-f33251 CreatePopupMenu 222->230 231 f331ae-f331b3 224->231 232 f72e68-f72e72 call f9c161 224->232 225->220 250 f72e96 225->250 227->220 234 f72dd7-f72df6 MoveWindow 228->234 235 f72da1-f72da5 228->235 230->220 239 f72e4d-f72e54 231->239 240 f331b9-f331be 231->240 246 f72e77 232->246 234->220 242 f72da7-f72daa 235->242 243 f72dc6-f72dd2 SetFocus 235->243 239->215 244 f72e5a-f72e63 call f90ad7 239->244 248 f33253-f33263 call f3326f 240->248 249 f331c4-f331ca 240->249 242->249 251 f72db0-f72dc1 call f318e2 242->251 243->220 244->215 246->220 248->220 249->215 249->255 250->215 251->220 255->215 259 f72e35-f72e48 call f330f2 call f33837 255->259 259->215
                                                                            APIs
                                                                            • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00F3316A,?,?), ref: 00F331D8
                                                                            • KillTimer.USER32(?,00000001,?,?,?,?,?,00F3316A,?,?), ref: 00F33204
                                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F33227
                                                                            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00F3316A,?,?), ref: 00F33232
                                                                            • CreatePopupMenu.USER32 ref: 00F33246
                                                                            • PostQuitMessage.USER32(00000000), ref: 00F33267
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                            • String ID: TaskbarCreated
                                                                            • API String ID: 129472671-2362178303
                                                                            • Opcode ID: 066e3e37f2198a7a96a836d426dd54a02ad526769760243800317e0af69f25bd
                                                                            • Instruction ID: c5f0ff3d44bf6a227ba1601ebb7119335279ea7b3fd5110b2a4c083569cbd2c5
                                                                            • Opcode Fuzzy Hash: 066e3e37f2198a7a96a836d426dd54a02ad526769760243800317e0af69f25bd
                                                                            • Instruction Fuzzy Hash: 48412C32E44204ABEB25AB78DD0EB7A3755FB05370F044119F54AC62D1CB79CE40B7A1

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 265 f68d45-f68d55 266 f68d57-f68d6a call f5f2c6 call f5f2d9 265->266 267 f68d6f-f68d71 265->267 284 f690f1 266->284 269 f68d77-f68d7d 267->269 270 f690d9-f690e6 call f5f2c6 call f5f2d9 267->270 269->270 271 f68d83-f68dae 269->271 286 f690ec call f627ec 270->286 271->270 274 f68db4-f68dbd 271->274 277 f68dd7-f68dd9 274->277 278 f68dbf-f68dd2 call f5f2c6 call f5f2d9 274->278 282 f690d5-f690d7 277->282 283 f68ddf-f68de3 277->283 278->286 287 f690f4-f690f9 282->287 283->282 289 f68de9-f68ded 283->289 284->287 286->284 289->278 292 f68def-f68e06 289->292 294 f68e23-f68e2c 292->294 295 f68e08-f68e0b 292->295 298 f68e2e-f68e45 call f5f2c6 call f5f2d9 call f627ec 294->298 299 f68e4a-f68e54 294->299 296 f68e15-f68e1e 295->296 297 f68e0d-f68e13 295->297 303 f68ebf-f68ed9 296->303 297->296 297->298 328 f6900c 298->328 301 f68e56-f68e58 299->301 302 f68e5b-f68e79 call f63820 call f629c8 * 2 299->302 301->302 338 f68e96-f68ebc call f69424 302->338 339 f68e7b-f68e91 call f5f2d9 call f5f2c6 302->339 305 f68edf-f68eef 303->305 306 f68fad-f68fb6 call f6f89b 303->306 305->306 310 f68ef5-f68ef7 305->310 317 f68fb8-f68fca 306->317 318 f69029 306->318 310->306 314 f68efd-f68f23 310->314 314->306 319 f68f29-f68f3c 314->319 317->318 323 f68fcc-f68fdb GetConsoleMode 317->323 321 f6902d-f69045 ReadFile 318->321 319->306 324 f68f3e-f68f40 319->324 326 f69047-f6904d 321->326 327 f690a1-f690ac GetLastError 321->327 323->318 329 f68fdd-f68fe1 323->329 324->306 330 f68f42-f68f6d 324->330 326->327 334 f6904f 326->334 332 f690c5-f690c8 327->332 333 f690ae-f690c0 call f5f2d9 call f5f2c6 327->333 336 f6900f-f69019 call f629c8 328->336 329->321 335 f68fe3-f68ffd ReadConsoleW 329->335 330->306 337 f68f6f-f68f82 330->337 346 f69005-f6900b call f5f2a3 332->346 347 f690ce-f690d0 332->347 333->328 342 f69052-f69064 334->342 344 f6901e-f69027 335->344 345 f68fff GetLastError 335->345 336->287 337->306 349 f68f84-f68f86 337->349 338->303 339->328 342->336 353 f69066-f6906a 342->353 344->342 345->346 346->328 347->336 349->306 350 f68f88-f68fa8 349->350 350->306 359 f69083-f6908e 353->359 360 f6906c-f6907c call f68a61 353->360 365 f69090 call f68bb1 359->365 366 f6909a-f6909f call f688a1 359->366 371 f6907f-f69081 360->371 372 f69095-f69098 365->372 366->372 371->336 372->371
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4cbbfc3ee2fbf46e8f2ea3fd00cc842ebea1264cd3dd59781647abf3e0f80705
                                                                            • Instruction ID: e935344005c3f2e9405047e801188d56d7b8a4183ce383118d470873bd3706fa
                                                                            • Opcode Fuzzy Hash: 4cbbfc3ee2fbf46e8f2ea3fd00cc842ebea1264cd3dd59781647abf3e0f80705
                                                                            • Instruction Fuzzy Hash: 3CC12475D08249AFCF11DFA8C841BADBBB4EF09360F044199F915A7392CB758946EB60
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: D%$D%$D%$Variable must be of type 'Object'.
                                                                            • API String ID: 0-2018361425
                                                                            • Opcode ID: 6b02f71306c8bff69c35f9bae392ce9d38df2c9112570824a295f5ad0d93be07
                                                                            • Instruction ID: a5eb76c4e12bc420e039ac34270e87f7d861c045b600fa5eff44a40a76ae875d
                                                                            • Opcode Fuzzy Hash: 6b02f71306c8bff69c35f9bae392ce9d38df2c9112570824a295f5ad0d93be07
                                                                            • Instruction Fuzzy Hash: 5AC29A75E00205CFCB24DF58C880BADBBB1BF09720F248169E956AB3A1D375ED41EB91

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1076 11a1a10-11a1abe call 119f430 1079 11a1ac5-11a1aeb call 11a2920 CreateFileW 1076->1079 1082 11a1aed 1079->1082 1083 11a1af2-11a1b02 1079->1083 1084 11a1c3d-11a1c41 1082->1084 1088 11a1b09-11a1b23 VirtualAlloc 1083->1088 1089 11a1b04 1083->1089 1086 11a1c83-11a1c86 1084->1086 1087 11a1c43-11a1c47 1084->1087 1090 11a1c89-11a1c90 1086->1090 1091 11a1c49-11a1c4c 1087->1091 1092 11a1c53-11a1c57 1087->1092 1095 11a1b2a-11a1b41 ReadFile 1088->1095 1096 11a1b25 1088->1096 1089->1084 1097 11a1c92-11a1c9d 1090->1097 1098 11a1ce5-11a1cfa 1090->1098 1091->1092 1093 11a1c59-11a1c63 1092->1093 1094 11a1c67-11a1c6b 1092->1094 1093->1094 1101 11a1c7b 1094->1101 1102 11a1c6d-11a1c77 1094->1102 1103 11a1b48-11a1b88 VirtualAlloc 1095->1103 1104 11a1b43 1095->1104 1096->1084 1105 11a1c9f 1097->1105 1106 11a1ca1-11a1cad 1097->1106 1099 11a1d0a-11a1d12 1098->1099 1100 11a1cfc-11a1d07 VirtualFree 1098->1100 1100->1099 1101->1086 1102->1101 1107 11a1b8a 1103->1107 1108 11a1b8f-11a1baa call 11a2b70 1103->1108 1104->1084 1105->1098 1109 11a1caf-11a1cbf 1106->1109 1110 11a1cc1-11a1ccd 1106->1110 1107->1084 1116 11a1bb5-11a1bbf 1108->1116 1114 11a1ce3 1109->1114 1111 11a1cda-11a1ce0 1110->1111 1112 11a1ccf-11a1cd8 1110->1112 1111->1114 1112->1114 1114->1090 1117 11a1bf2-11a1c06 call 11a2980 1116->1117 1118 11a1bc1-11a1bf0 call 11a2b70 1116->1118 1124 11a1c0a-11a1c0e 1117->1124 1125 11a1c08 1117->1125 1118->1116 1126 11a1c1a-11a1c1e 1124->1126 1127 11a1c10-11a1c14 CloseHandle 1124->1127 1125->1084 1128 11a1c2e-11a1c37 1126->1128 1129 11a1c20-11a1c2b VirtualFree 1126->1129 1127->1126 1128->1079 1128->1084 1129->1128
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 011A1AE1
                                                                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 011A1D07
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720483954.000000000119F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119F000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_119f000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFileFreeVirtual
                                                                            • String ID:
                                                                            • API String ID: 204039940-0
                                                                            • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                                            • Instruction ID: 4dbbff0fa593899f5fc22923d263ac5cb7054db73221dc1d16f022cbc595b904
                                                                            • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                                            • Instruction Fuzzy Hash: 1CA12878E00209EBDB18CFA4C994BEEBBB5FF48304F608559E601BB284D7759A41CF95

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1140 f32c63-f32cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                            APIs
                                                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F32C91
                                                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F32CB2
                                                                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,00F31CAD,?), ref: 00F32CC6
                                                                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,00F31CAD,?), ref: 00F32CCF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CreateShow
                                                                            • String ID: AutoIt v3$edit
                                                                            • API String ID: 1584632944-3779509399
                                                                            • Opcode ID: 743494b336d9ed288f5c775bc16d447da13ae7af1139d9014825c01b9ba89c9a
                                                                            • Instruction ID: b58460a7cbc9aef68230e081788b9d6b156555e26e332d7a2c44d0d173499371
                                                                            • Opcode Fuzzy Hash: 743494b336d9ed288f5c775bc16d447da13ae7af1139d9014825c01b9ba89c9a
                                                                            • Instruction Fuzzy Hash: 6BF0F4755403947AEB320713AC09E673FBDD7C6F50F00801AF904A3594C67A8840EAB0

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1255 11a17e0-11a1908 call 119f430 call 11a16d0 CreateFileW 1262 11a190a 1255->1262 1263 11a190f-11a191f 1255->1263 1264 11a19bf-11a19c4 1262->1264 1266 11a1921 1263->1266 1267 11a1926-11a1940 VirtualAlloc 1263->1267 1266->1264 1268 11a1942 1267->1268 1269 11a1944-11a195b ReadFile 1267->1269 1268->1264 1270 11a195f-11a1999 call 11a1710 call 11a06d0 1269->1270 1271 11a195d 1269->1271 1276 11a199b-11a19b0 call 11a1760 1270->1276 1277 11a19b5-11a19bd ExitProcess 1270->1277 1271->1264 1276->1277 1277->1264
                                                                            APIs
                                                                              • Part of subcall function 011A16D0: Sleep.KERNELBASE(000001F4), ref: 011A16E1
                                                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 011A18FE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720483954.000000000119F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119F000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_119f000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFileSleep
                                                                            • String ID: EBNXS9TMUVVRCU57V57ME1
                                                                            • API String ID: 2694422964-551242376
                                                                            • Opcode ID: d37fc6740848d6df2432817494541c988f667f6d4edad8f1106d4855681fc6d6
                                                                            • Instruction ID: 346a6d5ae04ea7cb93300c5a2a9ae8d96836479506516143e991af0f2e5c6fee
                                                                            • Opcode Fuzzy Hash: d37fc6740848d6df2432817494541c988f667f6d4edad8f1106d4855681fc6d6
                                                                            • Instruction Fuzzy Hash: 16519074D04289EAEF15DBA4C844BEFBFB9AF15304F444199E608BB2C1D7B90B48CB65

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1279 fa2947-fa29b9 call f71f50 call fa25d6 call f4fe0b call f35722 call fa274e call f3511f call f55232 1294 fa29bf-fa29c6 call fa2e66 1279->1294 1295 fa2a6c-fa2a73 call fa2e66 1279->1295 1300 fa29cc-fa2a6a call f5d583 call f54983 call f59038 call f5d583 call f59038 * 2 1294->1300 1301 fa2a75-fa2a77 1294->1301 1295->1301 1302 fa2a7c 1295->1302 1305 fa2a7f-fa2b3a call f350f5 * 8 call fa3017 call f5e5eb 1300->1305 1304 fa2cb6-fa2cb7 1301->1304 1302->1305 1306 fa2cd5-fa2cdb 1304->1306 1344 fa2b3c-fa2b3e 1305->1344 1345 fa2b43-fa2b5e call fa2792 1305->1345 1309 fa2cdd-fa2ce8 call f4fdcd call f4fe14 1306->1309 1310 fa2cf0-fa2cf6 1306->1310 1322 fa2ced 1309->1322 1322->1310 1344->1304 1348 fa2bf0-fa2bfc call f5e678 1345->1348 1349 fa2b64-fa2b6c 1345->1349 1356 fa2bfe-fa2c0d DeleteFileW 1348->1356 1357 fa2c12-fa2c16 1348->1357 1350 fa2b6e-fa2b72 1349->1350 1351 fa2b74 1349->1351 1353 fa2b79-fa2b97 call f350f5 1350->1353 1351->1353 1363 fa2b99-fa2b9e 1353->1363 1364 fa2bc1-fa2bd7 call fa211d call f5dbb3 1353->1364 1356->1304 1359 fa2c18-fa2c7e call fa25d6 call f5d2eb * 2 call fa22ce 1357->1359 1360 fa2c91-fa2ca5 CopyFileW 1357->1360 1361 fa2cb9-fa2ccf DeleteFileW call fa2fd8 1359->1361 1384 fa2c80-fa2c8f DeleteFileW 1359->1384 1360->1361 1362 fa2ca7-fa2cb4 DeleteFileW 1360->1362 1371 fa2cd4 1361->1371 1362->1304 1368 fa2ba1-fa2bb4 call fa28d2 1363->1368 1378 fa2bdc-fa2be7 1364->1378 1379 fa2bb6-fa2bbf 1368->1379 1371->1306 1378->1349 1381 fa2bed 1378->1381 1379->1364 1381->1348 1384->1304
                                                                            APIs
                                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FA2C05
                                                                            • DeleteFileW.KERNEL32(?), ref: 00FA2C87
                                                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00FA2C9D
                                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FA2CAE
                                                                            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FA2CC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: File$Delete$Copy
                                                                            • String ID:
                                                                            • API String ID: 3226157194-0
                                                                            • Opcode ID: 79d19b132104ef20c0c842b5f264db1bd01270d911448f72cf95dd98a1466e69
                                                                            • Instruction ID: fe7839791b44103da15b4b153938eea9cc7893b71495bcd9b1093cebd4b19357
                                                                            • Opcode Fuzzy Hash: 79d19b132104ef20c0c842b5f264db1bd01270d911448f72cf95dd98a1466e69
                                                                            • Instruction Fuzzy Hash: AFB170B2E00119ABDF24DFA8CC85EDEB77DEF49350F0040A6FA09E7151EA349A449F61
                                                                            APIs
                                                                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00F33B0F,SwapMouseButtons,00000004,?), ref: 00F33B40
                                                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00F33B0F,SwapMouseButtons,00000004,?), ref: 00F33B61
                                                                            • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00F33B0F,SwapMouseButtons,00000004,?), ref: 00F33B83
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpenQueryValue
                                                                            • String ID: Control Panel\Mouse
                                                                            • API String ID: 3677997916-824357125
                                                                            • Opcode ID: dbfccbd7bb190fe72e55d26ab593666458a59fcfaa1b1fac2a756e657481d8aa
                                                                            • Instruction ID: 47edc4b4aca99d0688dca13a0d45693a358ac06bd91461119ad2a9b55d091165
                                                                            • Opcode Fuzzy Hash: dbfccbd7bb190fe72e55d26ab593666458a59fcfaa1b1fac2a756e657481d8aa
                                                                            • Instruction Fuzzy Hash: 94112AB5910208FFDB20CFA5DC45EAEBBB8EF44764F104459E805D7110D2319E40A7A0
                                                                            APIs
                                                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 011A0EFD
                                                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 011A0F21
                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 011A0F43
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720483954.000000000119F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119F000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_119f000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                            • String ID:
                                                                            • API String ID: 2438371351-0
                                                                            • Opcode ID: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                                            • Instruction ID: 90ee59ee2bbac0628459af21797da824f9b709429a56807e7d27e5d59b2461cd
                                                                            • Opcode Fuzzy Hash: b6a4c29ec9195df02a43fc4b15474606dfbde67be6cfae9816a363b0bdbc2b3f
                                                                            • Instruction Fuzzy Hash: 7E623D34A14258DBEB28CFA4C850BDEB776EF58300F5091A9D20DEB390E7759E81CB59
                                                                            APIs
                                                                            • TranslateMessage.USER32(?), ref: 00F3DB7B
                                                                            • DispatchMessageW.USER32(?), ref: 00F3DB89
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F3DB9F
                                                                            • TranslateAcceleratorW.USER32(?,?,?), ref: 00F81CC9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Translate$AcceleratorDispatchPeek
                                                                            • String ID:
                                                                            • API String ID: 234387968-0
                                                                            • Opcode ID: fa906bdf31ed56a46539d5c1293e4cc478c670b4cdf0e388b754cd76dc180205
                                                                            • Instruction ID: 237f4a812b2b4c643042d1fbf935e2a7bd16b46ba5d0f46289a524b9b99eb855
                                                                            • Opcode Fuzzy Hash: fa906bdf31ed56a46539d5c1293e4cc478c670b4cdf0e388b754cd76dc180205
                                                                            • Instruction Fuzzy Hash: 8331BC30605385DFE735CB24EC49FEA7BB8BB46320F044259E09987281C779E588EF22
                                                                            APIs
                                                                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00F733A2
                                                                              • Part of subcall function 00F36B57: _wcslen.LIBCMT ref: 00F36B6A
                                                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F33A04
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: IconLoadNotifyShell_String_wcslen
                                                                            • String ID: Line:
                                                                            • API String ID: 2289894680-1585850449
                                                                            • Opcode ID: 2e9f76291a9fb61336a0f492c49c73df4fb5f0ed82018ef2fb83a8d79a122596
                                                                            • Instruction ID: e58e82c0a93e1d15113e30aaebaba8316aac6513067529aec5390da507c601bb
                                                                            • Opcode Fuzzy Hash: 2e9f76291a9fb61336a0f492c49c73df4fb5f0ed82018ef2fb83a8d79a122596
                                                                            • Instruction Fuzzy Hash: 0631A171809304AAD725EB20DC46BEBB7D8AB40734F00852EF5D993195EF789A49E7C2
                                                                            APIs
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00F50668
                                                                              • Part of subcall function 00F532A4: RaiseException.KERNEL32(?,?,?,00F5068A,?,01001444,?,?,?,?,?,?,00F5068A,00F31129,00FF8738,00F31129), ref: 00F53304
                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00F50685
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Exception@8Throw$ExceptionRaise
                                                                            • String ID: Unknown exception
                                                                            • API String ID: 3476068407-410509341
                                                                            • Opcode ID: b460fe843c28f755bc4798e1ba8fa40348233c80bace7a4afc39bf6b3cb8f7a9
                                                                            • Instruction ID: d9fb1766352749563eaaffeda941ace99746cba2c94947fb9640f5312614cc91
                                                                            • Opcode Fuzzy Hash: b460fe843c28f755bc4798e1ba8fa40348233c80bace7a4afc39bf6b3cb8f7a9
                                                                            • Instruction Fuzzy Hash: 07F0FF20D0020D738B00BAA8DC46D9E7B6C5E00361B604430BE18924A2EF75EA6EE991
                                                                            APIs
                                                                            • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00FA302F
                                                                            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00FA3044
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Temp$FileNamePath
                                                                            • String ID: aut
                                                                            • API String ID: 3285503233-3010740371
                                                                            • Opcode ID: 86ab9fcdbfd95065f24c0c177adc42a6765273236df75a6d7e307cc73427dc52
                                                                            • Instruction ID: 5fd49ccb54fad145c54ea93e5c068728c20152ae94c8e4b4b43d6195310f80f3
                                                                            • Opcode Fuzzy Hash: 86ab9fcdbfd95065f24c0c177adc42a6765273236df75a6d7e307cc73427dc52
                                                                            • Instruction Fuzzy Hash: FDD05E7250032C67DA20E7A4AD0EFDB3A6CDB04750F0002A1B659E30A1DAB4D984CAD0
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00FB82F5
                                                                            • TerminateProcess.KERNEL32(00000000), ref: 00FB82FC
                                                                            • FreeLibrary.KERNEL32(?,?,?,?), ref: 00FB84DD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CurrentFreeLibraryTerminate
                                                                            • String ID:
                                                                            • API String ID: 146820519-0
                                                                            • Opcode ID: 8df8b5715f7f948f563830070f9f3be6548b18d9507f4c6e4c54483718cfc9a7
                                                                            • Instruction ID: fda47fd229df533673e1a09d2b1d3f0d4f894a4d689b1909a4a1914361c39181
                                                                            • Opcode Fuzzy Hash: 8df8b5715f7f948f563830070f9f3be6548b18d9507f4c6e4c54483718cfc9a7
                                                                            • Instruction Fuzzy Hash: C3127B71A083419FC724DF29C480B6ABBE5BF84364F04895DE8898B252DB35ED46DF92
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9adace1a0b9394694f473f87bed5373bd9239633ef34c9680b13e4fadabe4eae
                                                                            • Instruction ID: 31b69fca516cdadd8ecdea0183f3308c0a7a753857b0702491009636753e9cb9
                                                                            • Opcode Fuzzy Hash: 9adace1a0b9394694f473f87bed5373bd9239633ef34c9680b13e4fadabe4eae
                                                                            • Instruction Fuzzy Hash: 7251A071D00609AFCB119FB8CD45FAE7BB8EF45B20F140059F805B7292D6799905FB61
                                                                            APIs
                                                                              • Part of subcall function 00F31BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F31BF4
                                                                              • Part of subcall function 00F31BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00F31BFC
                                                                              • Part of subcall function 00F31BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F31C07
                                                                              • Part of subcall function 00F31BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F31C12
                                                                              • Part of subcall function 00F31BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00F31C1A
                                                                              • Part of subcall function 00F31BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00F31C22
                                                                              • Part of subcall function 00F31B4A: RegisterWindowMessageW.USER32(00000004,?,00F312C4), ref: 00F31BA2
                                                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F3136A
                                                                            • OleInitialize.OLE32 ref: 00F31388
                                                                            • CloseHandle.KERNEL32(00000000,00000000), ref: 00F724AB
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                            • String ID:
                                                                            • API String ID: 1986988660-0
                                                                            • Opcode ID: baac4f9006dde5acc8cad47a400064deef46316576e30279fa6a37f4877403e0
                                                                            • Instruction ID: 81a72c640c90879aec6effd2fd86dccd6b513776203e2938ce6acf4b1a36e93c
                                                                            • Opcode Fuzzy Hash: baac4f9006dde5acc8cad47a400064deef46316576e30279fa6a37f4877403e0
                                                                            • Instruction Fuzzy Hash: 5071BDB4905201CFD3A6DF79E9456553AE0BB48352F58822EE0CADB299EB3BC601DF41
                                                                            APIs
                                                                            • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001,?,00000000), ref: 00F3556D
                                                                            • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 00F3557D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FilePointer
                                                                            • String ID:
                                                                            • API String ID: 973152223-0
                                                                            • Opcode ID: 119c19b30e5468d4ea33b9daf8e599be42517396ba219640ae72763c420202a8
                                                                            • Instruction ID: d54f9023560f7a0b0ef18e5c81188eb82a6fbb81561d31a719223b968dcfd20c
                                                                            • Opcode Fuzzy Hash: 119c19b30e5468d4ea33b9daf8e599be42517396ba219640ae72763c420202a8
                                                                            • Instruction Fuzzy Hash: 27315071A00609FFDB14CF28C880B99B7B5FB44724F188629E91997240D771FE94EBD0
                                                                            APIs
                                                                              • Part of subcall function 00F33923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F33A04
                                                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F9C259
                                                                            • KillTimer.USER32(?,00000001,?,?), ref: 00F9C261
                                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F9C270
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_Timer$Kill
                                                                            • String ID:
                                                                            • API String ID: 3500052701-0
                                                                            • Opcode ID: 67660d976181a47bbb4b6814d84d60b334618420d92e5f33747a27ac084b69be
                                                                            • Instruction ID: c3196a8fa1dc1d2094baca33cb9b2cbf763911a9584cd0ecff6c69912aab492d
                                                                            • Opcode Fuzzy Hash: 67660d976181a47bbb4b6814d84d60b334618420d92e5f33747a27ac084b69be
                                                                            • Instruction Fuzzy Hash: BB31B171904384AFFF32CF648855BE6BBEC9F06708F00449AD6DE93241C3745A84DB91
                                                                            APIs
                                                                            • CloseHandle.KERNELBASE(00000000,00000000,?,?,00F685CC,?,00FF8CC8,0000000C), ref: 00F68704
                                                                            • GetLastError.KERNEL32(?,00F685CC,?,00FF8CC8,0000000C), ref: 00F6870E
                                                                            • __dosmaperr.LIBCMT ref: 00F68739
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CloseErrorHandleLast__dosmaperr
                                                                            • String ID:
                                                                            • API String ID: 2583163307-0
                                                                            • Opcode ID: ae6c34b2ab1d96a6af72425d3ae1c45e694899c2026521aa74062b41aac3b9ec
                                                                            • Instruction ID: 8e632763ae69413c292c10be25699593f16ae07c272cf332e6a3810d8ed8946a
                                                                            • Opcode Fuzzy Hash: ae6c34b2ab1d96a6af72425d3ae1c45e694899c2026521aa74062b41aac3b9ec
                                                                            • Instruction Fuzzy Hash: 17012B33E0566016D6356234EC46B7E775A4B81FF4F39031DF9589B1D2DEA68C83B290
                                                                            APIs
                                                                            • LoadResource.KERNEL32(?,00000000,?,?,00F350AA,?,?,00000000,00000000,?,?,?,?,?,?,00F34F20), ref: 00F735BE
                                                                            • SizeofResource.KERNEL32(?,00000000,?,?,00F350AA,?,?,00000000,00000000,?,?,?,?,?,?,00F34F20), ref: 00F735D3
                                                                            • LockResource.KERNEL32(00F350AA,?,?,00F350AA,?,?,00000000,00000000,?,?,?,?,?,?,00F34F20,?), ref: 00F735E6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$LoadLockSizeof
                                                                            • String ID:
                                                                            • API String ID: 2853612939-0
                                                                            • Opcode ID: 7db06acc6dc02b7450b19d6b60458cd3bfbeda835cac4074f3954a52d5f607e6
                                                                            • Instruction ID: 5b0177f29d62c7b95c587d999c6011f1551a51dd64ef31ae2b2e2f23dcf159e2
                                                                            • Opcode Fuzzy Hash: 7db06acc6dc02b7450b19d6b60458cd3bfbeda835cac4074f3954a52d5f607e6
                                                                            • Instruction Fuzzy Hash: 1A0145B0600603AFC7119FA4D808B3B7BB8EFC6321B144599F826D6190CB30E800EA71
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00FA2CD4,?,?,?,00000004,00000001), ref: 00FA2FF2
                                                                            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00FA2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00FA3006
                                                                            • CloseHandle.KERNEL32(00000000,?,00FA2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00FA300D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: File$CloseCreateHandleTime
                                                                            • String ID:
                                                                            • API String ID: 3397143404-0
                                                                            • Opcode ID: eb1d26463da4b061dd5a5dbcfbbcc229d8fb5e79504aea3ed54993c06fa14477
                                                                            • Instruction ID: 6c6b702ec25f6a91ee98b77caf2928e3214791d8b237778fb10c80af99d54cee
                                                                            • Opcode Fuzzy Hash: eb1d26463da4b061dd5a5dbcfbbcc229d8fb5e79504aea3ed54993c06fa14477
                                                                            • Instruction Fuzzy Hash: F2E0863268021477E2311756BD0EF8B3A1CDB86B75F144210F75D760D046A1150162E8
                                                                            APIs
                                                                            • __Init_thread_footer.LIBCMT ref: 00F417F6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Init_thread_footer
                                                                            • String ID: CALL
                                                                            • API String ID: 1385522511-4196123274
                                                                            • Opcode ID: 34554ddd2243b61b6df36d93af6adc97f1f1a2229ce75f0df812c727e9430ca7
                                                                            • Instruction ID: 80d2b4b44797fbb8d0bcedbd3c31efa181f4132a16dd3bf9a4ab7ef42954fc0b
                                                                            • Opcode Fuzzy Hash: 34554ddd2243b61b6df36d93af6adc97f1f1a2229ce75f0df812c727e9430ca7
                                                                            • Instruction Fuzzy Hash: A5229D70A083019FC714DF14C894B6ABBF1BF85314F18891DF89A8B3A1D775E885EB92
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 00FA6F6B
                                                                              • Part of subcall function 00F34ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,01001418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00F34EFD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad_wcslen
                                                                            • String ID: >>>AUTOIT SCRIPT<<<
                                                                            • API String ID: 3312870042-2806939583
                                                                            • Opcode ID: 7be0d25f0a913a379952957f0a908adacab62d78d667d9e3ace1cfa964d0ca81
                                                                            • Instruction ID: 6483c21008278486e5b08001b79536d2afc62e07706e45b82706c54aef3b81ea
                                                                            • Opcode Fuzzy Hash: 7be0d25f0a913a379952957f0a908adacab62d78d667d9e3ace1cfa964d0ca81
                                                                            • Instruction Fuzzy Hash: 39B1A2715083019FCB14EF20CC91DAEB7E5AF95320F04891DF596972A2EB34ED49EB92
                                                                            APIs
                                                                            • GetOpenFileNameW.COMDLG32(?), ref: 00F72C8C
                                                                              • Part of subcall function 00F33AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F33A97,?,?,00F32E7F,?,?,?,00000000), ref: 00F33AC2
                                                                              • Part of subcall function 00F32DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F32DC4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Name$Path$FileFullLongOpen
                                                                            • String ID: X
                                                                            • API String ID: 779396738-3081909835
                                                                            • Opcode ID: 863cb8aaea7b5bf0f6d10b248a8bb5d159ddda94a66d77e3397f2e01e58f8844
                                                                            • Instruction ID: f463f45a483bca0cf551e467205d2ee05d116a16dc0aabe6437f73c1fe522bfb
                                                                            • Opcode Fuzzy Hash: 863cb8aaea7b5bf0f6d10b248a8bb5d159ddda94a66d77e3397f2e01e58f8844
                                                                            • Instruction Fuzzy Hash: F2219671A0025C9BCB41EF94CC45BEE7BF8AF49324F00805AE505E7241DBB855899FA1
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock
                                                                            • String ID: EA06
                                                                            • API String ID: 2638373210-3962188686
                                                                            • Opcode ID: d71f30130c5cd2e076a40f1839d58d6f0fdbf52dc409ca6f9940a87c32cbee8c
                                                                            • Instruction ID: 0ce25b54976abf60125f93f515e3ba98a171b11fbe8ba41e0558240d884f3fe3
                                                                            • Opcode Fuzzy Hash: d71f30130c5cd2e076a40f1839d58d6f0fdbf52dc409ca6f9940a87c32cbee8c
                                                                            • Instruction Fuzzy Hash: 7901F5B2D042187EDF18C7A8CC16EAEBBF89B05301F00455AE652D2181E4B8E7089B60
                                                                            APIs
                                                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F33908
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_
                                                                            • String ID:
                                                                            • API String ID: 1144537725-0
                                                                            • Opcode ID: 94f9ae23708f68211df26f09975abe23c9fc523eddfcd5c97098700491d5b570
                                                                            • Instruction ID: e8bd2233c130f8bd63353a330dd5aad0015a9c5f13a37dc633a250dd8d97b386
                                                                            • Opcode Fuzzy Hash: 94f9ae23708f68211df26f09975abe23c9fc523eddfcd5c97098700491d5b570
                                                                            • Instruction Fuzzy Hash: A331D271904300DFD721DF24D88579BBBE8FB49329F00092EF5D983280E775AA44DB92
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00F3949C,?,00008000), ref: 00F35773
                                                                            • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,00F3949C,?,00008000), ref: 00F74052
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: 6840d34cbed91b6a7a1e1cb360d9f14ed96c68c826708f8b1c78a520a715f364
                                                                            • Instruction ID: cefcaca706d1b3c1c15be1b0168cb16d97e3d6eabb9af5fbce955b5e48eb23b2
                                                                            • Opcode Fuzzy Hash: 6840d34cbed91b6a7a1e1cb360d9f14ed96c68c826708f8b1c78a520a715f364
                                                                            • Instruction Fuzzy Hash: BC018031545229B6E7314A2ACC0EF9B7F98EF42BB0F148201BE9C5A1E0C7B45854EBD0
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000002,?,?,?,?,00F39879,?,?,?), ref: 00F36E33
                                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,?,?,?,00F39879,?,?,?), ref: 00F36E69
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide
                                                                            • String ID:
                                                                            • API String ID: 626452242-0
                                                                            • Opcode ID: ce418a1f0d5734e5d50af2f67a0c776b55c39539fdf6d43760120aef8c9b49bd
                                                                            • Instruction ID: 11174b1b41931399ae217413ae2c71350fcfa386460437d4a07630de4435d162
                                                                            • Opcode Fuzzy Hash: ce418a1f0d5734e5d50af2f67a0c776b55c39539fdf6d43760120aef8c9b49bd
                                                                            • Instruction Fuzzy Hash: 9E01F7713002047FEB186B7ADD0BF7F7AADDB85710F14403DF50ADA1E1E960AC006564
                                                                            APIs
                                                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 011A0EFD
                                                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 011A0F21
                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 011A0F43
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720483954.000000000119F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119F000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_119f000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                            • String ID:
                                                                            • API String ID: 2438371351-0
                                                                            • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                                            • Instruction ID: acf276a37833e8ab60457fef55e44b550baf57c7793e9285ae479067b26f279e
                                                                            • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                                            • Instruction Fuzzy Hash: 6B12DE24E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ProtectVirtual
                                                                            • String ID:
                                                                            • API String ID: 544645111-0
                                                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                            • Instruction ID: 4fc24fbe9be88c790d326802d0bc4626d1e04ff27b7ea0630cd032a832b58ecb
                                                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                            • Instruction Fuzzy Hash: 2D31E275E0010A9BC718CF59D4C0A69FBB1FB49310B6486A5E80ACB656D731EEC5EBC0
                                                                            APIs
                                                                              • Part of subcall function 00F34E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F34EDD,?,01001418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00F34E9C
                                                                              • Part of subcall function 00F34E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F34EAE
                                                                              • Part of subcall function 00F34E90: FreeLibrary.KERNEL32(00000000,?,?,00F34EDD,?,01001418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00F34EC0
                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,01001418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00F34EFD
                                                                              • Part of subcall function 00F34E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F73CDE,?,01001418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00F34E62
                                                                              • Part of subcall function 00F34E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F34E74
                                                                              • Part of subcall function 00F34E59: FreeLibrary.KERNEL32(00000000,?,?,00F73CDE,?,01001418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00F34E87
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Load$AddressFreeProc
                                                                            • String ID:
                                                                            • API String ID: 2632591731-0
                                                                            • Opcode ID: 8185344328ffa1651327d8b951a6e7faec65d0b491ba7b0dcf2e9678d585e6fd
                                                                            • Instruction ID: 68660fb62f2bf9f7d39708997c0d09d5d1ff3b1832b52bb15a7fc5746620a706
                                                                            • Opcode Fuzzy Hash: 8185344328ffa1651327d8b951a6e7faec65d0b491ba7b0dcf2e9678d585e6fd
                                                                            • Instruction Fuzzy Hash: 7A11E732600205AACB14BB74DD12FAD77A59F40B21F14842EF546AB1C1EE78FA45BB50
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: __wsopen_s
                                                                            • String ID:
                                                                            • API String ID: 3347428461-0
                                                                            • Opcode ID: f9bc575c94c84168df9a0bd83cccc896ef699e35affb92aece2257d3fb434347
                                                                            • Instruction ID: 5c0fea0aca42c7e61c827e34b9f0990598741de2daf00f78a963b6f8c5584909
                                                                            • Opcode Fuzzy Hash: f9bc575c94c84168df9a0bd83cccc896ef699e35affb92aece2257d3fb434347
                                                                            • Instruction Fuzzy Hash: A311487190410AAFCB05DF58E940ADA7BF4EF48310F104199F808AB302DA31DA22DBA5
                                                                            APIs
                                                                            • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000,?,?,00000000,?,00F3543F,?,00010000,00000000,00000000,00000000,00000000), ref: 00F39A9C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FileRead
                                                                            • String ID:
                                                                            • API String ID: 2738559852-0
                                                                            • Opcode ID: 0b7ea997a93f81a942a680621b13ae0c18ec5cf972c5a3a4716dbaa11c9511b9
                                                                            • Instruction ID: bad57ab470bde8711a7f9bf587745c2699de1fd6a36a085749a993ac58d42e8c
                                                                            • Opcode Fuzzy Hash: 0b7ea997a93f81a942a680621b13ae0c18ec5cf972c5a3a4716dbaa11c9511b9
                                                                            • Instruction Fuzzy Hash: 20113A312087059FDB20CE05C881B66B7E9AB44764F14C52DE9AB86651C7F4A945EB60
                                                                            APIs
                                                                              • Part of subcall function 00F64C7D: RtlAllocateHeap.NTDLL(00000008,00F31129,00000000,?,00F62E29,00000001,00000364,?,?,?,00F5F2DE,00F63863,01001444,?,00F4FDF5,?), ref: 00F64CBE
                                                                            • _free.LIBCMT ref: 00F6506C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateHeap_free
                                                                            • String ID:
                                                                            • API String ID: 614378929-0
                                                                            • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                            • Instruction ID: 04d33c3adbb5d6006091d65ce312ddcb2a3ab86f8bf3ae03c7dd3bbcc804fca6
                                                                            • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                            • Instruction Fuzzy Hash: 520126726047056BE3218F69DC81A5AFBE8FB89370F25051DE18493280EA30A805D6B4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                            • Instruction ID: 718d14819423378520daf09ab3ee4d0d422975cd17a89ab21a341648368bc2e1
                                                                            • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                            • Instruction Fuzzy Hash: 21F02D32921E149AC7353A69CC05B5A37999F523B3F100715FE21931D1CB78D90AB9A5
                                                                            APIs
                                                                            • RtlAllocateHeap.NTDLL(00000008,00F31129,00000000,?,00F62E29,00000001,00000364,?,?,?,00F5F2DE,00F63863,01001444,?,00F4FDF5,?), ref: 00F64CBE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1279760036-0
                                                                            • Opcode ID: 1e9a81fc45117cf31e5a9ce07e9a4e22a2a0e623ca2af1dda1ec4006fdc17fe8
                                                                            • Instruction ID: b90b32f8c55102fe128cbab768761ead743bfc05cfcab3cedee7cb8e336cab72
                                                                            • Opcode Fuzzy Hash: 1e9a81fc45117cf31e5a9ce07e9a4e22a2a0e623ca2af1dda1ec4006fdc17fe8
                                                                            • Instruction Fuzzy Hash: D2F0B432A0222467DB217F669C09B5A3798AF817B1B144111BD19E7781CA34F801B6E0
                                                                            APIs
                                                                            • RtlAllocateHeap.NTDLL(00000000,?,01001444,?,00F4FDF5,?,?,00F3A976,00000010,01001440,00F313FC,?,00F313C6,?,00F31129), ref: 00F63852
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1279760036-0
                                                                            • Opcode ID: 24842ec7ea6a4e9afa30148df44c0524b4cd87d4be9698ba5e3d336ec35b58aa
                                                                            • Instruction ID: dc6557735bf64e6eb3b4105e41d3d008fa7eb09b7bd8ec4a657f5b3868883ed3
                                                                            • Opcode Fuzzy Hash: 24842ec7ea6a4e9afa30148df44c0524b4cd87d4be9698ba5e3d336ec35b58aa
                                                                            • Instruction Fuzzy Hash: 7FE0653390122456E63126779D05BDA3749AB427B1F190121BD5597581DB25ED01B3E1
                                                                            APIs
                                                                            • FreeLibrary.KERNEL32(?,?,01001418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00F34F6D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary
                                                                            • String ID:
                                                                            • API String ID: 3664257935-0
                                                                            • Opcode ID: 89863dc04121dab2bd7e94b1165e0072164e30ae4dd6ce552e837d414423016a
                                                                            • Instruction ID: 3b33e3b2d7e9857f41b6cdf2e404f08509f960df77ed4508c4183fc80664881e
                                                                            • Opcode Fuzzy Hash: 89863dc04121dab2bd7e94b1165e0072164e30ae4dd6ce552e837d414423016a
                                                                            • Instruction Fuzzy Hash: DDF01C71505751CFDB349F75D490912B7E4AF1433971889AEE1EA83611C731B844EF50
                                                                            APIs
                                                                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F32DC4
                                                                              • Part of subcall function 00F36B57: _wcslen.LIBCMT ref: 00F36B6A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: LongNamePath_wcslen
                                                                            • String ID:
                                                                            • API String ID: 541455249-0
                                                                            • Opcode ID: 1160767055506a78d41c8c47cadf9a53feee97ca3879741c0aa2bdbc8cb5e7f1
                                                                            • Instruction ID: 0bb9ea6d82c86d7bfa876251b671c2465bbcfd7f0818c69e262a37bd64e93781
                                                                            • Opcode Fuzzy Hash: 1160767055506a78d41c8c47cadf9a53feee97ca3879741c0aa2bdbc8cb5e7f1
                                                                            • Instruction Fuzzy Hash: 8CE0CD72A001245BC71092589C06FDA77DDDFC8790F054071FD0DD7248D964AD849691
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock
                                                                            • String ID:
                                                                            • API String ID: 2638373210-0
                                                                            • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                                            • Instruction ID: 3cb17d7fc8be661524d6952a562375e84517281c519b3355382f48c8b5b0af19
                                                                            • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                                            • Instruction Fuzzy Hash: E1E04FB060AB005FDF3D5A2CA9517B677E89F4A311F00086EF69F82352E57268459A4D
                                                                            APIs
                                                                              • Part of subcall function 00F33837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F33908
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00F32B6B
                                                                              • Part of subcall function 00F330F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00F3314E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_$CurrentDirectory
                                                                            • String ID:
                                                                            • API String ID: 2619246295-0
                                                                            • Opcode ID: cf424881186949db127045d469ac93f555dbba7ff88bbc1b431d79e9a526e5b2
                                                                            • Instruction ID: 7cba9fef76d9419a4c8eab5d41ce282b3e859ba8708b8b23bb77ac5f91907e7d
                                                                            • Opcode Fuzzy Hash: cf424881186949db127045d469ac93f555dbba7ff88bbc1b431d79e9a526e5b2
                                                                            • Instruction Fuzzy Hash: 54E0C23270824807CA09FB74AC529BDF7599BD5375F40153EF286831A3CF7D8A49A352
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(00000000,00000000,?,00F70704,?,?,00000000,?,00F70704,00000000,0000000C), ref: 00F703B7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: 7066e603521015cc981bc968a756a9999dd613e4e7d51e9b01758365827cb4c8
                                                                            • Instruction ID: db1040b6e8ae096eb3fe68a5d86efb09314944d89bf253344ea7627a283d06ff
                                                                            • Opcode Fuzzy Hash: 7066e603521015cc981bc968a756a9999dd613e4e7d51e9b01758365827cb4c8
                                                                            • Instruction Fuzzy Hash: EDD06C3204010DBBDF028F85DD06EDA3BAAFB48714F014000FE1856020C732E821AB90
                                                                            APIs
                                                                            • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00F31CBC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: InfoParametersSystem
                                                                            • String ID:
                                                                            • API String ID: 3098949447-0
                                                                            • Opcode ID: 767ddd735556f1ac4fefac3ff07a24db44879abf47c7fa3025a9c78a82407216
                                                                            • Instruction ID: 2c2704f0bd9474643d1bd0323a23434cc4b21109299ad972a0468de871746e72
                                                                            • Opcode Fuzzy Hash: 767ddd735556f1ac4fefac3ff07a24db44879abf47c7fa3025a9c78a82407216
                                                                            • Instruction Fuzzy Hash: D2C09236280308EFF3268B80BD4FF107765A348B01F088401F68EAA5D7C7B76861EB94
                                                                            APIs
                                                                              • Part of subcall function 00F35745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00F3949C,?,00008000), ref: 00F35773
                                                                            • GetLastError.KERNEL32(00000002,00000000), ref: 00FA76DE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CreateErrorFileLast
                                                                            • String ID:
                                                                            • API String ID: 1214770103-0
                                                                            • Opcode ID: a2a00397ab4bfabfea82dd0bc5008df3af95ff9ebf828a426383b5750a3bceb8
                                                                            • Instruction ID: 88a9bed469f426a39fbc461d0053d1f95d18846af73b2d35092315090d56a963
                                                                            • Opcode Fuzzy Hash: a2a00397ab4bfabfea82dd0bc5008df3af95ff9ebf828a426383b5750a3bceb8
                                                                            • Instruction Fuzzy Hash: 268193706087019FCB15EF28C891B6AB7E1BF89360F04451DF8865B3A2DB74ED45EB92
                                                                            APIs
                                                                            • Sleep.KERNELBASE(000001F4), ref: 011A16E1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720483954.000000000119F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119F000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_119f000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Sleep
                                                                            • String ID:
                                                                            • API String ID: 3472027048-0
                                                                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                            • Instruction ID: 3469be9eb7b6d39b24e81f4f0e09c0c485ac26e492deb8291ca75d086c2fa60f
                                                                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                            • Instruction Fuzzy Hash: 94E0E67494010EEFDB00EFB4D54969E7FB4EF04301F500161FD05D2281DB709D508A62
                                                                            APIs
                                                                              • Part of subcall function 00F49BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00F49BB2
                                                                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00FC961A
                                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00FC965B
                                                                            • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00FC969F
                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00FC96C9
                                                                            • SendMessageW.USER32 ref: 00FC96F2
                                                                            • GetKeyState.USER32(00000011), ref: 00FC978B
                                                                            • GetKeyState.USER32(00000009), ref: 00FC9798
                                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00FC97AE
                                                                            • GetKeyState.USER32(00000010), ref: 00FC97B8
                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00FC97E9
                                                                            • SendMessageW.USER32 ref: 00FC9810
                                                                            • SendMessageW.USER32(?,00001030,?,00FC7E95), ref: 00FC9918
                                                                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00FC992E
                                                                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00FC9941
                                                                            • SetCapture.USER32(?), ref: 00FC994A
                                                                            • ClientToScreen.USER32(?,?), ref: 00FC99AF
                                                                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00FC99BC
                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00FC99D6
                                                                            • ReleaseCapture.USER32 ref: 00FC99E1
                                                                            • GetCursorPos.USER32(?), ref: 00FC9A19
                                                                            • ScreenToClient.USER32(?,?), ref: 00FC9A26
                                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00FC9A80
                                                                            • SendMessageW.USER32 ref: 00FC9AAE
                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00FC9AEB
                                                                            • SendMessageW.USER32 ref: 00FC9B1A
                                                                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00FC9B3B
                                                                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00FC9B4A
                                                                            • GetCursorPos.USER32(?), ref: 00FC9B68
                                                                            • ScreenToClient.USER32(?,?), ref: 00FC9B75
                                                                            • GetParent.USER32(?), ref: 00FC9B93
                                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00FC9BFA
                                                                            • SendMessageW.USER32 ref: 00FC9C2B
                                                                            • ClientToScreen.USER32(?,?), ref: 00FC9C84
                                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00FC9CB4
                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00FC9CDE
                                                                            • SendMessageW.USER32 ref: 00FC9D01
                                                                            • ClientToScreen.USER32(?,?), ref: 00FC9D4E
                                                                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00FC9D82
                                                                              • Part of subcall function 00F49944: GetWindowLongW.USER32(?,000000EB), ref: 00F49952
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00FC9E05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                            • String ID: @GUI_DRAGID$F
                                                                            • API String ID: 3429851547-4164748364
                                                                            • Opcode ID: 569893073e6c0fda8e2cafa74a96301abfa8b215389fbe9f03484840085997dc
                                                                            • Instruction ID: 03699eae7e643aabda349c6524a332903ed8f156269aaa4dd5dd64aa9a1c6343
                                                                            • Opcode Fuzzy Hash: 569893073e6c0fda8e2cafa74a96301abfa8b215389fbe9f03484840085997dc
                                                                            • Instruction Fuzzy Hash: 32428D31608206AFD725CF24CE4AFAABBE5FF48320F14061DF599872A1D7B1D950EB91
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00FC48F3
                                                                            • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00FC4908
                                                                            • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00FC4927
                                                                            • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00FC494B
                                                                            • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00FC495C
                                                                            • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00FC497B
                                                                            • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00FC49AE
                                                                            • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00FC49D4
                                                                            • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00FC4A0F
                                                                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00FC4A56
                                                                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00FC4A7E
                                                                            • IsMenu.USER32(?), ref: 00FC4A97
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FC4AF2
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FC4B20
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00FC4B94
                                                                            • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00FC4BE3
                                                                            • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00FC4C82
                                                                            • wsprintfW.USER32 ref: 00FC4CAE
                                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00FC4CC9
                                                                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00FC4CF1
                                                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00FC4D13
                                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00FC4D33
                                                                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00FC4D5A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                            • String ID: %d/%02d/%02d
                                                                            • API String ID: 4054740463-328681919
                                                                            • Opcode ID: 5b5ee2a83ad1ca9a1cc87a8b92c39df7977b3e85bcad0d859634c0f4e7999d2a
                                                                            • Instruction ID: 569443d7e3f5b33a97ad315d7ecbf2645168d6d58de6cf60d25f3de2bf60de2f
                                                                            • Opcode Fuzzy Hash: 5b5ee2a83ad1ca9a1cc87a8b92c39df7977b3e85bcad0d859634c0f4e7999d2a
                                                                            • Instruction Fuzzy Hash: A512257190021AABEB248F24CE5AFAE7BF8EF45720F10411DF51ADB2E1D774A940EB50
                                                                            APIs
                                                                            • GetForegroundWindow.USER32(?,00000000), ref: 00F4F998
                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F8F474
                                                                            • IsIconic.USER32(00000000), ref: 00F8F47D
                                                                            • ShowWindow.USER32(00000000,00000009), ref: 00F8F48A
                                                                            • SetForegroundWindow.USER32(00000000), ref: 00F8F494
                                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F8F4AA
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00F8F4B1
                                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F8F4BD
                                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F8F4CE
                                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F8F4D6
                                                                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 00F8F4DE
                                                                            • SetForegroundWindow.USER32(00000000), ref: 00F8F4E1
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F8F4F6
                                                                            • keybd_event.USER32(00000012,00000000), ref: 00F8F501
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F8F50B
                                                                            • keybd_event.USER32(00000012,00000000), ref: 00F8F510
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F8F519
                                                                            • keybd_event.USER32(00000012,00000000), ref: 00F8F51E
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F8F528
                                                                            • keybd_event.USER32(00000012,00000000), ref: 00F8F52D
                                                                            • SetForegroundWindow.USER32(00000000), ref: 00F8F530
                                                                            • AttachThreadInput.USER32(?,?,00000000), ref: 00F8F557
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 4125248594-2988720461
                                                                            • Opcode ID: 913ed849ed511c916dcac2ccfa4d350b5baa2547c7d3b5e7240978a1439ad566
                                                                            • Instruction ID: 66b94b354b41e1a1a33ae42bf411182ef4e4d23600a58afc0fbb8b98ad124024
                                                                            • Opcode Fuzzy Hash: 913ed849ed511c916dcac2ccfa4d350b5baa2547c7d3b5e7240978a1439ad566
                                                                            • Instruction Fuzzy Hash: B8315071A4021CBEEB206BB55D4AFBF7E6CEB44B50F140426FA09EB1D1C6B15900BBA0
                                                                            APIs
                                                                              • Part of subcall function 00F916C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F9170D
                                                                              • Part of subcall function 00F916C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F9173A
                                                                              • Part of subcall function 00F916C3: GetLastError.KERNEL32 ref: 00F9174A
                                                                            • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00F91286
                                                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00F912A8
                                                                            • CloseHandle.KERNEL32(?), ref: 00F912B9
                                                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00F912D1
                                                                            • GetProcessWindowStation.USER32 ref: 00F912EA
                                                                            • SetProcessWindowStation.USER32(00000000), ref: 00F912F4
                                                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00F91310
                                                                              • Part of subcall function 00F910BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F911FC), ref: 00F910D4
                                                                              • Part of subcall function 00F910BF: CloseHandle.KERNEL32(?,?,00F911FC), ref: 00F910E9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                            • String ID: $default$winsta0
                                                                            • API String ID: 22674027-1027155976
                                                                            • Opcode ID: e644470e008a09e89c0676a6d39edb359b9a27e111a4c6a417b528246a43a9c2
                                                                            • Instruction ID: 534511dd67dbfaed8130fe2ad68ad1bc4081947cfdb4c9fe9fcdc7bfa6173b78
                                                                            • Opcode Fuzzy Hash: e644470e008a09e89c0676a6d39edb359b9a27e111a4c6a417b528246a43a9c2
                                                                            • Instruction Fuzzy Hash: 98819E71D0020AABEF10DFA8DD49FEE7BB9FF09714F044129FA14A61A0C7358954EB60
                                                                            APIs
                                                                              • Part of subcall function 00F910F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F91114
                                                                              • Part of subcall function 00F910F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00F90B9B,?,?,?), ref: 00F91120
                                                                              • Part of subcall function 00F910F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F90B9B,?,?,?), ref: 00F9112F
                                                                              • Part of subcall function 00F910F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F90B9B,?,?,?), ref: 00F91136
                                                                              • Part of subcall function 00F910F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F9114D
                                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F90BCC
                                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F90C00
                                                                            • GetLengthSid.ADVAPI32(?), ref: 00F90C17
                                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 00F90C51
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F90C6D
                                                                            • GetLengthSid.ADVAPI32(?), ref: 00F90C84
                                                                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00F90C8C
                                                                            • HeapAlloc.KERNEL32(00000000), ref: 00F90C93
                                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F90CB4
                                                                            • CopySid.ADVAPI32(00000000), ref: 00F90CBB
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F90CEA
                                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F90D0C
                                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F90D1E
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F90D45
                                                                            • HeapFree.KERNEL32(00000000), ref: 00F90D4C
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F90D55
                                                                            • HeapFree.KERNEL32(00000000), ref: 00F90D5C
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F90D65
                                                                            • HeapFree.KERNEL32(00000000), ref: 00F90D6C
                                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00F90D78
                                                                            • HeapFree.KERNEL32(00000000), ref: 00F90D7F
                                                                              • Part of subcall function 00F91193: GetProcessHeap.KERNEL32(00000008,00F90BB1,?,00000000,?,00F90BB1,?), ref: 00F911A1
                                                                              • Part of subcall function 00F91193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00F90BB1,?), ref: 00F911A8
                                                                              • Part of subcall function 00F91193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00F90BB1,?), ref: 00F911B7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                            • String ID:
                                                                            • API String ID: 4175595110-0
                                                                            • Opcode ID: fdc5efa5f37bb8cbe081b1409070b53ebbfce131e8420d66f424ef408294f2b0
                                                                            • Instruction ID: 2c5628d3e8a78c255399cba5f805be21554b4a02120895d2eb56ef3fe84ed4ca
                                                                            • Opcode Fuzzy Hash: fdc5efa5f37bb8cbe081b1409070b53ebbfce131e8420d66f424ef408294f2b0
                                                                            • Instruction Fuzzy Hash: 96715972D0020AAFEF109FA5DD45FAEBBBCBF04314F044515E918E7291DB75A905EBA0
                                                                            APIs
                                                                            • OpenClipboard.USER32(00FCCC08), ref: 00FAEB29
                                                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 00FAEB37
                                                                            • GetClipboardData.USER32(0000000D), ref: 00FAEB43
                                                                            • CloseClipboard.USER32 ref: 00FAEB4F
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00FAEB87
                                                                            • CloseClipboard.USER32 ref: 00FAEB91
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00FAEBBC
                                                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 00FAEBC9
                                                                            • GetClipboardData.USER32(00000001), ref: 00FAEBD1
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00FAEBE2
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00FAEC22
                                                                            • IsClipboardFormatAvailable.USER32(0000000F), ref: 00FAEC38
                                                                            • GetClipboardData.USER32(0000000F), ref: 00FAEC44
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00FAEC55
                                                                            • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00FAEC77
                                                                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00FAEC94
                                                                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00FAECD2
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00FAECF3
                                                                            • CountClipboardFormats.USER32 ref: 00FAED14
                                                                            • CloseClipboard.USER32 ref: 00FAED59
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                            • String ID:
                                                                            • API String ID: 420908878-0
                                                                            • Opcode ID: 7ad2b238354473658119414eda9b9f1fbcc78891afb35a3d2ef01ef6013c0353
                                                                            • Instruction ID: 401867b89ef2be3a35334e9ce4f8fbcb2032bcdd99ec595356ace42521f577a0
                                                                            • Opcode Fuzzy Hash: 7ad2b238354473658119414eda9b9f1fbcc78891afb35a3d2ef01ef6013c0353
                                                                            • Instruction Fuzzy Hash: 50610175204306AFD300EF20CD89F6AB7A4AF85764F14441DF85A872A2CB71DD06EBA2
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00FA69BE
                                                                            • FindClose.KERNEL32(00000000), ref: 00FA6A12
                                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FA6A4E
                                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FA6A75
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FA6AB2
                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FA6ADF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                            • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                            • API String ID: 3830820486-3289030164
                                                                            • Opcode ID: 108612fb7c021735c0400c8c0b04df359be105cbc1a2cb29f6fbbf66184f9aad
                                                                            • Instruction ID: a4512fbb2d151209966a2b84d20d6ab7dc2a81c7b0999f1288b4cb6ef4112b2d
                                                                            • Opcode Fuzzy Hash: 108612fb7c021735c0400c8c0b04df359be105cbc1a2cb29f6fbbf66184f9aad
                                                                            • Instruction Fuzzy Hash: FFD185B2508304AFC314EBA0CD85EABB7ECAF89714F44491DF589D7151EB78DA04DB62
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00FA9663
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 00FA96A1
                                                                            • SetFileAttributesW.KERNEL32(?,?), ref: 00FA96BB
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00FA96D3
                                                                            • FindClose.KERNEL32(00000000), ref: 00FA96DE
                                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00FA96FA
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FA974A
                                                                            • SetCurrentDirectoryW.KERNEL32(00FF6B7C), ref: 00FA9768
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FA9772
                                                                            • FindClose.KERNEL32(00000000), ref: 00FA977F
                                                                            • FindClose.KERNEL32(00000000), ref: 00FA978F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                            • String ID: *.*
                                                                            • API String ID: 1409584000-438819550
                                                                            • Opcode ID: fddc28b1b18f32b89e12057ec3f86f788145ae9278b4ee576d12a2d21aea8d3a
                                                                            • Instruction ID: 3e724c934f26e5c69ba7210438ba08ebd6a2ff2254e9da7aaadeaf3062dc6fe3
                                                                            • Opcode Fuzzy Hash: fddc28b1b18f32b89e12057ec3f86f788145ae9278b4ee576d12a2d21aea8d3a
                                                                            • Instruction Fuzzy Hash: 7E31E27290420D6ADF10EFB4ED09EEE77AC9F4A320F1040A5FA18E31A0DB74D944AE60
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00FA97BE
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00FA9819
                                                                            • FindClose.KERNEL32(00000000), ref: 00FA9824
                                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00FA9840
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FA9890
                                                                            • SetCurrentDirectoryW.KERNEL32(00FF6B7C), ref: 00FA98AE
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FA98B8
                                                                            • FindClose.KERNEL32(00000000), ref: 00FA98C5
                                                                            • FindClose.KERNEL32(00000000), ref: 00FA98D5
                                                                              • Part of subcall function 00F9DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00F9DB00
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                            • String ID: *.*
                                                                            • API String ID: 2640511053-438819550
                                                                            • Opcode ID: b729705b0e19e12b443814714582942f4bc860658ee7b18565003aafd9071aed
                                                                            • Instruction ID: 683f03b214e84b412490dfbb79b6152c1d8145e5db5689572f755bff1fff1463
                                                                            • Opcode Fuzzy Hash: b729705b0e19e12b443814714582942f4bc860658ee7b18565003aafd9071aed
                                                                            • Instruction Fuzzy Hash: 2F31C37290421D6ADB10EFB4EC49EEE77AC9F47330F5041A5E914E30A0DBB8D945EB60
                                                                            APIs
                                                                              • Part of subcall function 00FBC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FBB6AE,?,?), ref: 00FBC9B5
                                                                              • Part of subcall function 00FBC998: _wcslen.LIBCMT ref: 00FBC9F1
                                                                              • Part of subcall function 00FBC998: _wcslen.LIBCMT ref: 00FBCA68
                                                                              • Part of subcall function 00FBC998: _wcslen.LIBCMT ref: 00FBCA9E
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FBBF3E
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00FBBFA9
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00FBBFCD
                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00FBC02C
                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00FBC0E7
                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00FBC154
                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00FBC1E9
                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00FBC23A
                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00FBC2E3
                                                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00FBC382
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00FBC38F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                            • String ID:
                                                                            • API String ID: 3102970594-0
                                                                            • Opcode ID: f929b00cfc22f4341cb614adc22c8ad176e04bb712e599c7101c391993d6f0b3
                                                                            • Instruction ID: caeb6d2617d56eca89b4920ffa1d8d5e41bc986afe137168bd7eac8f28405e05
                                                                            • Opcode Fuzzy Hash: f929b00cfc22f4341cb614adc22c8ad176e04bb712e599c7101c391993d6f0b3
                                                                            • Instruction Fuzzy Hash: D5025B71604200AFC714DF29C891E6ABBE5AF89318F58849DF84ADB2A2D731EC45DF91
                                                                            APIs
                                                                            • GetLocalTime.KERNEL32(?), ref: 00FA8257
                                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00FA8267
                                                                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00FA8273
                                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FA8310
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FA8324
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FA8356
                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00FA838C
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FA8395
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectoryTime$File$Local$System
                                                                            • String ID: *.*
                                                                            • API String ID: 1464919966-438819550
                                                                            • Opcode ID: 37825269ef1e855fba01f60e208668ee6d289bf34000b041fbaee4c4ec31ebad
                                                                            • Instruction ID: bf71991163eede01e58258ccf49e5ef5aa8fc3107ad5d29bcac5c57266d25b20
                                                                            • Opcode Fuzzy Hash: 37825269ef1e855fba01f60e208668ee6d289bf34000b041fbaee4c4ec31ebad
                                                                            • Instruction Fuzzy Hash: BD618DB25083059FCB10EF60C841AAEB3E8FF89360F04491EF989D7251DB75E946DB92
                                                                            APIs
                                                                              • Part of subcall function 00F33AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F33A97,?,?,00F32E7F,?,?,?,00000000), ref: 00F33AC2
                                                                              • Part of subcall function 00F9E199: GetFileAttributesW.KERNEL32(?,00F9CF95), ref: 00F9E19A
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00F9D122
                                                                            • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00F9D1DD
                                                                            • MoveFileW.KERNEL32(?,?), ref: 00F9D1F0
                                                                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F9D20D
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F9D237
                                                                              • Part of subcall function 00F9D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00F9D21C,?,?), ref: 00F9D2B2
                                                                            • FindClose.KERNEL32(00000000,?,?,?), ref: 00F9D253
                                                                            • FindClose.KERNEL32(00000000), ref: 00F9D264
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                            • String ID: \*.*
                                                                            • API String ID: 1946585618-1173974218
                                                                            • Opcode ID: 93cedabef000a39a38fe3a00d352f22c9982e6571aec1978d63f8750e059673a
                                                                            • Instruction ID: 895fff2caea2a56d673fd1de845b39729cbbdb5c94e15afb2e793249bd0fd341
                                                                            • Opcode Fuzzy Hash: 93cedabef000a39a38fe3a00d352f22c9982e6571aec1978d63f8750e059673a
                                                                            • Instruction Fuzzy Hash: AB617C31C0510DAADF05EBE0CE929EDB7B5AF54320F704065E442B71A1EB78AF09EB60
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                            • String ID:
                                                                            • API String ID: 1737998785-0
                                                                            • Opcode ID: f936661ce0d9d7d87428582a5f07f749d5c323930f3530bacf1f55a2be0a2600
                                                                            • Instruction ID: 6b87a5878e411813d747dbac8365415b5949abe794322030a38a804b69c15d87
                                                                            • Opcode Fuzzy Hash: f936661ce0d9d7d87428582a5f07f749d5c323930f3530bacf1f55a2be0a2600
                                                                            • Instruction Fuzzy Hash: 2941EC75604211AFE320CF25D989F19BBE0EF05329F05C09DE4198B662C735EC42EBD0
                                                                            APIs
                                                                              • Part of subcall function 00F916C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F9170D
                                                                              • Part of subcall function 00F916C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F9173A
                                                                              • Part of subcall function 00F916C3: GetLastError.KERNEL32 ref: 00F9174A
                                                                            • ExitWindowsEx.USER32(?,00000000), ref: 00F9E932
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                            • String ID: $ $@$SeShutdownPrivilege
                                                                            • API String ID: 2234035333-3163812486
                                                                            • Opcode ID: 8b2c127e45420fd496b25820c647ee7f388b6e2327181da1bf35342dbd00b877
                                                                            • Instruction ID: b1410a36289ed5971e17b6e3aee559f1343b4637550da814c13f20a0bf600ccb
                                                                            • Opcode Fuzzy Hash: 8b2c127e45420fd496b25820c647ee7f388b6e2327181da1bf35342dbd00b877
                                                                            • Instruction Fuzzy Hash: 6101D673E10215ABFF64A6B49D86FBB726CAB14760F150821FD03E31D1D9A55C40B1D0
                                                                            APIs
                                                                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00FB1276
                                                                            • WSAGetLastError.WSOCK32 ref: 00FB1283
                                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00FB12BA
                                                                            • WSAGetLastError.WSOCK32 ref: 00FB12C5
                                                                            • closesocket.WSOCK32(00000000), ref: 00FB12F4
                                                                            • listen.WSOCK32(00000000,00000005), ref: 00FB1303
                                                                            • WSAGetLastError.WSOCK32 ref: 00FB130D
                                                                            • closesocket.WSOCK32(00000000), ref: 00FB133C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$closesocket$bindlistensocket
                                                                            • String ID:
                                                                            • API String ID: 540024437-0
                                                                            • Opcode ID: 69b3b0daaa46edfc03d0bbd8a1bf990f09bb794ba62f828967c76ad39a539a54
                                                                            • Instruction ID: 8edb029f9820aa30f8cadd1204946c8129908ad36132d78382e1f93b45b9d465
                                                                            • Opcode Fuzzy Hash: 69b3b0daaa46edfc03d0bbd8a1bf990f09bb794ba62f828967c76ad39a539a54
                                                                            • Instruction Fuzzy Hash: 8641D131A001009FD710DF25C999B6ABBE5BF46328F588088E85A8F2D2C731EC81DFE0
                                                                            APIs
                                                                              • Part of subcall function 00F33AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F33A97,?,?,00F32E7F,?,?,?,00000000), ref: 00F33AC2
                                                                              • Part of subcall function 00F9E199: GetFileAttributesW.KERNEL32(?,00F9CF95), ref: 00F9E19A
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00F9D420
                                                                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F9D470
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F9D481
                                                                            • FindClose.KERNEL32(00000000), ref: 00F9D498
                                                                            • FindClose.KERNEL32(00000000), ref: 00F9D4A1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                            • String ID: \*.*
                                                                            • API String ID: 2649000838-1173974218
                                                                            • Opcode ID: 16e5b4b157de8dd438049e9870f68b1f3f672f519cb3ae38a8c2e48c2a9a8f59
                                                                            • Instruction ID: 4684b7dbbdf799868627d98a0aab3a09d11fa2b9e2a0d0ee3be0098cea873a51
                                                                            • Opcode Fuzzy Hash: 16e5b4b157de8dd438049e9870f68b1f3f672f519cb3ae38a8c2e48c2a9a8f59
                                                                            • Instruction Fuzzy Hash: 5331AE3140C3459BC704EF64DD929AFB7A8AE91324F504A1DF4D5931A1EB34EA09EBA3
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: __floor_pentium4
                                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                            • API String ID: 4168288129-2761157908
                                                                            • Opcode ID: fc7635dacc55c666b1f99923e768132e3c4a565d0d225f4c840f9764bec82cb6
                                                                            • Instruction ID: 6e9f9d183786c1314d3eefc0c32bea864f6d68523aef12fb186d5ec723408137
                                                                            • Opcode Fuzzy Hash: fc7635dacc55c666b1f99923e768132e3c4a565d0d225f4c840f9764bec82cb6
                                                                            • Instruction Fuzzy Hash: 60C25D72E046288FDB25CF28DD407EAB7B5EB45315F1441EAD80EE7241E778AE85AF40
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 00FA64DC
                                                                            • CoInitialize.OLE32(00000000), ref: 00FA6639
                                                                            • CoCreateInstance.OLE32(00FCFCF8,00000000,00000001,00FCFB68,?), ref: 00FA6650
                                                                            • CoUninitialize.OLE32 ref: 00FA68D4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                            • String ID: .lnk
                                                                            • API String ID: 886957087-24824748
                                                                            • Opcode ID: a807a3e25635b64fe1b65b468b9535fb546300655e68038722060574964c9747
                                                                            • Instruction ID: 260c9c6e996505db9fbd9bde3f07dab6cb9d67b1c0d06f697b0399aaa6066e53
                                                                            • Opcode Fuzzy Hash: a807a3e25635b64fe1b65b468b9535fb546300655e68038722060574964c9747
                                                                            • Instruction Fuzzy Hash: A8D149B1508301AFC314EF24C881A6BB7E8FF99714F04496DF595CB2A1EB74E909DB92
                                                                            APIs
                                                                            • GetForegroundWindow.USER32(?,?,00000000), ref: 00FB22E8
                                                                              • Part of subcall function 00FAE4EC: GetWindowRect.USER32(?,?), ref: 00FAE504
                                                                            • GetDesktopWindow.USER32 ref: 00FB2312
                                                                            • GetWindowRect.USER32(00000000), ref: 00FB2319
                                                                            • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00FB2355
                                                                            • GetCursorPos.USER32(?), ref: 00FB2381
                                                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00FB23DF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                            • String ID:
                                                                            • API String ID: 2387181109-0
                                                                            • Opcode ID: 04585feceee80c063956bbdcad973534db269b35056c5f27c130b63949e155bb
                                                                            • Instruction ID: d313c1f98dbfdf9dcb920968b91fd3a18ff19216bc8e56dbaaba6f8340e1f867
                                                                            • Opcode Fuzzy Hash: 04585feceee80c063956bbdcad973534db269b35056c5f27c130b63949e155bb
                                                                            • Instruction Fuzzy Hash: 6531BE72504319ABDB20DF55CC49F9BB7E9FF88310F040919F98997191DB34E909DB92
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                            • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00FA9B78
                                                                            • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00FA9C8B
                                                                              • Part of subcall function 00FA3874: GetInputState.USER32 ref: 00FA38CB
                                                                              • Part of subcall function 00FA3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FA3966
                                                                            • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00FA9BA8
                                                                            • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00FA9C75
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                            • String ID: *.*
                                                                            • API String ID: 1972594611-438819550
                                                                            • Opcode ID: 9dd74fb6eae7ee452db06a2875d77958681f175b8d1732b0ac1d5901921ca754
                                                                            • Instruction ID: 2bf99127ac93f0e4897ea5a521d6af9ba03f46a13c2d1ff7eeb493589ee77eb2
                                                                            • Opcode Fuzzy Hash: 9dd74fb6eae7ee452db06a2875d77958681f175b8d1732b0ac1d5901921ca754
                                                                            • Instruction Fuzzy Hash: 1641B3B1D0860A9FCF14DFA4CD45AEE7BB4EF46320F104065E915A3191DB709E44EF60
                                                                            APIs
                                                                              • Part of subcall function 00F49BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00F49BB2
                                                                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 00F49A4E
                                                                            • GetSysColor.USER32(0000000F), ref: 00F49B23
                                                                            • SetBkColor.GDI32(?,00000000), ref: 00F49B36
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Color$LongProcWindow
                                                                            • String ID:
                                                                            • API String ID: 3131106179-0
                                                                            • Opcode ID: db31dd9fc1accd064f11d40895757f1db21b6ef810f5592c50597c01dbad6590
                                                                            • Instruction ID: 339451f0320c5facff4b5e6b4148a86d8d17b4cee7d2b723625e697445a7cd91
                                                                            • Opcode Fuzzy Hash: db31dd9fc1accd064f11d40895757f1db21b6ef810f5592c50597c01dbad6590
                                                                            • Instruction Fuzzy Hash: 99A1D67170C554AEE725BA288C49FBF3E9DDB82360F240209F902C6595CAADDE41F371
                                                                            APIs
                                                                              • Part of subcall function 00FB304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00FB307A
                                                                              • Part of subcall function 00FB304E: _wcslen.LIBCMT ref: 00FB309B
                                                                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00FB185D
                                                                            • WSAGetLastError.WSOCK32 ref: 00FB1884
                                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00FB18DB
                                                                            • WSAGetLastError.WSOCK32 ref: 00FB18E6
                                                                            • closesocket.WSOCK32(00000000), ref: 00FB1915
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                            • String ID:
                                                                            • API String ID: 1601658205-0
                                                                            • Opcode ID: fcc3d2ae6d6b87370b0ba4f01ea0bc22a9fedf2ee5207b2adc48c8d90dfe25c1
                                                                            • Instruction ID: 24c6fd9b955d982b44c1d9fbaa13e3269262d48b75391c13e7f73230532a0965
                                                                            • Opcode Fuzzy Hash: fcc3d2ae6d6b87370b0ba4f01ea0bc22a9fedf2ee5207b2adc48c8d90dfe25c1
                                                                            • Instruction Fuzzy Hash: F351A375A00200AFDB10EF24C896F6A77E5AB44728F488458FA09AF3D3D775ED419BE1
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                            • String ID:
                                                                            • API String ID: 292994002-0
                                                                            • Opcode ID: 186291802796267f917c9ab62d101c8fc0cbd8d89286f3934bcd4ad89a395543
                                                                            • Instruction ID: 1640b8f4fd94a481fbd33643fd6fc65a1982e3c68eb92eb268071997955093bf
                                                                            • Opcode Fuzzy Hash: 186291802796267f917c9ab62d101c8fc0cbd8d89286f3934bcd4ad89a395543
                                                                            • Instruction Fuzzy Hash: AB219131B402125FD720CF2AC986F667BA5FF86325F19805CE84A8B252C775D852EB90
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                            • API String ID: 0-1546025612
                                                                            • Opcode ID: ee52fa150b0d321bfdb7a40187e847aa1df6fa56cd09dbe25d69c2a65509f32b
                                                                            • Instruction ID: ccb206e368d3a2de535de7a2017c52432a152b50cb44cab20740162e0ee78aa5
                                                                            • Opcode Fuzzy Hash: ee52fa150b0d321bfdb7a40187e847aa1df6fa56cd09dbe25d69c2a65509f32b
                                                                            • Instruction Fuzzy Hash: 2BA29371E0061ACBDF24CF58C8417ADB7B1BF44760F2481AAE819A7385DB749D82EF91
                                                                            APIs
                                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00FBA6AC
                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00FBA6BA
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                            • Process32NextW.KERNEL32(00000000,?), ref: 00FBA79C
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00FBA7AB
                                                                              • Part of subcall function 00F4CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00F73303,?), ref: 00F4CE8A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                            • String ID:
                                                                            • API String ID: 1991900642-0
                                                                            • Opcode ID: 86c7df3beb99b879152f725562ecd00e544d890bb312d4565a3e2269a18fa584
                                                                            • Instruction ID: e952985726c4c6164ac70ecce323637fe16b94d1d9661649b42a205d0cfb413f
                                                                            • Opcode Fuzzy Hash: 86c7df3beb99b879152f725562ecd00e544d890bb312d4565a3e2269a18fa584
                                                                            • Instruction Fuzzy Hash: 55514A71508300AFD710EF25CC86A6BBBE8FF89764F40891DF98997261EB74D904DB92
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00F9AAAC
                                                                            • SetKeyboardState.USER32(00000080), ref: 00F9AAC8
                                                                            • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00F9AB36
                                                                            • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00F9AB88
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: KeyboardState$InputMessagePostSend
                                                                            • String ID:
                                                                            • API String ID: 432972143-0
                                                                            • Opcode ID: f5d18c84b19043642d570f376c1c0d9fa022b954b63eff00ee03375952a034cf
                                                                            • Instruction ID: 84b26512794eea4bbef3bfcd3afc16b8fcbea11d98860e4f2d26e1f7e0b090a1
                                                                            • Opcode Fuzzy Hash: f5d18c84b19043642d570f376c1c0d9fa022b954b63eff00ee03375952a034cf
                                                                            • Instruction Fuzzy Hash: 59312430E40608AFFF358F698C05BFA7BA6AB84324F04421AF185921D1D7798981F7E2
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00F6BB7F
                                                                              • Part of subcall function 00F629C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F6D7D1,00000000,00000000,00000000,00000000,?,00F6D7F8,00000000,00000007,00000000,?,00F6DBF5,00000000), ref: 00F629DE
                                                                              • Part of subcall function 00F629C8: GetLastError.KERNEL32(00000000,?,00F6D7D1,00000000,00000000,00000000,00000000,?,00F6D7F8,00000000,00000007,00000000,?,00F6DBF5,00000000,00000000), ref: 00F629F0
                                                                            • GetTimeZoneInformation.KERNEL32 ref: 00F6BB91
                                                                            • WideCharToMultiByte.KERNEL32(00000000,?,0100121C,000000FF,?,0000003F,?,?), ref: 00F6BC09
                                                                            • WideCharToMultiByte.KERNEL32(00000000,?,01001270,000000FF,?,0000003F,?,?,?,0100121C,000000FF,?,0000003F,?,?), ref: 00F6BC36
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                            • String ID:
                                                                            • API String ID: 806657224-0
                                                                            • Opcode ID: 3a3393a00e8615118f91c5e83397b1771ac243358cd2ee72d5b2f8c92ceaee43
                                                                            • Instruction ID: a760362af1c38ac17ff297b0b86d7cf4ed79384dc4f4143c063475f2ad4df88d
                                                                            • Opcode Fuzzy Hash: 3a3393a00e8615118f91c5e83397b1771ac243358cd2ee72d5b2f8c92ceaee43
                                                                            • Instruction Fuzzy Hash: 743125B1D04205EFCB22DF69CC8193DBBB8FF45360B14426AE090DB2A1C7319E90EB50
                                                                            APIs
                                                                            • InternetReadFile.WININET(?,?,00000400,?), ref: 00FACE89
                                                                            • GetLastError.KERNEL32(?,00000000), ref: 00FACEEA
                                                                            • SetEvent.KERNEL32(?,?,00000000), ref: 00FACEFE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorEventFileInternetLastRead
                                                                            • String ID:
                                                                            • API String ID: 234945975-0
                                                                            • Opcode ID: 9178ad57a408a5ecb3548ab1fa65db3e3bece15722e6f9493a136343ef9fafe0
                                                                            • Instruction ID: b600487fd7936f17155f0743db1ac62cf8d19f33793b144bb68377d82d91f49a
                                                                            • Opcode Fuzzy Hash: 9178ad57a408a5ecb3548ab1fa65db3e3bece15722e6f9493a136343ef9fafe0
                                                                            • Instruction Fuzzy Hash: 43219DB1900305AFEB20DF65C989BA677F8EF41364F10442EE646D2151EB74EE08EBE0
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00F982AA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen
                                                                            • String ID: ($|
                                                                            • API String ID: 1659193697-1631851259
                                                                            • Opcode ID: 7b15840c823dc404f91f911aeb2c9398c87c033900f5900e88bd78b5886b8b55
                                                                            • Instruction ID: 0cdc97bb4d5d29443912151404a34bf28db9f072396bfb275a3c25cc152b1610
                                                                            • Opcode Fuzzy Hash: 7b15840c823dc404f91f911aeb2c9398c87c033900f5900e88bd78b5886b8b55
                                                                            • Instruction Fuzzy Hash: E6324575A007059FDB28CF59C480A6AB7F0FF48760B15C46EE49ADB3A1EB70E942DB40
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00FA5CC1
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00FA5D17
                                                                            • FindClose.KERNEL32(?), ref: 00FA5D5F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstNext
                                                                            • String ID:
                                                                            • API String ID: 3541575487-0
                                                                            • Opcode ID: ed91b32ba8357fc8619851cacd35296df03f164f9a3ec1c01b54cd873e5ec3da
                                                                            • Instruction ID: f02920a7837386bc3212e0bf5300015ba264873835c4f688e01561c97bd87b0b
                                                                            • Opcode Fuzzy Hash: ed91b32ba8357fc8619851cacd35296df03f164f9a3ec1c01b54cd873e5ec3da
                                                                            • Instruction Fuzzy Hash: A6519AB5A046019FC714CF28C894E96B7E4FF4A324F14855DE99A8B3A2CB30ED05DF91
                                                                            APIs
                                                                            • IsDebuggerPresent.KERNEL32 ref: 00F6271A
                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00F62724
                                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 00F62731
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                            • String ID:
                                                                            • API String ID: 3906539128-0
                                                                            • Opcode ID: cdf737d026b92135263f75efab4f4f6bcc9c507a7eb3e68a87698a4ad58b6377
                                                                            • Instruction ID: aa50f0e8ea0ae37ae49c27ff518e97c8f8771975117eb63e6f47ee331c601a5f
                                                                            • Opcode Fuzzy Hash: cdf737d026b92135263f75efab4f4f6bcc9c507a7eb3e68a87698a4ad58b6377
                                                                            • Instruction Fuzzy Hash: A131C474D0121C9BCB61DF64DD89BD8B7B8AF08310F5041EAE80CA7260EB349F859F84
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 00FA51DA
                                                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00FA5238
                                                                            • SetErrorMode.KERNEL32(00000000), ref: 00FA52A1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$DiskFreeSpace
                                                                            • String ID:
                                                                            • API String ID: 1682464887-0
                                                                            • Opcode ID: 6359fc18905a1f505a57147ead1fffdae33d494a7169f398c26ac87118af7034
                                                                            • Instruction ID: 25308d00f9d389e5db33958872251870396adf2caadd8542dde3d59c72c643cc
                                                                            • Opcode Fuzzy Hash: 6359fc18905a1f505a57147ead1fffdae33d494a7169f398c26ac87118af7034
                                                                            • Instruction Fuzzy Hash: E5313A75A00518DFDB00DF55D884EADBBB4FF49318F088099E809AB362DB35E856DBA0
                                                                            APIs
                                                                              • Part of subcall function 00F4FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00F50668
                                                                              • Part of subcall function 00F4FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00F50685
                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F9170D
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F9173A
                                                                            • GetLastError.KERNEL32 ref: 00F9174A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                            • String ID:
                                                                            • API String ID: 577356006-0
                                                                            • Opcode ID: 97821d14503cc32ce119b547540ad195ac43feb3331fcbf774becb41f1472092
                                                                            • Instruction ID: 1d73f5e0a609695443ed52554b5a6938f32c067dc32830fb674ef069f4d237cc
                                                                            • Opcode Fuzzy Hash: 97821d14503cc32ce119b547540ad195ac43feb3331fcbf774becb41f1472092
                                                                            • Instruction Fuzzy Hash: 4011C4B2800309AFE7189F54DC86D6ABBB9FF44714B24852EE45A53241EB70BC419A60
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00F9D608
                                                                            • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00F9D645
                                                                            • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00F9D650
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CloseControlCreateDeviceFileHandle
                                                                            • String ID:
                                                                            • API String ID: 33631002-0
                                                                            • Opcode ID: 1fa91a21925db4634610c38ed7c7f2d9a9150e5d9e9e3b1ef4d52b183993a902
                                                                            • Instruction ID: 82710b4f6cba75c2fae74ca30833235fc0d938af2c221553868c2f7bda83094f
                                                                            • Opcode Fuzzy Hash: 1fa91a21925db4634610c38ed7c7f2d9a9150e5d9e9e3b1ef4d52b183993a902
                                                                            • Instruction Fuzzy Hash: 66115E75E05228BFEB108F95ED45FAFBBBCEB45B60F108115F908E7290D6704A059BE1
                                                                            APIs
                                                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00F9168C
                                                                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00F916A1
                                                                            • FreeSid.ADVAPI32(?), ref: 00F916B1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                            • String ID:
                                                                            • API String ID: 3429775523-0
                                                                            • Opcode ID: 0529607bfb9d72f8595a7e4e500431417560792c2ffd438632801ec39053edff
                                                                            • Instruction ID: 203dfa4fc99da7a89ff49698e5287be191b9e1af6ca1893c29c269716ebed428
                                                                            • Opcode Fuzzy Hash: 0529607bfb9d72f8595a7e4e500431417560792c2ffd438632801ec39053edff
                                                                            • Instruction Fuzzy Hash: 19F0F471D9030DFBEF00DFE49D8AEAEBBBCFB08604F504565E901E2181E774AA449A94
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(00F628E9,?,00F54CBE,00F628E9,00FF88B8,0000000C,00F54E15,00F628E9,00000002,00000000,?,00F628E9), ref: 00F54D09
                                                                            • TerminateProcess.KERNEL32(00000000,?,00F54CBE,00F628E9,00FF88B8,0000000C,00F54E15,00F628E9,00000002,00000000,?,00F628E9), ref: 00F54D10
                                                                            • ExitProcess.KERNEL32 ref: 00F54D22
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CurrentExitTerminate
                                                                            • String ID:
                                                                            • API String ID: 1703294689-0
                                                                            • Opcode ID: 570357bd04352184225b5c1956ea6cc634ad48091d85f4c342d496ede00e59a4
                                                                            • Instruction ID: 8eed791bf6e56a8e43d58c724d6483611a38a1c6b5fa293ec39c1b3ceaf7f569
                                                                            • Opcode Fuzzy Hash: 570357bd04352184225b5c1956ea6cc634ad48091d85f4c342d496ede00e59a4
                                                                            • Instruction Fuzzy Hash: EFE0B631800148ABCF11AF54EE0AE583B79FB41796B144018FD098B122CB3AED86EA90
                                                                            APIs
                                                                            • GetUserNameW.ADVAPI32(?,?), ref: 00F8D28C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: NameUser
                                                                            • String ID: X64
                                                                            • API String ID: 2645101109-893830106
                                                                            • Opcode ID: 3fa63bfafea569ae8f68cd65697c7dec05111c013a0c5c4c7c9d7ecfd28ccd59
                                                                            • Instruction ID: 8affc8792f5aa33faeba8ff73963a464c8ab88c62b45b373dcb90dfedea52fe6
                                                                            • Opcode Fuzzy Hash: 3fa63bfafea569ae8f68cd65697c7dec05111c013a0c5c4c7c9d7ecfd28ccd59
                                                                            • Instruction Fuzzy Hash: 36D0CAB680112DEACB94DBA0EC89EDAB7BCBB04305F100292F50AE2040DB309648AF20
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                            • Instruction ID: 53e11532cc5bffaa92608796a89bfb0d3eefd482cd5f151d3e5ad8e2eeb07810
                                                                            • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                            • Instruction Fuzzy Hash: 92022D71E002199FDF14CFA9C8806ADBBF1EF48325F25816AD91AE7380D731AA45DBD0
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00FA6918
                                                                            • FindClose.KERNEL32(00000000), ref: 00FA6961
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileFirst
                                                                            • String ID:
                                                                            • API String ID: 2295610775-0
                                                                            • Opcode ID: 6e5a2ea2020aa0e1fa7b3ca92c6fd3114713f3c41d38b0dbf2c762599cf29d6f
                                                                            • Instruction ID: b440da97c987798acfe0d4217469125397ef1408ad72631ca1f5205f208f438f
                                                                            • Opcode Fuzzy Hash: 6e5a2ea2020aa0e1fa7b3ca92c6fd3114713f3c41d38b0dbf2c762599cf29d6f
                                                                            • Instruction Fuzzy Hash: 391190756042009FC710DF29D889A16BBE5FF89328F19C699E4698F6A2CB34EC05DBD1
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00FB4891,?,?,00000035,?), ref: 00FA37E4
                                                                            • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00FB4891,?,?,00000035,?), ref: 00FA37F4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFormatLastMessage
                                                                            • String ID:
                                                                            • API String ID: 3479602957-0
                                                                            • Opcode ID: e6fb443bbc6874027ea47ee164e6835f36383902ed750b087bc5e83f9d6b0f50
                                                                            • Instruction ID: 186bd173f8de30a037d8943a0a617b0de1436a2dbe76103e62f59a3658dbee96
                                                                            • Opcode Fuzzy Hash: e6fb443bbc6874027ea47ee164e6835f36383902ed750b087bc5e83f9d6b0f50
                                                                            • Instruction Fuzzy Hash: 2AF0E5B16083292AE72057669C4DFEB3AAEEFC5771F000165F50DD3281D9A09904D6F0
                                                                            APIs
                                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00F9B25D
                                                                            • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00F9B270
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: InputSendkeybd_event
                                                                            • String ID:
                                                                            • API String ID: 3536248340-0
                                                                            • Opcode ID: f70912de191e22726b971de77cc032a313982c01ba9d507813fc5c2cb273f007
                                                                            • Instruction ID: 095445b84ff9a808050496ba57074bbc00f0a1a0cbfd93a5eada5d0fa99c56fa
                                                                            • Opcode Fuzzy Hash: f70912de191e22726b971de77cc032a313982c01ba9d507813fc5c2cb273f007
                                                                            • Instruction Fuzzy Hash: 6FF06D7180424DABEF058FA0C806BAE7BB0FF04305F00800AF955A6191C3798201AF94
                                                                            APIs
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F911FC), ref: 00F910D4
                                                                            • CloseHandle.KERNEL32(?,?,00F911FC), ref: 00F910E9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: AdjustCloseHandlePrivilegesToken
                                                                            • String ID:
                                                                            • API String ID: 81990902-0
                                                                            • Opcode ID: fab778ba468e582eef7dfeb3c54878eadc10911aff95ad5bfa567784fb0db6a0
                                                                            • Instruction ID: 94ef9995e96c1322fdc4169d3f848e2dc2477998fda235c94d9ee14a8570df20
                                                                            • Opcode Fuzzy Hash: fab778ba468e582eef7dfeb3c54878eadc10911aff95ad5bfa567784fb0db6a0
                                                                            • Instruction Fuzzy Hash: 3FE04F32404600AEF7252B11FD06E737BA9FB04320B14882DF8AA814B1DB626C90FB50
                                                                            Strings
                                                                            • Variable is not of type 'Object'., xrefs: 00F80C40
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Variable is not of type 'Object'.
                                                                            • API String ID: 0-1840281001
                                                                            • Opcode ID: 443b4785c68925d4647f3e324aba287fca2cc049b5089f5f7ade8a30ab294587
                                                                            • Instruction ID: 085123a96a1dbe96973f7ed86b3b036869eb82dbd4223379f0519aae45861312
                                                                            • Opcode Fuzzy Hash: 443b4785c68925d4647f3e324aba287fca2cc049b5089f5f7ade8a30ab294587
                                                                            • Instruction Fuzzy Hash: B832BE35D00218DBCF14EF94C885BEDB7B5BF05324F548059E806BB292DB79AD49EBA0
                                                                            APIs
                                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00F66766,?,?,00000008,?,?,00F6FEFE,00000000), ref: 00F66998
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionRaise
                                                                            • String ID:
                                                                            • API String ID: 3997070919-0
                                                                            • Opcode ID: 59df2218c0b081d387816f73ea2a629e1059bff8c75c314c7d54a755f44f353c
                                                                            • Instruction ID: 00b12ad79de2b50be961b6d601fee8a84e142033f36bbb95643e2300e9ddfcd6
                                                                            • Opcode Fuzzy Hash: 59df2218c0b081d387816f73ea2a629e1059bff8c75c314c7d54a755f44f353c
                                                                            • Instruction Fuzzy Hash: 14B12B32A10609DFD719CF28C48AB657BE0FF45364F298658E899CF2A2C735E991DB40
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID: 0-3916222277
                                                                            • Opcode ID: 270566680d017628e8b518a002b3efb9227ba676a96b725a6ba5dfd5d088e012
                                                                            • Instruction ID: fb80c71abb233f13bcbf9e7b15aaaec826656c41d927b7e4368a4d5a816650f7
                                                                            • Opcode Fuzzy Hash: 270566680d017628e8b518a002b3efb9227ba676a96b725a6ba5dfd5d088e012
                                                                            • Instruction Fuzzy Hash: B8126071D002299BDB14DF58C8817EEBBB5FF48710F54819AE849EB252DB349E81EB90
                                                                            APIs
                                                                            • BlockInput.USER32(00000001), ref: 00FAEABD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: BlockInput
                                                                            • String ID:
                                                                            • API String ID: 3456056419-0
                                                                            • Opcode ID: fef0bc0a11e18e4d4922d2d1ba156fe79f57e3f94747abed20775f4fcd4e0406
                                                                            • Instruction ID: a11397f7d31d0ebb43f08428c9c3635026f12abedef3f44a0f0e21c70bb6e7b2
                                                                            • Opcode Fuzzy Hash: fef0bc0a11e18e4d4922d2d1ba156fe79f57e3f94747abed20775f4fcd4e0406
                                                                            • Instruction Fuzzy Hash: 59E04F762002049FC710EF69D805E9AF7E9AF99770F00841AFD49DB351DB74EC40ABA0
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00F503EE), ref: 00F509DA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled
                                                                            • String ID:
                                                                            • API String ID: 3192549508-0
                                                                            • Opcode ID: 5157a7beacb02eb715061046f38e2089e4fe336aa7a375b2a62594e3bcb19a7e
                                                                            • Instruction ID: fada75bd749f0a14cee2ba4346b6865cfc1e244b74d9559c94e70a1662f1b379
                                                                            • Opcode Fuzzy Hash: 5157a7beacb02eb715061046f38e2089e4fe336aa7a375b2a62594e3bcb19a7e
                                                                            • Instruction Fuzzy Hash:
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0
                                                                            • API String ID: 0-4108050209
                                                                            • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                            • Instruction ID: 7ca8006ddbb72bebf824a7218cef32f4ebfdd5efc998caa8230a32d7101dde20
                                                                            • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                            • Instruction Fuzzy Hash: 68516A72E0CB055BDB387528A85D7BF63859B12363F280509DF82D7692C619DE0EF361
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4b7a73798764c0114fbf470992fa2e2ad1ec736c6baf2f5ad112361ec32afb16
                                                                            • Instruction ID: 9ce41943db2bb6b3d906f9ecbe0288824c9628d047b7a2ade852174bd5917f8d
                                                                            • Opcode Fuzzy Hash: 4b7a73798764c0114fbf470992fa2e2ad1ec736c6baf2f5ad112361ec32afb16
                                                                            • Instruction Fuzzy Hash: 88324622D2AF414DD723A634CC22335634AAFB73D9F14C737F81AB59A5EB29C4836140
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4c02b9e24f49f6ad4655dc17f9fad17ea7c3f4830a75a66fb7b8cf8e57729b02
                                                                            • Instruction ID: 753009225e8c38a4174f339edfc0fc9569c3eb96040b52d9fb67618baa161ac5
                                                                            • Opcode Fuzzy Hash: 4c02b9e24f49f6ad4655dc17f9fad17ea7c3f4830a75a66fb7b8cf8e57729b02
                                                                            • Instruction Fuzzy Hash: 7D320832E001558BDF28EF29C4D46FD7BA1EF45320F28856ADA599B291D234DD81FBE0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1188b48095a723a4ed2169ec1c5da22aa675c6d2bd8c149badacdce2e43ff127
                                                                            • Instruction ID: e6a708b933df47b1ada736e8f6e7ce9b65109f61f0685da2893a61080ac4c913
                                                                            • Opcode Fuzzy Hash: 1188b48095a723a4ed2169ec1c5da22aa675c6d2bd8c149badacdce2e43ff127
                                                                            • Instruction Fuzzy Hash: CF22E2B0E0460ADFDF14DF64C841BAEB7B5FF44320F208129E816A7291EB79AD14EB51
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9795e63b79a3a17afa1c42f1189462337f0752d276f2f14b44d987f062c983ea
                                                                            • Instruction ID: 5feda049f2ab20929efd7eed60457e27b45a77e5447ca5741f2b497885658801
                                                                            • Opcode Fuzzy Hash: 9795e63b79a3a17afa1c42f1189462337f0752d276f2f14b44d987f062c983ea
                                                                            • Instruction Fuzzy Hash: E302C9B1E00109EBDF05DF54D841AAEBBB5FF48310F10816AE81A9B291EB75ED14EB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 183b1a66db54233ae572f645c5f14f8257c2ede333676d8de1ca35153c6a171a
                                                                            • Instruction ID: c8d02267ac7aa0af9556d7be5a6ae5c0a6aa267f864302ac815fdca454af1fee
                                                                            • Opcode Fuzzy Hash: 183b1a66db54233ae572f645c5f14f8257c2ede333676d8de1ca35153c6a171a
                                                                            • Instruction Fuzzy Hash: 25B11120E2AF444DD32396398931336B75DAFBB2D5F92D31BFC2674D22EB2286835141
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                            • Instruction ID: 8cab826f732e3b511f41c46b7e0c8a15c8c6172b9a10cb92c4d75a7c111c9462
                                                                            • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                            • Instruction Fuzzy Hash: A29177339080A34ADB294639853567EFFF16A523B371A079DDDF2CA1C1EE10A95CF620
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                            • Instruction ID: 9a22468c55fccbea025610127bad335e4c079c62c04e1f49bf4afe5371d5a7ea
                                                                            • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                            • Instruction Fuzzy Hash: 759177736090A349DB2E427A857427DFFE16A923B331A079DD9F2CA1C1FD14A55CF620
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fb0caf91f67bcedb3ed14278e37c6a83261d41d4c8386aaa09e8710d298fe3e2
                                                                            • Instruction ID: a1a9275cb07d36afcc7641ca0b947f7ffcdc2762c2cbdbc294570726c008b332
                                                                            • Opcode Fuzzy Hash: fb0caf91f67bcedb3ed14278e37c6a83261d41d4c8386aaa09e8710d298fe3e2
                                                                            • Instruction Fuzzy Hash: 45617831A0870966DA34B928BC99BBE3384DF81363F140919EF43DB295DA199E4FB315
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: dbbaa452d3aaa45e5720b6d1cc5760d33cddaecc180d5e0053b8748e02df844c
                                                                            • Instruction ID: f5d9c42dea02fc2af633262cefb09e8eb07d5e54e33c8bb89093d969778b7b00
                                                                            • Opcode Fuzzy Hash: dbbaa452d3aaa45e5720b6d1cc5760d33cddaecc180d5e0053b8748e02df844c
                                                                            • Instruction Fuzzy Hash: 88619B31E0870957DA3879287C56BBF33A89F41763F100959EF43DB281EA16AD4FB251
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                            • Instruction ID: 52ced95e8dffbc645951d4de2489d1e0430ec2f7b9a9ebba00e7f7988bb47f9d
                                                                            • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                            • Instruction Fuzzy Hash: D48156739090A309DB69423D853467EFFE17A923B371A079DD9F2CA1C1EE14A55CF620
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4d0f79772ac88e6f2a3c1afb829d6d1061d357a38b5b19be355ecb2ba845e236
                                                                            • Instruction ID: 96f9727f363dc6c91deba2dc8c13041258782de077c4565a6ccaca3bdb7c763c
                                                                            • Opcode Fuzzy Hash: 4d0f79772ac88e6f2a3c1afb829d6d1061d357a38b5b19be355ecb2ba845e236
                                                                            • Instruction Fuzzy Hash: 6621B7727206118BD728CF79C92367E73E5AB54320F15862EE4A7C37C5DE7AA904DB80
                                                                            APIs
                                                                            • DeleteObject.GDI32(00000000), ref: 00FB2B30
                                                                            • DeleteObject.GDI32(00000000), ref: 00FB2B43
                                                                            • DestroyWindow.USER32 ref: 00FB2B52
                                                                            • GetDesktopWindow.USER32 ref: 00FB2B6D
                                                                            • GetWindowRect.USER32(00000000), ref: 00FB2B74
                                                                            • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00FB2CA3
                                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00FB2CB1
                                                                            • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FB2CF8
                                                                            • GetClientRect.USER32(00000000,?), ref: 00FB2D04
                                                                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00FB2D40
                                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FB2D62
                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FB2D75
                                                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FB2D80
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00FB2D89
                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FB2D98
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00FB2DA1
                                                                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FB2DA8
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00FB2DB3
                                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FB2DC5
                                                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00FCFC38,00000000), ref: 00FB2DDB
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00FB2DEB
                                                                            • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00FB2E11
                                                                            • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00FB2E30
                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FB2E52
                                                                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FB303F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                            • String ID: $AutoIt v3$DISPLAY$static
                                                                            • API String ID: 2211948467-2373415609
                                                                            • Opcode ID: 10556a92cca5b9ff756b9c5180eb3d51d234f9f5011ae7c713ead71d3e318f4d
                                                                            • Instruction ID: e1cdc61f8c6ca3d39b99cba0674b06e384a9396d30d75ffe4e17439e92ca3be4
                                                                            • Opcode Fuzzy Hash: 10556a92cca5b9ff756b9c5180eb3d51d234f9f5011ae7c713ead71d3e318f4d
                                                                            • Instruction Fuzzy Hash: A2025071900209AFDB14DF65CD89EAE7BB9EF48720F048558F919AB2A1CB74DD01EF60
                                                                            APIs
                                                                            • SetTextColor.GDI32(?,00000000), ref: 00FC712F
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00FC7160
                                                                            • GetSysColor.USER32(0000000F), ref: 00FC716C
                                                                            • SetBkColor.GDI32(?,000000FF), ref: 00FC7186
                                                                            • SelectObject.GDI32(?,?), ref: 00FC7195
                                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 00FC71C0
                                                                            • GetSysColor.USER32(00000010), ref: 00FC71C8
                                                                            • CreateSolidBrush.GDI32(00000000), ref: 00FC71CF
                                                                            • FrameRect.USER32(?,?,00000000), ref: 00FC71DE
                                                                            • DeleteObject.GDI32(00000000), ref: 00FC71E5
                                                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 00FC7230
                                                                            • FillRect.USER32(?,?,?), ref: 00FC7262
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00FC7284
                                                                              • Part of subcall function 00FC73E8: GetSysColor.USER32(00000012), ref: 00FC7421
                                                                              • Part of subcall function 00FC73E8: SetTextColor.GDI32(?,?), ref: 00FC7425
                                                                              • Part of subcall function 00FC73E8: GetSysColorBrush.USER32(0000000F), ref: 00FC743B
                                                                              • Part of subcall function 00FC73E8: GetSysColor.USER32(0000000F), ref: 00FC7446
                                                                              • Part of subcall function 00FC73E8: GetSysColor.USER32(00000011), ref: 00FC7463
                                                                              • Part of subcall function 00FC73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00FC7471
                                                                              • Part of subcall function 00FC73E8: SelectObject.GDI32(?,00000000), ref: 00FC7482
                                                                              • Part of subcall function 00FC73E8: SetBkColor.GDI32(?,00000000), ref: 00FC748B
                                                                              • Part of subcall function 00FC73E8: SelectObject.GDI32(?,?), ref: 00FC7498
                                                                              • Part of subcall function 00FC73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00FC74B7
                                                                              • Part of subcall function 00FC73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00FC74CE
                                                                              • Part of subcall function 00FC73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00FC74DB
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                            • String ID:
                                                                            • API String ID: 4124339563-0
                                                                            • Opcode ID: f34165a8d8f1675bb216d87a527b27ab569a3855bf8c20153b2f1c670bd8f119
                                                                            • Instruction ID: e55dcfcc280f93c5d21d12e0eeacc1eedb1c538e374d915b2179c4cbf6ad0353
                                                                            • Opcode Fuzzy Hash: f34165a8d8f1675bb216d87a527b27ab569a3855bf8c20153b2f1c670bd8f119
                                                                            • Instruction Fuzzy Hash: ACA1AE72408306AFD700AF60DE4AF5B7BA9FB89320F140A19F966971E1D731E944EF91
                                                                            APIs
                                                                            • DestroyWindow.USER32(?,?), ref: 00F48E14
                                                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 00F86AC5
                                                                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00F86AFE
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00F86F43
                                                                              • Part of subcall function 00F48F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F48BE8,?,00000000,?,?,?,?,00F48BBA,00000000,?), ref: 00F48FC5
                                                                            • SendMessageW.USER32(?,00001053), ref: 00F86F7F
                                                                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00F86F96
                                                                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 00F86FAC
                                                                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 00F86FB7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                            • String ID: 0
                                                                            • API String ID: 2760611726-4108050209
                                                                            • Opcode ID: b6a49ede93b3c7fe607014f88b787c4917c13d1245d6b083e9ae1158801c304d
                                                                            • Instruction ID: feb7b183bce0b994a37ca0324ea98b18cc397280fc53e756ba12c4c4774e179e
                                                                            • Opcode Fuzzy Hash: b6a49ede93b3c7fe607014f88b787c4917c13d1245d6b083e9ae1158801c304d
                                                                            • Instruction Fuzzy Hash: 4912AD31A00201EFDB25EF14C945BEABBE5FB45320F144469F999CB251CB36EC92EB91
                                                                            APIs
                                                                            • DestroyWindow.USER32(00000000), ref: 00FB273E
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00FB286A
                                                                            • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00FB28A9
                                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00FB28B9
                                                                            • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00FB2900
                                                                            • GetClientRect.USER32(00000000,?), ref: 00FB290C
                                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00FB2955
                                                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00FB2964
                                                                            • GetStockObject.GDI32(00000011), ref: 00FB2974
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00FB2978
                                                                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00FB2988
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FB2991
                                                                            • DeleteDC.GDI32(00000000), ref: 00FB299A
                                                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00FB29C6
                                                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 00FB29DD
                                                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00FB2A1D
                                                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00FB2A31
                                                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 00FB2A42
                                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00FB2A77
                                                                            • GetStockObject.GDI32(00000011), ref: 00FB2A82
                                                                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00FB2A8D
                                                                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00FB2A97
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                            • API String ID: 2910397461-517079104
                                                                            • Opcode ID: a19e29bf816f70cb41ff88a3ea916a11489904107cca888bc437343128d78804
                                                                            • Instruction ID: e1c11f037eb9c8d5df01b31244f52ecb49b458781bd7aaed6b9c39d3f5754524
                                                                            • Opcode Fuzzy Hash: a19e29bf816f70cb41ff88a3ea916a11489904107cca888bc437343128d78804
                                                                            • Instruction Fuzzy Hash: 21B16FB1A00209AFEB24DF69CD4AFAE7BA9EB48710F148115F914E72D0DB74ED40DB94
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 00FA4AED
                                                                            • GetDriveTypeW.KERNEL32(?,00FCCB68,?,\\.\,00FCCC08), ref: 00FA4BCA
                                                                            • SetErrorMode.KERNEL32(00000000,00FCCB68,?,\\.\,00FCCC08), ref: 00FA4D36
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$DriveType
                                                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                            • API String ID: 2907320926-4222207086
                                                                            • Opcode ID: ec71fc57c768452d7dbef71e11587e7680cdf96e33d4e9b3882fed144ccbd1c0
                                                                            • Instruction ID: cb75527d09e51b625944fd92ccccae06e69da24c196a3c73379e7f64bd76f09f
                                                                            • Opcode Fuzzy Hash: ec71fc57c768452d7dbef71e11587e7680cdf96e33d4e9b3882fed144ccbd1c0
                                                                            • Instruction Fuzzy Hash: 8B61A7B160520A9BCB04DF14CA81A7C77B0AF86760B244415F90AEB6A1DFF5FD41FB52
                                                                            APIs
                                                                            • GetSysColor.USER32(00000012), ref: 00FC7421
                                                                            • SetTextColor.GDI32(?,?), ref: 00FC7425
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00FC743B
                                                                            • GetSysColor.USER32(0000000F), ref: 00FC7446
                                                                            • CreateSolidBrush.GDI32(?), ref: 00FC744B
                                                                            • GetSysColor.USER32(00000011), ref: 00FC7463
                                                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00FC7471
                                                                            • SelectObject.GDI32(?,00000000), ref: 00FC7482
                                                                            • SetBkColor.GDI32(?,00000000), ref: 00FC748B
                                                                            • SelectObject.GDI32(?,?), ref: 00FC7498
                                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 00FC74B7
                                                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00FC74CE
                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00FC74DB
                                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00FC752A
                                                                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00FC7554
                                                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 00FC7572
                                                                            • DrawFocusRect.USER32(?,?), ref: 00FC757D
                                                                            • GetSysColor.USER32(00000011), ref: 00FC758E
                                                                            • SetTextColor.GDI32(?,00000000), ref: 00FC7596
                                                                            • DrawTextW.USER32(?,00FC70F5,000000FF,?,00000000), ref: 00FC75A8
                                                                            • SelectObject.GDI32(?,?), ref: 00FC75BF
                                                                            • DeleteObject.GDI32(?), ref: 00FC75CA
                                                                            • SelectObject.GDI32(?,?), ref: 00FC75D0
                                                                            • DeleteObject.GDI32(?), ref: 00FC75D5
                                                                            • SetTextColor.GDI32(?,?), ref: 00FC75DB
                                                                            • SetBkColor.GDI32(?,?), ref: 00FC75E5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                            • String ID:
                                                                            • API String ID: 1996641542-0
                                                                            • Opcode ID: 7fb9c02e331808835c349958a91fca3a7893dc4e895b92574bcda791b6d85e65
                                                                            • Instruction ID: e908876455d3fc1e72ba01ed9b9b6e6050f07d05821e18987fedec8a2a1730a6
                                                                            • Opcode Fuzzy Hash: 7fb9c02e331808835c349958a91fca3a7893dc4e895b92574bcda791b6d85e65
                                                                            • Instruction Fuzzy Hash: AC617D72D00219AFDF009FA4DD4AEEEBFB9EB08320F144515F919AB2A1D7719940EF90
                                                                            APIs
                                                                            • GetCursorPos.USER32(?), ref: 00FC1128
                                                                            • GetDesktopWindow.USER32 ref: 00FC113D
                                                                            • GetWindowRect.USER32(00000000), ref: 00FC1144
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00FC1199
                                                                            • DestroyWindow.USER32(?), ref: 00FC11B9
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00FC11ED
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FC120B
                                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00FC121D
                                                                            • SendMessageW.USER32(00000000,00000421,?,?), ref: 00FC1232
                                                                            • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00FC1245
                                                                            • IsWindowVisible.USER32(00000000), ref: 00FC12A1
                                                                            • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00FC12BC
                                                                            • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00FC12D0
                                                                            • GetWindowRect.USER32(00000000,?), ref: 00FC12E8
                                                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 00FC130E
                                                                            • GetMonitorInfoW.USER32(00000000,?), ref: 00FC1328
                                                                            • CopyRect.USER32(?,?), ref: 00FC133F
                                                                            • SendMessageW.USER32(00000000,00000412,00000000), ref: 00FC13AA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                            • String ID: ($0$tooltips_class32
                                                                            • API String ID: 698492251-4156429822
                                                                            • Opcode ID: a4f9cdc81bda229b62aa4df36acd3fa0a26d646c16bde4ecd2eba6672ba65050
                                                                            • Instruction ID: 8d3d0e814b6086cbe759c3f6f430da6540a252a9311d5c9846af09a7c2a4031d
                                                                            • Opcode Fuzzy Hash: a4f9cdc81bda229b62aa4df36acd3fa0a26d646c16bde4ecd2eba6672ba65050
                                                                            • Instruction Fuzzy Hash: C6B1AE71A08341AFD700DF64CA86F6ABBE4FF85314F00891CF9999B262C771E854EB91
                                                                            APIs
                                                                              • Part of subcall function 00F910F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F91114
                                                                              • Part of subcall function 00F910F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00F90B9B,?,?,?), ref: 00F91120
                                                                              • Part of subcall function 00F910F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F90B9B,?,?,?), ref: 00F9112F
                                                                              • Part of subcall function 00F910F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F90B9B,?,?,?), ref: 00F91136
                                                                              • Part of subcall function 00F910F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F9114D
                                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F90DF5
                                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F90E29
                                                                            • GetLengthSid.ADVAPI32(?), ref: 00F90E40
                                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 00F90E7A
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F90E96
                                                                            • GetLengthSid.ADVAPI32(?), ref: 00F90EAD
                                                                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00F90EB5
                                                                            • HeapAlloc.KERNEL32(00000000), ref: 00F90EBC
                                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F90EDD
                                                                            • CopySid.ADVAPI32(00000000), ref: 00F90EE4
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F90F13
                                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F90F35
                                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F90F47
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F90F6E
                                                                            • HeapFree.KERNEL32(00000000), ref: 00F90F75
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F90F7E
                                                                            • HeapFree.KERNEL32(00000000), ref: 00F90F85
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F90F8E
                                                                            • HeapFree.KERNEL32(00000000), ref: 00F90F95
                                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00F90FA1
                                                                            • HeapFree.KERNEL32(00000000), ref: 00F90FA8
                                                                              • Part of subcall function 00F91193: GetProcessHeap.KERNEL32(00000008,00F90BB1,?,00000000,?,00F90BB1,?), ref: 00F911A1
                                                                              • Part of subcall function 00F91193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00F90BB1,?), ref: 00F911A8
                                                                              • Part of subcall function 00F91193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00F90BB1,?), ref: 00F911B7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                            • String ID:
                                                                            • API String ID: 4175595110-0
                                                                            • Opcode ID: 9eb9af8f8a8ade3411cb128ef6c4ce60af3fd81f638c43bb7b7f3c399ce58ce7
                                                                            • Instruction ID: a3fc36f41eb12a3c7a06c85312fe3eab98b7e6b9081018f0dc024f2268bb5177
                                                                            • Opcode Fuzzy Hash: 9eb9af8f8a8ade3411cb128ef6c4ce60af3fd81f638c43bb7b7f3c399ce58ce7
                                                                            • Instruction Fuzzy Hash: 6D714B7290020AAFEF209FA5DD45FAEBBB8FF04314F044125F919E7191DB319A05EBA0
                                                                            APIs
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FBC4BD
                                                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,00FCCC08,00000000,?,00000000,?,?), ref: 00FBC544
                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00FBC5A4
                                                                            • _wcslen.LIBCMT ref: 00FBC5F4
                                                                            • _wcslen.LIBCMT ref: 00FBC66F
                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00FBC6B2
                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00FBC7C1
                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00FBC84D
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00FBC881
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00FBC88E
                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00FBC960
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                            • API String ID: 9721498-966354055
                                                                            • Opcode ID: 96eedef4973d4ae16283020d223522a62980cf3dff60448b9e4eb3d6c09719a9
                                                                            • Instruction ID: cbaabcb3d7b0f250eef16801d0df621c554b431f794cc139e4fc665506da5669
                                                                            • Opcode Fuzzy Hash: 96eedef4973d4ae16283020d223522a62980cf3dff60448b9e4eb3d6c09719a9
                                                                            • Instruction Fuzzy Hash: FD126B756042019FDB14DF15C881A6AB7E5EF88724F18885CF88A9B3A2DB35FD41EF81
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?), ref: 00FC09C6
                                                                            • _wcslen.LIBCMT ref: 00FC0A01
                                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00FC0A54
                                                                            • _wcslen.LIBCMT ref: 00FC0A8A
                                                                            • _wcslen.LIBCMT ref: 00FC0B06
                                                                            • _wcslen.LIBCMT ref: 00FC0B81
                                                                              • Part of subcall function 00F4F9F2: _wcslen.LIBCMT ref: 00F4F9FD
                                                                              • Part of subcall function 00F92BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F92BFA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                            • API String ID: 1103490817-4258414348
                                                                            • Opcode ID: b507728c92a0df4dec8a9752b92f6054985f83a105e5eb2f11d4e3963b9509a6
                                                                            • Instruction ID: d6c15008b1e6e7a526085bd417a93c92bfcce61d72bb9921094873e5e486ca1a
                                                                            • Opcode Fuzzy Hash: b507728c92a0df4dec8a9752b92f6054985f83a105e5eb2f11d4e3963b9509a6
                                                                            • Instruction Fuzzy Hash: 2FE18E36608302DFCB14EF24C951A2AB7E1BF94324F14495CF89697362DB35ED46EB81
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$BuffCharUpper
                                                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                            • API String ID: 1256254125-909552448
                                                                            • Opcode ID: 3e560894d8cf7475ee522e759cb1c04aceef3457eace07187ae319e30fe60b87
                                                                            • Instruction ID: 9cb8c3907a784f9755f8d602f05838abea83baee2ba9340d4f213dfc1b599ed6
                                                                            • Opcode Fuzzy Hash: 3e560894d8cf7475ee522e759cb1c04aceef3457eace07187ae319e30fe60b87
                                                                            • Instruction Fuzzy Hash: 85710533A0016A8BCB20EE2ACC516FF37959FA0774B214128FC559B295E638CD44BBE0
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 00FC835A
                                                                            • _wcslen.LIBCMT ref: 00FC836E
                                                                            • _wcslen.LIBCMT ref: 00FC8391
                                                                            • _wcslen.LIBCMT ref: 00FC83B4
                                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00FC83F2
                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000032), ref: 00FC844E
                                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00FC8487
                                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00FC84CA
                                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00FC8501
                                                                            • FreeLibrary.KERNEL32(?), ref: 00FC850D
                                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00FC851D
                                                                            • DestroyIcon.USER32(?), ref: 00FC852C
                                                                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00FC8549
                                                                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00FC8555
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                            • String ID: .dll$.exe$.icl
                                                                            • API String ID: 799131459-1154884017
                                                                            • Opcode ID: dc9cdc1252d02316bd7191c25e36761a1ebc75c1c6325182a25932f5d8d9a501
                                                                            • Instruction ID: 380161ba1c99d7085f43142495bf64f78b0e59c7a85f9f97196aeb4be1537fe6
                                                                            • Opcode Fuzzy Hash: dc9cdc1252d02316bd7191c25e36761a1ebc75c1c6325182a25932f5d8d9a501
                                                                            • Instruction Fuzzy Hash: 6A61D17194021ABAEB18DF64CD42FFE77A8BF04761F10450AF915D70D1DBB4A981EBA0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                            • API String ID: 0-1645009161
                                                                            • Opcode ID: 9a0b826e17f618b6c92d42264236fc5a61e51ba56115fed22e0bc5216470af55
                                                                            • Instruction ID: a84ec6fc7c7f0fe7d6a197115242a1aa9e2640a9afead965ab15f28e706ab996
                                                                            • Opcode Fuzzy Hash: 9a0b826e17f618b6c92d42264236fc5a61e51ba56115fed22e0bc5216470af55
                                                                            • Instruction Fuzzy Hash: E481F8B1A04305BBDB20BF60CC43FAE7BA4AF14760F044025FD09AA192EBB4D915F792
                                                                            APIs
                                                                            • CharLowerBuffW.USER32(?,?), ref: 00FA3EF8
                                                                            • _wcslen.LIBCMT ref: 00FA3F03
                                                                            • _wcslen.LIBCMT ref: 00FA3F5A
                                                                            • _wcslen.LIBCMT ref: 00FA3F98
                                                                            • GetDriveTypeW.KERNEL32(?), ref: 00FA3FD6
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FA401E
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FA4059
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FA4087
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                            • API String ID: 1839972693-4113822522
                                                                            • Opcode ID: 6defe51fbd53e519bb3fdb4e5f63c059c12814f394984a62d3d35c73ed84c1e8
                                                                            • Instruction ID: c1e972f4b3355ca5a41505009d972899e98cad9da24b62c9972ac018f5b6740f
                                                                            • Opcode Fuzzy Hash: 6defe51fbd53e519bb3fdb4e5f63c059c12814f394984a62d3d35c73ed84c1e8
                                                                            • Instruction Fuzzy Hash: 2771F1B2A042059FC310EF34C88186AB7F4EF95768F10892DF996D7261EB34ED45EB91
                                                                            APIs
                                                                            • LoadIconW.USER32(00000063), ref: 00F95A2E
                                                                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00F95A40
                                                                            • SetWindowTextW.USER32(?,?), ref: 00F95A57
                                                                            • GetDlgItem.USER32(?,000003EA), ref: 00F95A6C
                                                                            • SetWindowTextW.USER32(00000000,?), ref: 00F95A72
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00F95A82
                                                                            • SetWindowTextW.USER32(00000000,?), ref: 00F95A88
                                                                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00F95AA9
                                                                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00F95AC3
                                                                            • GetWindowRect.USER32(?,?), ref: 00F95ACC
                                                                            • _wcslen.LIBCMT ref: 00F95B33
                                                                            • SetWindowTextW.USER32(?,?), ref: 00F95B6F
                                                                            • GetDesktopWindow.USER32 ref: 00F95B75
                                                                            • GetWindowRect.USER32(00000000), ref: 00F95B7C
                                                                            • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00F95BD3
                                                                            • GetClientRect.USER32(?,?), ref: 00F95BE0
                                                                            • PostMessageW.USER32(?,00000005,00000000,?), ref: 00F95C05
                                                                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00F95C2F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                            • String ID:
                                                                            • API String ID: 895679908-0
                                                                            • Opcode ID: bd7d5e7c448d1f2d2df73926b493b9dafa9c9a56abdd9347780085d896dad067
                                                                            • Instruction ID: be1150821d3602bda9881e389f3f206f8de8891c4aad724cbc3feafdc4c5ba96
                                                                            • Opcode Fuzzy Hash: bd7d5e7c448d1f2d2df73926b493b9dafa9c9a56abdd9347780085d896dad067
                                                                            • Instruction Fuzzy Hash: AB717D31900A099FEB21DFA8CE86E6EBBF5FF48B14F104518E586A35A0D775E940EB50
                                                                            APIs
                                                                            • LoadCursorW.USER32(00000000,00007F89), ref: 00FAFE27
                                                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 00FAFE32
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00FAFE3D
                                                                            • LoadCursorW.USER32(00000000,00007F03), ref: 00FAFE48
                                                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 00FAFE53
                                                                            • LoadCursorW.USER32(00000000,00007F01), ref: 00FAFE5E
                                                                            • LoadCursorW.USER32(00000000,00007F81), ref: 00FAFE69
                                                                            • LoadCursorW.USER32(00000000,00007F88), ref: 00FAFE74
                                                                            • LoadCursorW.USER32(00000000,00007F80), ref: 00FAFE7F
                                                                            • LoadCursorW.USER32(00000000,00007F86), ref: 00FAFE8A
                                                                            • LoadCursorW.USER32(00000000,00007F83), ref: 00FAFE95
                                                                            • LoadCursorW.USER32(00000000,00007F85), ref: 00FAFEA0
                                                                            • LoadCursorW.USER32(00000000,00007F82), ref: 00FAFEAB
                                                                            • LoadCursorW.USER32(00000000,00007F84), ref: 00FAFEB6
                                                                            • LoadCursorW.USER32(00000000,00007F04), ref: 00FAFEC1
                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 00FAFECC
                                                                            • GetCursorInfo.USER32(?), ref: 00FAFEDC
                                                                            • GetLastError.KERNEL32 ref: 00FAFF1E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$Load$ErrorInfoLast
                                                                            • String ID:
                                                                            • API String ID: 3215588206-0
                                                                            • Opcode ID: 505ed4a2adf25ca910e8f29a05ddae1dac348ad8dac4d39909af35960b9684eb
                                                                            • Instruction ID: e8e5c6ac02071980a931e482eeb162708c007547ec666296f0dfbfd7e29a6485
                                                                            • Opcode Fuzzy Hash: 505ed4a2adf25ca910e8f29a05ddae1dac348ad8dac4d39909af35960b9684eb
                                                                            • Instruction Fuzzy Hash: 0A4153B0D043196FDB109FBA8C85C5EBFE8FF05364B50462AE11DEB281DB7899019F91
                                                                            APIs
                                                                            • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00F500C6
                                                                              • Part of subcall function 00F500ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0100070C,00000FA0,6D004D92,?,?,?,?,00F723B3,000000FF), ref: 00F5011C
                                                                              • Part of subcall function 00F500ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00F723B3,000000FF), ref: 00F50127
                                                                              • Part of subcall function 00F500ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00F723B3,000000FF), ref: 00F50138
                                                                              • Part of subcall function 00F500ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00F5014E
                                                                              • Part of subcall function 00F500ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00F5015C
                                                                              • Part of subcall function 00F500ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00F5016A
                                                                              • Part of subcall function 00F500ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00F50195
                                                                              • Part of subcall function 00F500ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00F501A0
                                                                            • ___scrt_fastfail.LIBCMT ref: 00F500E7
                                                                              • Part of subcall function 00F500A3: __onexit.LIBCMT ref: 00F500A9
                                                                            Strings
                                                                            • SleepConditionVariableCS, xrefs: 00F50154
                                                                            • kernel32.dll, xrefs: 00F50133
                                                                            • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00F50122
                                                                            • WakeAllConditionVariable, xrefs: 00F50162
                                                                            • InitializeConditionVariable, xrefs: 00F50148
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                            • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                            • API String ID: 66158676-1714406822
                                                                            • Opcode ID: 4acd2b02cc7a8bb834b82a4c6a113fc258165372590a0722b089bb0c404f1184
                                                                            • Instruction ID: d0c265db2c2697ad45573fbd77fc5cff02eba1a9d7faa3c91d59fd085d86330f
                                                                            • Opcode Fuzzy Hash: 4acd2b02cc7a8bb834b82a4c6a113fc258165372590a0722b089bb0c404f1184
                                                                            • Instruction Fuzzy Hash: 54212932E40B156BE7215B64AD07F6A7794EB04B62F04013AFD0A972C1DF788808BAD2
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen
                                                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                            • API String ID: 176396367-1603158881
                                                                            • Opcode ID: 213b8210681e746af9b23e2ccd1a06c955995ec56b88f0f262deb1af20cf1307
                                                                            • Instruction ID: 2fde87fc10329123395a966cb27b32b83a89e27edbe8fc7a558f10eb5729715f
                                                                            • Opcode Fuzzy Hash: 213b8210681e746af9b23e2ccd1a06c955995ec56b88f0f262deb1af20cf1307
                                                                            • Instruction Fuzzy Hash: F1E1E532E00516ABDF18DFA8C841BFDBBB0BF44720F558119E956E7250DB30AE89B790
                                                                            APIs
                                                                            • CharLowerBuffW.USER32(00000000,00000000,00FCCC08), ref: 00FA4527
                                                                            • _wcslen.LIBCMT ref: 00FA453B
                                                                            • _wcslen.LIBCMT ref: 00FA4599
                                                                            • _wcslen.LIBCMT ref: 00FA45F4
                                                                            • _wcslen.LIBCMT ref: 00FA463F
                                                                            • _wcslen.LIBCMT ref: 00FA46A7
                                                                              • Part of subcall function 00F4F9F2: _wcslen.LIBCMT ref: 00F4F9FD
                                                                            • GetDriveTypeW.KERNEL32(?,00FF6BF0,00000061), ref: 00FA4743
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$BuffCharDriveLowerType
                                                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                            • API String ID: 2055661098-1000479233
                                                                            • Opcode ID: 1e8c691230f5e28235f2dbe1093497a327eac7fd65c8cb68caf52e857a148589
                                                                            • Instruction ID: 8debabd50ec9d430ac24d090e94d07a30bd45bf3e8f557fd2b3600ef20f4a8a9
                                                                            • Opcode Fuzzy Hash: 1e8c691230f5e28235f2dbe1093497a327eac7fd65c8cb68caf52e857a148589
                                                                            • Instruction Fuzzy Hash: DEB1F3B1A083029FC710DF28C891A6AB7E5AFD6720F50491DF596C7291D7B4E844EB52
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 00FBB198
                                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00FBB1B0
                                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00FBB1D4
                                                                            • _wcslen.LIBCMT ref: 00FBB200
                                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00FBB214
                                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00FBB236
                                                                            • _wcslen.LIBCMT ref: 00FBB332
                                                                              • Part of subcall function 00FA05A7: GetStdHandle.KERNEL32(000000F6), ref: 00FA05C6
                                                                            • _wcslen.LIBCMT ref: 00FBB34B
                                                                            • _wcslen.LIBCMT ref: 00FBB366
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FBB3B6
                                                                            • GetLastError.KERNEL32(00000000), ref: 00FBB407
                                                                            • CloseHandle.KERNEL32(?), ref: 00FBB439
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00FBB44A
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00FBB45C
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00FBB46E
                                                                            • CloseHandle.KERNEL32(?), ref: 00FBB4E3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 2178637699-0
                                                                            • Opcode ID: b960a38c2ae9494decaa987e98d6a56c6189259855bda8eb3e2d130c8409fa75
                                                                            • Instruction ID: 6ab12c387c357484ad5410bcbe329366d93a58aa8c4e0962813b340e5e65857e
                                                                            • Opcode Fuzzy Hash: b960a38c2ae9494decaa987e98d6a56c6189259855bda8eb3e2d130c8409fa75
                                                                            • Instruction Fuzzy Hash: 10F19F719083409FC714EF25C891B6EBBE1AF85324F18855DF8998B2A2CB75EC44EF52
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00FCCC08), ref: 00FB40BB
                                                                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00FB40CD
                                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00FCCC08), ref: 00FB40F2
                                                                            • FreeLibrary.KERNEL32(00000000,?,00FCCC08), ref: 00FB413E
                                                                            • StringFromGUID2.OLE32(?,?,00000028,?,00FCCC08), ref: 00FB41A8
                                                                            • SysFreeString.OLEAUT32(00000009), ref: 00FB4262
                                                                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00FB42C8
                                                                            • SysFreeString.OLEAUT32(?), ref: 00FB42F2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                            • String ID: GetModuleHandleExW$kernel32.dll
                                                                            • API String ID: 354098117-199464113
                                                                            • Opcode ID: 497ef0101a77e3297b6811868fce23313b6cc535d0c727b527dad5ec2af79d09
                                                                            • Instruction ID: 59587c4ee8c120b881d554fde51683c10f44e456e8ae9788f19254292173befd
                                                                            • Opcode Fuzzy Hash: 497ef0101a77e3297b6811868fce23313b6cc535d0c727b527dad5ec2af79d09
                                                                            • Instruction Fuzzy Hash: F7125A75A00109EFDB14DF95C984EAEBBB5FF45314F288098E9099B252C731ED42EFA0
                                                                            APIs
                                                                            • GetMenuItemCount.USER32(01001990), ref: 00F72F8D
                                                                            • GetMenuItemCount.USER32(01001990), ref: 00F7303D
                                                                            • GetCursorPos.USER32(?), ref: 00F73081
                                                                            • SetForegroundWindow.USER32(00000000), ref: 00F7308A
                                                                            • TrackPopupMenuEx.USER32(01001990,00000000,?,00000000,00000000,00000000), ref: 00F7309D
                                                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00F730A9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                            • String ID: 0
                                                                            • API String ID: 36266755-4108050209
                                                                            • Opcode ID: 43a558747d1c2ee681dc8f5b95c07c3af6e9b92d28e4f3c8e645572bf0f688b4
                                                                            • Instruction ID: 75e578a325d3afbe5ae1d335def2b58f5f5d15f71d4a771b4a82e8a5a66d1752
                                                                            • Opcode Fuzzy Hash: 43a558747d1c2ee681dc8f5b95c07c3af6e9b92d28e4f3c8e645572bf0f688b4
                                                                            • Instruction Fuzzy Hash: 9A71F831A44205BEFB218F24DD49F9ABF64FF05374F248216F5186A1D0C7B1A910FB92
                                                                            APIs
                                                                            • DestroyWindow.USER32(?,?), ref: 00FC6DEB
                                                                              • Part of subcall function 00F36B57: _wcslen.LIBCMT ref: 00F36B6A
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00FC6E5F
                                                                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00FC6E81
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FC6E94
                                                                            • DestroyWindow.USER32(?), ref: 00FC6EB5
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00F30000,00000000), ref: 00FC6EE4
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FC6EFD
                                                                            • GetDesktopWindow.USER32 ref: 00FC6F16
                                                                            • GetWindowRect.USER32(00000000), ref: 00FC6F1D
                                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00FC6F35
                                                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00FC6F4D
                                                                              • Part of subcall function 00F49944: GetWindowLongW.USER32(?,000000EB), ref: 00F49952
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                            • String ID: 0$tooltips_class32
                                                                            • API String ID: 2429346358-3619404913
                                                                            • Opcode ID: 801f489f7bb0161b933c6e35af0360377dc7ffe417e39a74dcba22fc91282842
                                                                            • Instruction ID: 1ac532e1532bc993db52865d9d0ed51d7e739ddfafeaaee443c12884164b1ae3
                                                                            • Opcode Fuzzy Hash: 801f489f7bb0161b933c6e35af0360377dc7ffe417e39a74dcba22fc91282842
                                                                            • Instruction Fuzzy Hash: C5718870908245AFDB21CF18DA49FAABBE9FF88314F04041EF989C7261D775E906EB15
                                                                            APIs
                                                                              • Part of subcall function 00F49BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00F49BB2
                                                                            • DragQueryPoint.SHELL32(?,?), ref: 00FC9147
                                                                              • Part of subcall function 00FC7674: ClientToScreen.USER32(?,?), ref: 00FC769A
                                                                              • Part of subcall function 00FC7674: GetWindowRect.USER32(?,?), ref: 00FC7710
                                                                              • Part of subcall function 00FC7674: PtInRect.USER32(?,?,00FC8B89), ref: 00FC7720
                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00FC91B0
                                                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00FC91BB
                                                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00FC91DE
                                                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00FC9225
                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00FC923E
                                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 00FC9255
                                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 00FC9277
                                                                            • DragFinish.SHELL32(?), ref: 00FC927E
                                                                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00FC9371
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                            • API String ID: 221274066-3440237614
                                                                            • Opcode ID: 8fbd0b3f14f5deb6153dc172c0242e2202049d0c90da3aedc42f3116ca0b279b
                                                                            • Instruction ID: 254f8717566e425b96ba3570ad7bf024f611cacf55ecc7d044f58885e51eeb45
                                                                            • Opcode Fuzzy Hash: 8fbd0b3f14f5deb6153dc172c0242e2202049d0c90da3aedc42f3116ca0b279b
                                                                            • Instruction Fuzzy Hash: 4B616D71108305AFD701DF64DD86EAFBBE8EF88760F00091DF595931A0DBB49A49EB92
                                                                            APIs
                                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00FAC4B0
                                                                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00FAC4C3
                                                                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00FAC4D7
                                                                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00FAC4F0
                                                                            • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00FAC533
                                                                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00FAC549
                                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00FAC554
                                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00FAC584
                                                                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00FAC5DC
                                                                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00FAC5F0
                                                                            • InternetCloseHandle.WININET(00000000), ref: 00FAC5FB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                            • String ID:
                                                                            • API String ID: 3800310941-3916222277
                                                                            • Opcode ID: 4f389247796b208d338d8cb5a91ce61f60fb8aab64bfa0c6a07ec65cf1b21406
                                                                            • Instruction ID: f917366a960b87665276e6bcbc479fd0cdd8e82de3894f9f853ddb018840593b
                                                                            • Opcode Fuzzy Hash: 4f389247796b208d338d8cb5a91ce61f60fb8aab64bfa0c6a07ec65cf1b21406
                                                                            • Instruction Fuzzy Hash: 45513AB1900609BFDB219F64C989AAA7BFCEF09754F044419F94A97610DB34E944ABE0
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00FC8592
                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 00FC85A2
                                                                            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00FC85AD
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00FC85BA
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00FC85C8
                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00FC85D7
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00FC85E0
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00FC85E7
                                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00FC85F8
                                                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00FCFC38,?), ref: 00FC8611
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00FC8621
                                                                            • GetObjectW.GDI32(?,00000018,000000FF), ref: 00FC8641
                                                                            • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00FC8671
                                                                            • DeleteObject.GDI32(00000000), ref: 00FC8699
                                                                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00FC86AF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                            • String ID:
                                                                            • API String ID: 3840717409-0
                                                                            • Opcode ID: 3e87838f3414c94749df61304f5d79f6060fe3c669c4ea693d5b6d5ae0f2d35c
                                                                            • Instruction ID: bbf36b35a1350d7c7cb4fc6188b693d26294457e46557b364a2204e984bc4f06
                                                                            • Opcode Fuzzy Hash: 3e87838f3414c94749df61304f5d79f6060fe3c669c4ea693d5b6d5ae0f2d35c
                                                                            • Instruction Fuzzy Hash: 5A414C71600209AFDB11CFA5CE4AEAA7BB8FF89761F14405CF909E7260DB709D01EB60
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(00000000), ref: 00FA1502
                                                                            • VariantCopy.OLEAUT32(?,?), ref: 00FA150B
                                                                            • VariantClear.OLEAUT32(?), ref: 00FA1517
                                                                            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00FA15FB
                                                                            • VarR8FromDec.OLEAUT32(?,?), ref: 00FA1657
                                                                            • VariantInit.OLEAUT32(?), ref: 00FA1708
                                                                            • SysFreeString.OLEAUT32(?), ref: 00FA178C
                                                                            • VariantClear.OLEAUT32(?), ref: 00FA17D8
                                                                            • VariantClear.OLEAUT32(?), ref: 00FA17E7
                                                                            • VariantInit.OLEAUT32(00000000), ref: 00FA1823
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                            • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                            • API String ID: 1234038744-3931177956
                                                                            • Opcode ID: 1f280dbe9143d0500af73bde3182e6296eb9135531cfec4c6c76c079c7cc8894
                                                                            • Instruction ID: 6acd70143e4e90f734995a71b2826e453f5a1f2977e7f9b6ca71089110e48e83
                                                                            • Opcode Fuzzy Hash: 1f280dbe9143d0500af73bde3182e6296eb9135531cfec4c6c76c079c7cc8894
                                                                            • Instruction Fuzzy Hash: 70D121B2E00505DFDB00DFA5D895B79B7B0BF46710F1A805AE84AAB180DB34DC04FBA1
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                              • Part of subcall function 00FBC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FBB6AE,?,?), ref: 00FBC9B5
                                                                              • Part of subcall function 00FBC998: _wcslen.LIBCMT ref: 00FBC9F1
                                                                              • Part of subcall function 00FBC998: _wcslen.LIBCMT ref: 00FBCA68
                                                                              • Part of subcall function 00FBC998: _wcslen.LIBCMT ref: 00FBCA9E
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FBB6F4
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FBB772
                                                                            • RegDeleteValueW.ADVAPI32(?,?), ref: 00FBB80A
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00FBB87E
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00FBB89C
                                                                            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00FBB8F2
                                                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00FBB904
                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00FBB922
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00FBB983
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00FBB994
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                                            • API String ID: 146587525-4033151799
                                                                            • Opcode ID: 5c5784204634ac1aade661c74f33eff46d759cb9faf3be0c6ec681ae171ed315
                                                                            • Instruction ID: af39a60c11e986a985d3903d6effe1b6a1b964355b1b74d5088338a1c740f40c
                                                                            • Opcode Fuzzy Hash: 5c5784204634ac1aade661c74f33eff46d759cb9faf3be0c6ec681ae171ed315
                                                                            • Instruction Fuzzy Hash: 6EC19E35608201AFD710DF15C895F6ABBE1FF84328F14845CE49A8B2A2CBB5EC45EF91
                                                                            APIs
                                                                            • GetDC.USER32(00000000), ref: 00FB25D8
                                                                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00FB25E8
                                                                            • CreateCompatibleDC.GDI32(?), ref: 00FB25F4
                                                                            • SelectObject.GDI32(00000000,?), ref: 00FB2601
                                                                            • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00FB266D
                                                                            • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00FB26AC
                                                                            • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00FB26D0
                                                                            • SelectObject.GDI32(?,?), ref: 00FB26D8
                                                                            • DeleteObject.GDI32(?), ref: 00FB26E1
                                                                            • DeleteDC.GDI32(?), ref: 00FB26E8
                                                                            • ReleaseDC.USER32(00000000,?), ref: 00FB26F3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                            • String ID: (
                                                                            • API String ID: 2598888154-3887548279
                                                                            • Opcode ID: e32d956b010210115bb7e34ba0b17eb4d37761ac49d962160315021ca394f567
                                                                            • Instruction ID: eb68bea57e184fe44dd51f09d2220d1630d1022774bc6c07dec81793a3c52cc9
                                                                            • Opcode Fuzzy Hash: e32d956b010210115bb7e34ba0b17eb4d37761ac49d962160315021ca394f567
                                                                            • Instruction Fuzzy Hash: 696101B5D00219EFCF04CFA9C985EAEBBB6FF48310F248529E959A7250D734A941DF90
                                                                            APIs
                                                                            • ___free_lconv_mon.LIBCMT ref: 00F6DAA1
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D659
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D66B
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D67D
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D68F
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D6A1
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D6B3
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D6C5
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D6D7
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D6E9
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D6FB
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D70D
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D71F
                                                                              • Part of subcall function 00F6D63C: _free.LIBCMT ref: 00F6D731
                                                                            • _free.LIBCMT ref: 00F6DA96
                                                                              • Part of subcall function 00F629C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F6D7D1,00000000,00000000,00000000,00000000,?,00F6D7F8,00000000,00000007,00000000,?,00F6DBF5,00000000), ref: 00F629DE
                                                                              • Part of subcall function 00F629C8: GetLastError.KERNEL32(00000000,?,00F6D7D1,00000000,00000000,00000000,00000000,?,00F6D7F8,00000000,00000007,00000000,?,00F6DBF5,00000000,00000000), ref: 00F629F0
                                                                            • _free.LIBCMT ref: 00F6DAB8
                                                                            • _free.LIBCMT ref: 00F6DACD
                                                                            • _free.LIBCMT ref: 00F6DAD8
                                                                            • _free.LIBCMT ref: 00F6DAFA
                                                                            • _free.LIBCMT ref: 00F6DB0D
                                                                            • _free.LIBCMT ref: 00F6DB1B
                                                                            • _free.LIBCMT ref: 00F6DB26
                                                                            • _free.LIBCMT ref: 00F6DB5E
                                                                            • _free.LIBCMT ref: 00F6DB65
                                                                            • _free.LIBCMT ref: 00F6DB82
                                                                            • _free.LIBCMT ref: 00F6DB9A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                            • String ID:
                                                                            • API String ID: 161543041-0
                                                                            • Opcode ID: 78c0c0fe0a2a59f2e4f4b39e4dd74ce4d560f06dc434dfc6e657a4835ae38283
                                                                            • Instruction ID: 149657d1e4e543c7087c729544c4d2274dfc451570661603e17bf4def5e265cd
                                                                            • Opcode Fuzzy Hash: 78c0c0fe0a2a59f2e4f4b39e4dd74ce4d560f06dc434dfc6e657a4835ae38283
                                                                            • Instruction Fuzzy Hash: F7317831F046049FEB25AA78EC41B6AB7F9FF80360F154529E048D7192DB38AC80FB20
                                                                            APIs
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 00F9369C
                                                                            • _wcslen.LIBCMT ref: 00F936A7
                                                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00F93797
                                                                            • GetClassNameW.USER32(?,?,00000400), ref: 00F9380C
                                                                            • GetDlgCtrlID.USER32(?), ref: 00F9385D
                                                                            • GetWindowRect.USER32(?,?), ref: 00F93882
                                                                            • GetParent.USER32(?), ref: 00F938A0
                                                                            • ScreenToClient.USER32(00000000), ref: 00F938A7
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 00F93921
                                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00F9395D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                            • String ID: %s%u
                                                                            • API String ID: 4010501982-679674701
                                                                            • Opcode ID: 350f32c68f281133a9fc180abf8ab1b370edeffdf0b0947acf7958bc67352964
                                                                            • Instruction ID: 4eec8736a8089507d306a7dc9e624f13af24040caa394f733c4756bfdd595125
                                                                            • Opcode Fuzzy Hash: 350f32c68f281133a9fc180abf8ab1b370edeffdf0b0947acf7958bc67352964
                                                                            • Instruction Fuzzy Hash: 5D910671604306AFEB19DF64C885FAAF7A9FF44350F004529F999C2190DB34EA49EBD1
                                                                            APIs
                                                                            • GetClassNameW.USER32(?,?,00000400), ref: 00F94994
                                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00F949DA
                                                                            • _wcslen.LIBCMT ref: 00F949EB
                                                                            • CharUpperBuffW.USER32(?,00000000), ref: 00F949F7
                                                                            • _wcsstr.LIBVCRUNTIME ref: 00F94A2C
                                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00F94A64
                                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00F94A9D
                                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00F94AE6
                                                                            • GetClassNameW.USER32(?,?,00000400), ref: 00F94B20
                                                                            • GetWindowRect.USER32(?,?), ref: 00F94B8B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                            • String ID: ThumbnailClass
                                                                            • API String ID: 1311036022-1241985126
                                                                            • Opcode ID: a2cadb11b4b01b3b6542ec490fc612561f9a86c37a8c721be4e29aa7f47dc50f
                                                                            • Instruction ID: fa9a739ea90c5a9bf6338f18c58e6ce1b5fa3ec96dba76236b3040a5e5ccdead
                                                                            • Opcode Fuzzy Hash: a2cadb11b4b01b3b6542ec490fc612561f9a86c37a8c721be4e29aa7f47dc50f
                                                                            • Instruction Fuzzy Hash: B491B1714082099FEF04CF14C981FAA77E8FF94324F048469FD899A196DB34ED46EBA1
                                                                            APIs
                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00FBCC64
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00FBCC8D
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00FBCD48
                                                                              • Part of subcall function 00FBCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00FBCCAA
                                                                              • Part of subcall function 00FBCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00FBCCBD
                                                                              • Part of subcall function 00FBCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00FBCCCF
                                                                              • Part of subcall function 00FBCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00FBCD05
                                                                              • Part of subcall function 00FBCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00FBCD28
                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00FBCCF3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                                            • API String ID: 2734957052-4033151799
                                                                            • Opcode ID: 3a6be05363cd40b892ce73a6cce3aede31eeeaf6237daa19828a6d860ae7a155
                                                                            • Instruction ID: c04407a8eb1e671e596d15bc7a804c4a72e70d178c1dc79ace12d29e72ec2033
                                                                            • Opcode Fuzzy Hash: 3a6be05363cd40b892ce73a6cce3aede31eeeaf6237daa19828a6d860ae7a155
                                                                            • Instruction Fuzzy Hash: 49318BB5D0112DBBDB208B52DC89EFFBB7CEF55750F000165E909E3200DA309A45BAE0
                                                                            APIs
                                                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00FA3D40
                                                                            • _wcslen.LIBCMT ref: 00FA3D6D
                                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FA3D9D
                                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00FA3DBE
                                                                            • RemoveDirectoryW.KERNEL32(?), ref: 00FA3DCE
                                                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00FA3E55
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00FA3E60
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00FA3E6B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                            • String ID: :$\$\??\%s
                                                                            • API String ID: 1149970189-3457252023
                                                                            • Opcode ID: 1f8cf21eb2fdd0d3c2e5b6459728ecd50cb8fc9b451cc6169a34cd7e8b28ca2a
                                                                            • Instruction ID: 31576d08b160e98a608794492a132caece0a75883f14cd6dc2508215c0837392
                                                                            • Opcode Fuzzy Hash: 1f8cf21eb2fdd0d3c2e5b6459728ecd50cb8fc9b451cc6169a34cd7e8b28ca2a
                                                                            • Instruction Fuzzy Hash: D631B2B290020DABDB219BA0DC49FEF37BCEF89750F1041B5FA09D6060EB749744AB64
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00F9EA5D
                                                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00F9EA73
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F9EA84
                                                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00F9EA96
                                                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00F9EAA7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: SendString$_wcslen
                                                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                            • API String ID: 2420728520-1007645807
                                                                            • Opcode ID: f838091cd4ca58ffd68aa3c102fc88985350e031c5218c9dccdee7b7d285a97f
                                                                            • Instruction ID: 0d16d2f6821b76aa03174a0553aff53207717314eb875158d68bb9dfa45ad78c
                                                                            • Opcode Fuzzy Hash: f838091cd4ca58ffd68aa3c102fc88985350e031c5218c9dccdee7b7d285a97f
                                                                            • Instruction Fuzzy Hash: 3B114231A9021D79EB20E761DC4AEFB7A7CEFD1B50F4004297901E20E1DEB45905E6B1
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?), ref: 00F9A012
                                                                            • SetKeyboardState.USER32(?), ref: 00F9A07D
                                                                            • GetAsyncKeyState.USER32(000000A0), ref: 00F9A09D
                                                                            • GetKeyState.USER32(000000A0), ref: 00F9A0B4
                                                                            • GetAsyncKeyState.USER32(000000A1), ref: 00F9A0E3
                                                                            • GetKeyState.USER32(000000A1), ref: 00F9A0F4
                                                                            • GetAsyncKeyState.USER32(00000011), ref: 00F9A120
                                                                            • GetKeyState.USER32(00000011), ref: 00F9A12E
                                                                            • GetAsyncKeyState.USER32(00000012), ref: 00F9A157
                                                                            • GetKeyState.USER32(00000012), ref: 00F9A165
                                                                            • GetAsyncKeyState.USER32(0000005B), ref: 00F9A18E
                                                                            • GetKeyState.USER32(0000005B), ref: 00F9A19C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: State$Async$Keyboard
                                                                            • String ID:
                                                                            • API String ID: 541375521-0
                                                                            • Opcode ID: 4dd174d6e3051018583d459eae3181ac5751eb9e2d57c67e67dc794fdaed1209
                                                                            • Instruction ID: 722a90fc3e3f5705a1ac8274fa2aa14fe1a7c0d73a7a4236c6eb4bd5c822751f
                                                                            • Opcode Fuzzy Hash: 4dd174d6e3051018583d459eae3181ac5751eb9e2d57c67e67dc794fdaed1209
                                                                            • Instruction Fuzzy Hash: D151FB30D0878829FF35DB6489117EAFFB49F11394F08459DD5C2571C2DA949A8CEBE2
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,00000001), ref: 00F95CE2
                                                                            • GetWindowRect.USER32(00000000,?), ref: 00F95CFB
                                                                            • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00F95D59
                                                                            • GetDlgItem.USER32(?,00000002), ref: 00F95D69
                                                                            • GetWindowRect.USER32(00000000,?), ref: 00F95D7B
                                                                            • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00F95DCF
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00F95DDD
                                                                            • GetWindowRect.USER32(00000000,?), ref: 00F95DEF
                                                                            • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00F95E31
                                                                            • GetDlgItem.USER32(?,000003EA), ref: 00F95E44
                                                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00F95E5A
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00F95E67
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ItemMoveRect$Invalidate
                                                                            • String ID:
                                                                            • API String ID: 3096461208-0
                                                                            • Opcode ID: f14ac7661052388b3e2c61a4018b02128c28d633f8629c26d0d508b824478e48
                                                                            • Instruction ID: 77c97003e24e40ea0a6cc76c17049d4f120765b6a5043d0db858789ce951dd90
                                                                            • Opcode Fuzzy Hash: f14ac7661052388b3e2c61a4018b02128c28d633f8629c26d0d508b824478e48
                                                                            • Instruction Fuzzy Hash: BC511FB1E00609AFDF18DF68CE8AEAE7BB5EB48710F108129F519E7290D7709E04DB50
                                                                            APIs
                                                                              • Part of subcall function 00F48F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F48BE8,?,00000000,?,?,?,?,00F48BBA,00000000,?), ref: 00F48FC5
                                                                            • DestroyWindow.USER32(?), ref: 00F48C81
                                                                            • KillTimer.USER32(00000000,?,?,?,?,00F48BBA,00000000,?), ref: 00F48D1B
                                                                            • DestroyAcceleratorTable.USER32(00000000), ref: 00F86973
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00F48BBA,00000000,?), ref: 00F869A1
                                                                            • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00F48BBA,00000000,?), ref: 00F869B8
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00F48BBA,00000000), ref: 00F869D4
                                                                            • DeleteObject.GDI32(00000000), ref: 00F869E6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                            • String ID:
                                                                            • API String ID: 641708696-0
                                                                            • Opcode ID: d60af06578d1413c3beea4aa0c6798d023df6ea3d52a193ccb52717d3a7c6819
                                                                            • Instruction ID: 8b2bec7a2a3d9ecba77412f0685ee46f6885bc830bee73bc0a97ce58cb277266
                                                                            • Opcode Fuzzy Hash: d60af06578d1413c3beea4aa0c6798d023df6ea3d52a193ccb52717d3a7c6819
                                                                            • Instruction Fuzzy Hash: 1061CE31902611DFDB369F14DA89B697BF1FB40362F104518E5829B5A0CB3AE982FF90
                                                                            APIs
                                                                              • Part of subcall function 00F49944: GetWindowLongW.USER32(?,000000EB), ref: 00F49952
                                                                            • GetSysColor.USER32(0000000F), ref: 00F49862
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ColorLongWindow
                                                                            • String ID:
                                                                            • API String ID: 259745315-0
                                                                            • Opcode ID: 827ceba26f481ba5122201670c8a62472622292cc01698b3ff839e8707c19894
                                                                            • Instruction ID: e318cc86b52e3b8e0dc3d376120a4fb58b3416926d5fc30b4b06804c795a8eb1
                                                                            • Opcode Fuzzy Hash: 827ceba26f481ba5122201670c8a62472622292cc01698b3ff839e8707c19894
                                                                            • Instruction Fuzzy Hash: FA4193316086449FDB209F3C9C49FBA3B65AB46330F684615FDA68B1E1D771D842FB50
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00F7F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00F99717
                                                                            • LoadStringW.USER32(00000000,?,00F7F7F8,00000001), ref: 00F99720
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                            • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00F7F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00F99742
                                                                            • LoadStringW.USER32(00000000,?,00F7F7F8,00000001), ref: 00F99745
                                                                            • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00F99866
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadModuleString$Message_wcslen
                                                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                            • API String ID: 747408836-2268648507
                                                                            • Opcode ID: 5eb3bcd8a39cbaae61690e69bdcb45d6b74be6308f93bb52b243a1ba5899db33
                                                                            • Instruction ID: 81b5d27c674b5df8ad07d555ca5ed1410481daf934987e2d2c4f18e9c5e4705b
                                                                            • Opcode Fuzzy Hash: 5eb3bcd8a39cbaae61690e69bdcb45d6b74be6308f93bb52b243a1ba5899db33
                                                                            • Instruction Fuzzy Hash: C8414172804119AADF04FBE4CE46EEE7778AF55350F504029F605B2092EFB95F48EB61
                                                                            APIs
                                                                              • Part of subcall function 00F36B57: _wcslen.LIBCMT ref: 00F36B6A
                                                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00F907A2
                                                                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00F907BE
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00F907DA
                                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00F90804
                                                                            • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00F9082C
                                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F90837
                                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F9083C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                            • API String ID: 323675364-22481851
                                                                            • Opcode ID: 36d52a45ca7ec39a08d1b54ceb1ef8f9a659e7d9433dda86edaca25872f79a22
                                                                            • Instruction ID: e2e7311fc196e056edeac4c3c5979f9af5878f0b929ec3d9d5fd3ebb172ac72b
                                                                            • Opcode Fuzzy Hash: 36d52a45ca7ec39a08d1b54ceb1ef8f9a659e7d9433dda86edaca25872f79a22
                                                                            • Instruction Fuzzy Hash: 14411572C1022DAFDF25EBA4DC85CEDB778BF44760F444129E905A31A1EB749E04EBA0
                                                                            APIs
                                                                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00FC403B
                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 00FC4042
                                                                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00FC4055
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00FC405D
                                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 00FC4068
                                                                            • DeleteDC.GDI32(00000000), ref: 00FC4072
                                                                            • GetWindowLongW.USER32(?,000000EC), ref: 00FC407C
                                                                            • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00FC4092
                                                                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00FC409E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                            • String ID: static
                                                                            • API String ID: 2559357485-2160076837
                                                                            • Opcode ID: 2e197a870bf7502f297ecf4982768d2301d9d448a1f95c5de50e76138a49e232
                                                                            • Instruction ID: e843e4a6ef1f803dcd292e6e2072158d18896d244257aad96374b06369c69eb9
                                                                            • Opcode Fuzzy Hash: 2e197a870bf7502f297ecf4982768d2301d9d448a1f95c5de50e76138a49e232
                                                                            • Instruction Fuzzy Hash: 1631603254121AAFDF219FA4CE46FDA3B68FF0D360F110215FA58E61A0C775D811EB90
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 00FB3C5C
                                                                            • CoInitialize.OLE32(00000000), ref: 00FB3C8A
                                                                            • CoUninitialize.OLE32 ref: 00FB3C94
                                                                            • _wcslen.LIBCMT ref: 00FB3D2D
                                                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 00FB3DB1
                                                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00FB3ED5
                                                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00FB3F0E
                                                                            • CoGetObject.OLE32(?,00000000,00FCFB98,?), ref: 00FB3F2D
                                                                            • SetErrorMode.KERNEL32(00000000), ref: 00FB3F40
                                                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00FB3FC4
                                                                            • VariantClear.OLEAUT32(?), ref: 00FB3FD8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                            • String ID:
                                                                            • API String ID: 429561992-0
                                                                            • Opcode ID: a8a848bd030888a968ff1a96b289fee350a62a0f38528c94a69070af192f4e58
                                                                            • Instruction ID: 6b8d1f27818f3c5a2f7047111b86d1f82f512a49871e8fc4a0e99594e8050edf
                                                                            • Opcode Fuzzy Hash: a8a848bd030888a968ff1a96b289fee350a62a0f38528c94a69070af192f4e58
                                                                            • Instruction Fuzzy Hash: 93C16571A083059FC700DF6AC98496BBBE9FF88754F14491DF98A9B250DB30EE05DB92
                                                                            APIs
                                                                            • CoInitialize.OLE32(00000000), ref: 00FA7AF3
                                                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00FA7B8F
                                                                            • SHGetDesktopFolder.SHELL32(?), ref: 00FA7BA3
                                                                            • CoCreateInstance.OLE32(00FCFD08,00000000,00000001,00FF6E6C,?), ref: 00FA7BEF
                                                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00FA7C74
                                                                            • CoTaskMemFree.OLE32(?,?), ref: 00FA7CCC
                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 00FA7D57
                                                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00FA7D7A
                                                                            • CoTaskMemFree.OLE32(00000000), ref: 00FA7D81
                                                                            • CoTaskMemFree.OLE32(00000000), ref: 00FA7DD6
                                                                            • CoUninitialize.OLE32 ref: 00FA7DDC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                            • String ID:
                                                                            • API String ID: 2762341140-0
                                                                            • Opcode ID: a01710bf135d224f0ee5ee3e5117758b83a1ac2149ea8e0610634915f9b3ea37
                                                                            • Instruction ID: 45b851ece2dabaa4f9660431b8692bbfb352127f642e35c6f91edf2660dc90b5
                                                                            • Opcode Fuzzy Hash: a01710bf135d224f0ee5ee3e5117758b83a1ac2149ea8e0610634915f9b3ea37
                                                                            • Instruction Fuzzy Hash: A6C12AB5A04209AFCB14DF64C884DAEBBF9FF49314F148499E81ADB261D730ED45DB90
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00FC5504
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FC5515
                                                                            • CharNextW.USER32(00000158), ref: 00FC5544
                                                                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00FC5585
                                                                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00FC559B
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FC55AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CharNext
                                                                            • String ID:
                                                                            • API String ID: 1350042424-0
                                                                            • Opcode ID: a2211eb8d84b397c2f2fc48326b85ea64a963300dbaa9d34a2dd2c8c315a18fb
                                                                            • Instruction ID: 12315f7587b12d2d6a6bdcdf005a06aa7a6685f7133302051bbdbcac9e2f6568
                                                                            • Opcode Fuzzy Hash: a2211eb8d84b397c2f2fc48326b85ea64a963300dbaa9d34a2dd2c8c315a18fb
                                                                            • Instruction Fuzzy Hash: E5618C3190060AABDF10DF54CE86FFE7B79AB05B24F104549F529AB290D774AA80FB60
                                                                            APIs
                                                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00F8FAAF
                                                                            • SafeArrayAllocData.OLEAUT32(?), ref: 00F8FB08
                                                                            • VariantInit.OLEAUT32(?), ref: 00F8FB1A
                                                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00F8FB3A
                                                                            • VariantCopy.OLEAUT32(?,?), ref: 00F8FB8D
                                                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00F8FBA1
                                                                            • VariantClear.OLEAUT32(?), ref: 00F8FBB6
                                                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 00F8FBC3
                                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F8FBCC
                                                                            • VariantClear.OLEAUT32(?), ref: 00F8FBDE
                                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F8FBE9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                            • String ID:
                                                                            • API String ID: 2706829360-0
                                                                            • Opcode ID: 778c0629e75a9e59f533a16dedd576b1dab48ab3b41209ac9ffd1d17a0837369
                                                                            • Instruction ID: 49f29a5b5c426a335b05a4a283f50cb6861d5fb6bf7db8f0a9a453ec613672cb
                                                                            • Opcode Fuzzy Hash: 778c0629e75a9e59f533a16dedd576b1dab48ab3b41209ac9ffd1d17a0837369
                                                                            • Instruction Fuzzy Hash: D9413E35A002199FCB04EF64CC55DEEBBB9FF48354F008069E95AA7261DB34A949DFA0
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?), ref: 00F99CA1
                                                                            • GetAsyncKeyState.USER32(000000A0), ref: 00F99D22
                                                                            • GetKeyState.USER32(000000A0), ref: 00F99D3D
                                                                            • GetAsyncKeyState.USER32(000000A1), ref: 00F99D57
                                                                            • GetKeyState.USER32(000000A1), ref: 00F99D6C
                                                                            • GetAsyncKeyState.USER32(00000011), ref: 00F99D84
                                                                            • GetKeyState.USER32(00000011), ref: 00F99D96
                                                                            • GetAsyncKeyState.USER32(00000012), ref: 00F99DAE
                                                                            • GetKeyState.USER32(00000012), ref: 00F99DC0
                                                                            • GetAsyncKeyState.USER32(0000005B), ref: 00F99DD8
                                                                            • GetKeyState.USER32(0000005B), ref: 00F99DEA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: State$Async$Keyboard
                                                                            • String ID:
                                                                            • API String ID: 541375521-0
                                                                            • Opcode ID: 70262764f96fb4e6db3467ff1b609c9f216945bcb30152afe092db66e2b2a953
                                                                            • Instruction ID: 28dfbae6ecd68f4c5b64f4fdcb2206f03fd6a22bd98bdd821e419fce05e7bf42
                                                                            • Opcode Fuzzy Hash: 70262764f96fb4e6db3467ff1b609c9f216945bcb30152afe092db66e2b2a953
                                                                            • Instruction Fuzzy Hash: 4241FB30D0C7CA69FF31976889443B5BEA06F12364F09405EC9C6575C1EBE559C8EBA2
                                                                            APIs
                                                                            • WSAStartup.WSOCK32(00000101,?), ref: 00FB05BC
                                                                            • inet_addr.WSOCK32(?), ref: 00FB061C
                                                                            • gethostbyname.WSOCK32(?), ref: 00FB0628
                                                                            • IcmpCreateFile.IPHLPAPI ref: 00FB0636
                                                                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00FB06C6
                                                                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00FB06E5
                                                                            • IcmpCloseHandle.IPHLPAPI(?), ref: 00FB07B9
                                                                            • WSACleanup.WSOCK32 ref: 00FB07BF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                            • String ID: Ping
                                                                            • API String ID: 1028309954-2246546115
                                                                            • Opcode ID: 775331aac6fcde505f5b63050df891c247b1f0f6bd2164d1afecf7b6b9f48fe2
                                                                            • Instruction ID: 049ea33b6bbbc06ecf263832ea710dacdae9f9177335b61f5eb384826478eac4
                                                                            • Opcode Fuzzy Hash: 775331aac6fcde505f5b63050df891c247b1f0f6bd2164d1afecf7b6b9f48fe2
                                                                            • Instruction Fuzzy Hash: 539190359042019FD720DF16C989F5BBBE0EF44328F1885A9F4698B6A2CB34EC45EF91
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$BuffCharLower
                                                                            • String ID: cdecl$none$stdcall$winapi
                                                                            • API String ID: 707087890-567219261
                                                                            • Opcode ID: 9fbd70ee54cc8b8a5b4103ae8e829ec7aa7382f93b2d11c43d96368431e75ee5
                                                                            • Instruction ID: 1e7d594a5d76813f62bd2c5120aa038ab9ce5733999bae18bdb0cbe033a58d9d
                                                                            • Opcode Fuzzy Hash: 9fbd70ee54cc8b8a5b4103ae8e829ec7aa7382f93b2d11c43d96368431e75ee5
                                                                            • Instruction Fuzzy Hash: AB51B431A041169BCB14DFA9C9419FEB7A9BFA4364B204229E916E7284DF34DD42EB90
                                                                            APIs
                                                                            • CoInitialize.OLE32 ref: 00FB3774
                                                                            • CoUninitialize.OLE32 ref: 00FB377F
                                                                            • CoCreateInstance.OLE32(?,00000000,00000017,00FCFB78,?), ref: 00FB37D9
                                                                            • IIDFromString.OLE32(?,?), ref: 00FB384C
                                                                            • VariantInit.OLEAUT32(?), ref: 00FB38E4
                                                                            • VariantClear.OLEAUT32(?), ref: 00FB3936
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                            • API String ID: 636576611-1287834457
                                                                            • Opcode ID: eb982f6945005277971bdb00f1113a59ff4bd84590d5741b2886b0d1bebfdeb2
                                                                            • Instruction ID: 71203e1948a633ae1b964c811771d907e82e5d04f393c8e22586653aaeb84f1a
                                                                            • Opcode Fuzzy Hash: eb982f6945005277971bdb00f1113a59ff4bd84590d5741b2886b0d1bebfdeb2
                                                                            • Instruction Fuzzy Hash: 3B61A072648301AFD710DF55C889FAABBE8EF44710F104809F98597291DB74EE48EF92
                                                                            APIs
                                                                            • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00FA33CF
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                            • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00FA33F0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: LoadString$_wcslen
                                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                            • API String ID: 4099089115-3080491070
                                                                            • Opcode ID: 3db9bf5284ec299a4178235bdbf994389a53bf5aef737b1c5997afea289b71f1
                                                                            • Instruction ID: abc96c998d0a60460aa83cef109a2984c73a7ead069de1c2744ce0c9ab345738
                                                                            • Opcode Fuzzy Hash: 3db9bf5284ec299a4178235bdbf994389a53bf5aef737b1c5997afea289b71f1
                                                                            • Instruction Fuzzy Hash: 6A51AF72C0420AAADF15EBA0CD42EEEB778EF04350F148065F505B2062EB796F58FB61
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$BuffCharUpper
                                                                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                            • API String ID: 1256254125-769500911
                                                                            • Opcode ID: 15c678affaf7e9dd1d3683b260248f96aa16453c259ec714e60f54862508eaf0
                                                                            • Instruction ID: 07a26ffc8577a8d7c52217ee75912d7809c62f8561b482f97eae0f952e396c99
                                                                            • Opcode Fuzzy Hash: 15c678affaf7e9dd1d3683b260248f96aa16453c259ec714e60f54862508eaf0
                                                                            • Instruction Fuzzy Hash: 74412933E0002A9BDF206F7DDE905BE77A5AFA0774B244269E521D7280E735EC81E790
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 00FA53A0
                                                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00FA5416
                                                                            • GetLastError.KERNEL32 ref: 00FA5420
                                                                            • SetErrorMode.KERNEL32(00000000,READY), ref: 00FA54A7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Error$Mode$DiskFreeLastSpace
                                                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                            • API String ID: 4194297153-14809454
                                                                            • Opcode ID: bb3865c5d1271ec33d5025df8f147470122dbe883347dfcd756c25e93168de0e
                                                                            • Instruction ID: 48f67fac31e8f2fd4aca3afd361f8e45e7e3de4b273941e06446c0127d511585
                                                                            • Opcode Fuzzy Hash: bb3865c5d1271ec33d5025df8f147470122dbe883347dfcd756c25e93168de0e
                                                                            • Instruction Fuzzy Hash: E231F6B5E006089FC710DF68C894FAD7BB4EF4A715F188055E905CB262DB75ED82EB90
                                                                            APIs
                                                                            • CreateMenu.USER32 ref: 00FC3C79
                                                                            • SetMenu.USER32(?,00000000), ref: 00FC3C88
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FC3D10
                                                                            • IsMenu.USER32(?), ref: 00FC3D24
                                                                            • CreatePopupMenu.USER32 ref: 00FC3D2E
                                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00FC3D5B
                                                                            • DrawMenuBar.USER32 ref: 00FC3D63
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                            • String ID: 0$F
                                                                            • API String ID: 161812096-3044882817
                                                                            • Opcode ID: d684f56ae8d796371fa051afbd8c64b1041bd40fc93df12d7311be71491d5b1a
                                                                            • Instruction ID: 6ff02fe79cb447c9b7e60be39fb78189235908ce49de8dd603f53e31d95b2ae6
                                                                            • Opcode Fuzzy Hash: d684f56ae8d796371fa051afbd8c64b1041bd40fc93df12d7311be71491d5b1a
                                                                            • Instruction Fuzzy Hash: 2F416B75A0120AAFDB14CF64D945FAA7BB5FF49350F14442CF946A7350D731AA10EF90
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                              • Part of subcall function 00F93CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F93CCA
                                                                            • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00F91F64
                                                                            • GetDlgCtrlID.USER32 ref: 00F91F6F
                                                                            • GetParent.USER32 ref: 00F91F8B
                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F91F8E
                                                                            • GetDlgCtrlID.USER32(?), ref: 00F91F97
                                                                            • GetParent.USER32(?), ref: 00F91FAB
                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F91FAE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 711023334-1403004172
                                                                            • Opcode ID: 7b8f06b1f26041458dd8ec0875ed9102810f30b0ae6b9414a3e47052a5eae302
                                                                            • Instruction ID: 16432aff97d5b140d1b1fb6071863736ba5e691a06ad26cc1183d4a399ab4ccf
                                                                            • Opcode Fuzzy Hash: 7b8f06b1f26041458dd8ec0875ed9102810f30b0ae6b9414a3e47052a5eae302
                                                                            • Instruction Fuzzy Hash: 0421A171900118ABDF05AFA0DD45DEEBBA4AF05354F000115F959A72A1CBB95908FB60
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                              • Part of subcall function 00F93CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F93CCA
                                                                            • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00F92043
                                                                            • GetDlgCtrlID.USER32 ref: 00F9204E
                                                                            • GetParent.USER32 ref: 00F9206A
                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F9206D
                                                                            • GetDlgCtrlID.USER32(?), ref: 00F92076
                                                                            • GetParent.USER32(?), ref: 00F9208A
                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F9208D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 711023334-1403004172
                                                                            • Opcode ID: 274e2ea72996d73d00af598608b44fc35f602e0950107b456470d65a4b5ae87e
                                                                            • Instruction ID: cc254eb822844e6668c6ebd7ace859d9749f7d0c9121d1d0cdf3aa23bb4b8907
                                                                            • Opcode Fuzzy Hash: 274e2ea72996d73d00af598608b44fc35f602e0950107b456470d65a4b5ae87e
                                                                            • Instruction Fuzzy Hash: 8521C675D00218BBDF10AFA0DD85EFEBBB8EF05350F004015FA59A72A1DAB98915FB60
                                                                            APIs
                                                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00FC3A9D
                                                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00FC3AA0
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00FC3AC7
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FC3AEA
                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00FC3B62
                                                                            • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00FC3BAC
                                                                            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00FC3BC7
                                                                            • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00FC3BE2
                                                                            • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00FC3BF6
                                                                            • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00FC3C13
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$LongWindow
                                                                            • String ID:
                                                                            • API String ID: 312131281-0
                                                                            • Opcode ID: 5ac84ca32a61a6abc052ab2544124e4ebd15d4fbae1892689e0a7b84d14b3f3e
                                                                            • Instruction ID: 562e3ed2c662157bec28f26f5ffd456e94c87504aeea7e43eb0124f541e90559
                                                                            • Opcode Fuzzy Hash: 5ac84ca32a61a6abc052ab2544124e4ebd15d4fbae1892689e0a7b84d14b3f3e
                                                                            • Instruction Fuzzy Hash: 82618A75900209AFDB21DFA8CD82FEE77F8EB49310F104099FA15A7291C774AE41EB60
                                                                            APIs
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00F9B151
                                                                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00F9A1E1,?,00000001), ref: 00F9B165
                                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 00F9B16C
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F9A1E1,?,00000001), ref: 00F9B17B
                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F9B18D
                                                                            • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00F9A1E1,?,00000001), ref: 00F9B1A6
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F9A1E1,?,00000001), ref: 00F9B1B8
                                                                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00F9A1E1,?,00000001), ref: 00F9B1FD
                                                                            • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00F9A1E1,?,00000001), ref: 00F9B212
                                                                            • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00F9A1E1,?,00000001), ref: 00F9B21D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                            • String ID:
                                                                            • API String ID: 2156557900-0
                                                                            • Opcode ID: ced843a24019cee4a9af76562f8f2b805da9b8b9515d148408b338a8acd65a5d
                                                                            • Instruction ID: 443fe473f319dad72ee74a8c4a2b268f7df20070dab4c1542467327f6268bd77
                                                                            • Opcode Fuzzy Hash: ced843a24019cee4a9af76562f8f2b805da9b8b9515d148408b338a8acd65a5d
                                                                            • Instruction Fuzzy Hash: C5318E71900208AFEF27DF25EE59F6D7BA9FB51321F104005FA49DB180D7B9A941AF60
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00F62C94
                                                                              • Part of subcall function 00F629C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F6D7D1,00000000,00000000,00000000,00000000,?,00F6D7F8,00000000,00000007,00000000,?,00F6DBF5,00000000), ref: 00F629DE
                                                                              • Part of subcall function 00F629C8: GetLastError.KERNEL32(00000000,?,00F6D7D1,00000000,00000000,00000000,00000000,?,00F6D7F8,00000000,00000007,00000000,?,00F6DBF5,00000000,00000000), ref: 00F629F0
                                                                            • _free.LIBCMT ref: 00F62CA0
                                                                            • _free.LIBCMT ref: 00F62CAB
                                                                            • _free.LIBCMT ref: 00F62CB6
                                                                            • _free.LIBCMT ref: 00F62CC1
                                                                            • _free.LIBCMT ref: 00F62CCC
                                                                            • _free.LIBCMT ref: 00F62CD7
                                                                            • _free.LIBCMT ref: 00F62CE2
                                                                            • _free.LIBCMT ref: 00F62CED
                                                                            • _free.LIBCMT ref: 00F62CFB
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: fff07eedab689fd0cc18de3ad0e1491b5924cd43b6e445a17670f7b9e4301654
                                                                            • Instruction ID: f4c6f0741a3caaf91430f43c648b3d966ee635c43ef3545d57da6ec4f3d05347
                                                                            • Opcode Fuzzy Hash: fff07eedab689fd0cc18de3ad0e1491b5924cd43b6e445a17670f7b9e4301654
                                                                            • Instruction Fuzzy Hash: CA119376600508AFCB86EF58DC82CDD3BB5FF45390F4144A5FA489B222DA35EA50BB90
                                                                            APIs
                                                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00F31459
                                                                            • OleUninitialize.OLE32(?,00000000), ref: 00F314F8
                                                                            • UnregisterHotKey.USER32(?), ref: 00F316DD
                                                                            • DestroyWindow.USER32(?), ref: 00F724B9
                                                                            • FreeLibrary.KERNEL32(?), ref: 00F7251E
                                                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F7254B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                            • String ID: close all
                                                                            • API String ID: 469580280-3243417748
                                                                            • Opcode ID: 8e9d24970c0c0c1de697817e5c56754b61cb947b3bd04b2ffce5db95d0d9c4b2
                                                                            • Instruction ID: 98cc149dda759772c176dfb8e06b24e6958e4f2fda640995b777aea3469ffa16
                                                                            • Opcode Fuzzy Hash: 8e9d24970c0c0c1de697817e5c56754b61cb947b3bd04b2ffce5db95d0d9c4b2
                                                                            • Instruction Fuzzy Hash: F4D15D31B01212CFCB19EF15C995B29F7A4BF05720F1482AEE44E6B252DB31AD16EF91
                                                                            APIs
                                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FA7FAD
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FA7FC1
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 00FA7FEB
                                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00FA8005
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FA8017
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00FA8060
                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00FA80B0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectory$AttributesFile
                                                                            • String ID: *.*
                                                                            • API String ID: 769691225-438819550
                                                                            • Opcode ID: b3f0ae08c70bd98d2baa4b11effb83ce407b0a448fdfeef45ad247938c4cafcc
                                                                            • Instruction ID: 4a9232e54d78c92b1787c806c9f0d3bd0253001d78927372218881dfb484f70d
                                                                            • Opcode Fuzzy Hash: b3f0ae08c70bd98d2baa4b11effb83ce407b0a448fdfeef45ad247938c4cafcc
                                                                            • Instruction Fuzzy Hash: 8C81B6B29083459BCB24EF14CC84E6AB3E8BF86360F144C5EF885D7250DB75DD45AB92
                                                                            APIs
                                                                            • SetWindowLongW.USER32(?,000000EB), ref: 00F35C7A
                                                                              • Part of subcall function 00F35D0A: GetClientRect.USER32(?,?), ref: 00F35D30
                                                                              • Part of subcall function 00F35D0A: GetWindowRect.USER32(?,?), ref: 00F35D71
                                                                              • Part of subcall function 00F35D0A: ScreenToClient.USER32(?,?), ref: 00F35D99
                                                                            • GetDC.USER32 ref: 00F746F5
                                                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00F74708
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00F74716
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00F7472B
                                                                            • ReleaseDC.USER32(?,00000000), ref: 00F74733
                                                                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00F747C4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                            • String ID: U
                                                                            • API String ID: 4009187628-3372436214
                                                                            • Opcode ID: 9b21069ce189c107668efe47718cd70e7c7972419e81fc03463c65be25d90e6f
                                                                            • Instruction ID: 1bb59ce9ead5bb54b22e4679ee97f02ac37ca840790558e85ab75d0b45f876e2
                                                                            • Opcode Fuzzy Hash: 9b21069ce189c107668efe47718cd70e7c7972419e81fc03463c65be25d90e6f
                                                                            • Instruction Fuzzy Hash: 1671E331800205DFCF268F64C985AB97BB5FF4A374F14822AED595A166C335A842FF52
                                                                            APIs
                                                                            • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00FA35E4
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                            • LoadStringW.USER32(01002390,?,00000FFF,?), ref: 00FA360A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: LoadString$_wcslen
                                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                            • API String ID: 4099089115-2391861430
                                                                            • Opcode ID: 51c99bd79b5922a0b19f7ffa0352812e3c8ca2c27c78610fac24b7f9f8e9a639
                                                                            • Instruction ID: 6e0e56901b1e43a64bbaa6e88a36b814de6e3df7cea12e50b2aa92a2c6b34d09
                                                                            • Opcode Fuzzy Hash: 51c99bd79b5922a0b19f7ffa0352812e3c8ca2c27c78610fac24b7f9f8e9a639
                                                                            • Instruction Fuzzy Hash: 12517FB1C0421ABADF15EBA0CC42EEDBB38EF05310F144125F505721A1EB795B99EFA1
                                                                            APIs
                                                                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00FAC272
                                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00FAC29A
                                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00FAC2CA
                                                                            • GetLastError.KERNEL32 ref: 00FAC322
                                                                            • SetEvent.KERNEL32(?), ref: 00FAC336
                                                                            • InternetCloseHandle.WININET(00000000), ref: 00FAC341
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                            • String ID:
                                                                            • API String ID: 3113390036-3916222277
                                                                            • Opcode ID: 00222de189e2b816f14e23de31e6652af7be13e2aedf4931ebb30c30315c2930
                                                                            • Instruction ID: f212d4c8f5f657b54561bae51e2178dd62098b8ebbeb9eafaf745ceb07e03215
                                                                            • Opcode Fuzzy Hash: 00222de189e2b816f14e23de31e6652af7be13e2aedf4931ebb30c30315c2930
                                                                            • Instruction Fuzzy Hash: F2313CB1900708AFDB219F649D89AAB7AECEF4A754B14851AE44AD3200DB34D905ABE1
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00F73AAF,?,?,Bad directive syntax error,00FCCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00F998BC
                                                                            • LoadStringW.USER32(00000000,?,00F73AAF,?), ref: 00F998C3
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00F99987
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadMessageModuleString_wcslen
                                                                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                            • API String ID: 858772685-4153970271
                                                                            • Opcode ID: b8cdc8a700ec38246cb773ca7b7fcd75961c2627a0dae64ef504ff4b6989699b
                                                                            • Instruction ID: 480f5deb6655b149ee8326a176b243bccef97857bde37e65dd447420bab6984c
                                                                            • Opcode Fuzzy Hash: b8cdc8a700ec38246cb773ca7b7fcd75961c2627a0dae64ef504ff4b6989699b
                                                                            • Instruction Fuzzy Hash: 25217E3284421EABDF15EF90CC06EEE7775FF18710F044419F619660A2EBB99618FB51
                                                                            APIs
                                                                            • GetParent.USER32 ref: 00F920AB
                                                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00F920C0
                                                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00F9214D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameParentSend
                                                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                            • API String ID: 1290815626-3381328864
                                                                            • Opcode ID: 9ef880bb506e650a2689cccfb7f93859b9148fb661d004e7b1cb0724a8a2d801
                                                                            • Instruction ID: 8620007239390e547cb34bb8bc4017937f3e3a070a92d0bf2b03d9565582689e
                                                                            • Opcode Fuzzy Hash: 9ef880bb506e650a2689cccfb7f93859b9148fb661d004e7b1cb0724a8a2d801
                                                                            • Instruction Fuzzy Hash: C6112C7768870ABAFE412620DC07DF6379CCF04725F200016FB08A50F1FE65A8957654
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                            • String ID:
                                                                            • API String ID: 1282221369-0
                                                                            • Opcode ID: 1f91536b9fadee9a954d6b27211a667c8ea56d252377a6a2413d2522efba2367
                                                                            • Instruction ID: 8b097932f773483763a6a941e9d9163f722cabdda4b0d3cb024eeb82f30e4dd4
                                                                            • Opcode Fuzzy Hash: 1f91536b9fadee9a954d6b27211a667c8ea56d252377a6a2413d2522efba2367
                                                                            • Instruction Fuzzy Hash: 71611471E04201AFDB25AFB49C81B7E7BA5AF05360F04416EF9C597286DB3A9901B7F0
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00FC5186
                                                                            • ShowWindow.USER32(?,00000000), ref: 00FC51C7
                                                                            • ShowWindow.USER32(?,00000005,?,00000000), ref: 00FC51CD
                                                                            • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00FC51D1
                                                                              • Part of subcall function 00FC6FBA: DeleteObject.GDI32(00000000), ref: 00FC6FE6
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00FC520D
                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00FC521A
                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00FC524D
                                                                            • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00FC5287
                                                                            • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00FC5296
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                            • String ID:
                                                                            • API String ID: 3210457359-0
                                                                            • Opcode ID: de6fce36560383631556a80dde7c62efd7c4b849d4d2720910e98973b9df669f
                                                                            • Instruction ID: 69b27162bb7fadfa40e1169b71e1c7a93656fe00b9e9c27203b0018bb28b23a5
                                                                            • Opcode Fuzzy Hash: de6fce36560383631556a80dde7c62efd7c4b849d4d2720910e98973b9df669f
                                                                            • Instruction Fuzzy Hash: 97519E30E40A0ABEEB209F24CE4BFD93BA5EB05B24F584009F519962E1C375B9C0FB40
                                                                            APIs
                                                                            • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00F86890
                                                                            • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00F868A9
                                                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00F868B9
                                                                            • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00F868D1
                                                                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00F868F2
                                                                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00F48874,00000000,00000000,00000000,000000FF,00000000), ref: 00F86901
                                                                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00F8691E
                                                                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00F48874,00000000,00000000,00000000,000000FF,00000000), ref: 00F8692D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                            • String ID:
                                                                            • API String ID: 1268354404-0
                                                                            • Opcode ID: a91ba30bdeef007cbd74a9d76a10ac04f58d78544bd00eeea10bf5bdaaeef7dc
                                                                            • Instruction ID: bf2628e696e8e071abaa49ecee489cc53f579910cff3b8689a848d4febb3d969
                                                                            • Opcode Fuzzy Hash: a91ba30bdeef007cbd74a9d76a10ac04f58d78544bd00eeea10bf5bdaaeef7dc
                                                                            • Instruction Fuzzy Hash: BC515970A00209EFDB20DF24CD46FAA7BB5EF88760F104518F95AD72A0DB75E991EB50
                                                                            APIs
                                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00FAC182
                                                                            • GetLastError.KERNEL32 ref: 00FAC195
                                                                            • SetEvent.KERNEL32(?), ref: 00FAC1A9
                                                                              • Part of subcall function 00FAC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00FAC272
                                                                              • Part of subcall function 00FAC253: GetLastError.KERNEL32 ref: 00FAC322
                                                                              • Part of subcall function 00FAC253: SetEvent.KERNEL32(?), ref: 00FAC336
                                                                              • Part of subcall function 00FAC253: InternetCloseHandle.WININET(00000000), ref: 00FAC341
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                            • String ID:
                                                                            • API String ID: 337547030-0
                                                                            • Opcode ID: e4ba750544614502097c1c7d6ea8f41dcbd64d00c53f0cbe6a37bf2a70831f24
                                                                            • Instruction ID: fef2b9b27d6cb90788aa66820ddd76754683bf261d03f1c927f879a7a0c5b3ef
                                                                            • Opcode Fuzzy Hash: e4ba750544614502097c1c7d6ea8f41dcbd64d00c53f0cbe6a37bf2a70831f24
                                                                            • Instruction Fuzzy Hash: 42319EB1600609AFDB219FA5DE44BA6BBF8FF5A310B04441EF95A83610D731E814FBE0
                                                                            APIs
                                                                              • Part of subcall function 00F93A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F93A57
                                                                              • Part of subcall function 00F93A3D: GetCurrentThreadId.KERNEL32 ref: 00F93A5E
                                                                              • Part of subcall function 00F93A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F925B3), ref: 00F93A65
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F925BD
                                                                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00F925DB
                                                                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00F925DF
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F925E9
                                                                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00F92601
                                                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00F92605
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F9260F
                                                                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00F92623
                                                                            • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00F92627
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                            • String ID:
                                                                            • API String ID: 2014098862-0
                                                                            • Opcode ID: d405738c91864bc60abce1fe172088f1197b9e11d18e9f6b71cb0829ecda509e
                                                                            • Instruction ID: 06e3e566138b5313533b337b893cf5c0ee6e0568f8dde6f5255fa5047e2e5b9b
                                                                            • Opcode Fuzzy Hash: d405738c91864bc60abce1fe172088f1197b9e11d18e9f6b71cb0829ecda509e
                                                                            • Instruction Fuzzy Hash: 2F01D431790214BBFB20676A9C8BF593F59DB4EB12F110001F31CAF1D2C9F22444AAA9
                                                                            APIs
                                                                            • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00F91449,?,?,00000000), ref: 00F9180C
                                                                            • HeapAlloc.KERNEL32(00000000,?,00F91449,?,?,00000000), ref: 00F91813
                                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F91449,?,?,00000000), ref: 00F91828
                                                                            • GetCurrentProcess.KERNEL32(?,00000000,?,00F91449,?,?,00000000), ref: 00F91830
                                                                            • DuplicateHandle.KERNEL32(00000000,?,00F91449,?,?,00000000), ref: 00F91833
                                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F91449,?,?,00000000), ref: 00F91843
                                                                            • GetCurrentProcess.KERNEL32(00F91449,00000000,?,00F91449,?,?,00000000), ref: 00F9184B
                                                                            • DuplicateHandle.KERNEL32(00000000,?,00F91449,?,?,00000000), ref: 00F9184E
                                                                            • CreateThread.KERNEL32(00000000,00000000,00F91874,00000000,00000000,00000000), ref: 00F91868
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                            • String ID:
                                                                            • API String ID: 1957940570-0
                                                                            • Opcode ID: a6ff852a584debf8b280a1b93f07f61544b7bf7f27ea8643a0dac64e7113351d
                                                                            • Instruction ID: ce7ccccbcb21f1b545234fb10912bfb16a0afcd3dacd343759382562c9b13e96
                                                                            • Opcode Fuzzy Hash: a6ff852a584debf8b280a1b93f07f61544b7bf7f27ea8643a0dac64e7113351d
                                                                            • Instruction Fuzzy Hash: 6F01BFB5240348BFE710AB66DD4EF5B3B6CEB89B11F044411FA05DB192C6759800DB60
                                                                            APIs
                                                                              • Part of subcall function 00F9D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00F9D501
                                                                              • Part of subcall function 00F9D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00F9D50F
                                                                              • Part of subcall function 00F9D4DC: CloseHandle.KERNEL32(00000000), ref: 00F9D5DC
                                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00FBA16D
                                                                            • GetLastError.KERNEL32 ref: 00FBA180
                                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00FBA1B3
                                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 00FBA268
                                                                            • GetLastError.KERNEL32(00000000), ref: 00FBA273
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00FBA2C4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                            • String ID: SeDebugPrivilege
                                                                            • API String ID: 2533919879-2896544425
                                                                            • Opcode ID: 52dd98e2366e14d98656f295b29992a76f235aba22db7b672c65af3d784cdeb5
                                                                            • Instruction ID: b02c4c8c95f4d0adeb9e1e462024e4247f1767a7260c913005f0d4fb3ff40372
                                                                            • Opcode Fuzzy Hash: 52dd98e2366e14d98656f295b29992a76f235aba22db7b672c65af3d784cdeb5
                                                                            • Instruction Fuzzy Hash: 6161A131604242AFD720DF19C895F55BBE1AF44328F18849CE46A8BBA3C776EC45DF92
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F9BCFD
                                                                            • IsMenu.USER32(00000000), ref: 00F9BD1D
                                                                            • CreatePopupMenu.USER32 ref: 00F9BD53
                                                                            • GetMenuItemCount.USER32(01165C80), ref: 00F9BDA4
                                                                            • InsertMenuItemW.USER32(01165C80,?,00000001,00000030), ref: 00F9BDCC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                            • String ID: 0$2
                                                                            • API String ID: 93392585-3793063076
                                                                            • Opcode ID: cba4152e251c85fdccad1f063f6a823e8c4f63a883ce65b0e481dcce89cf3f9e
                                                                            • Instruction ID: 0e61719ab0a0819842d873e2f3b089500d1b598d690836901d0e568f4a3cf600
                                                                            • Opcode Fuzzy Hash: cba4152e251c85fdccad1f063f6a823e8c4f63a883ce65b0e481dcce89cf3f9e
                                                                            • Instruction Fuzzy Hash: 2C51D170A00209DBFF11CFA9EA88BAEBBF4FF45324F14411AE405D7290D7749941EB91
                                                                            APIs
                                                                            • LoadIconW.USER32(00000000,00007F03), ref: 00F9C913
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: IconLoad
                                                                            • String ID: blank$info$question$stop$warning
                                                                            • API String ID: 2457776203-404129466
                                                                            • Opcode ID: d418944562558cc12c77e9038faa1a4574b3bf4dd51b8a84a5ff8c6afae70c38
                                                                            • Instruction ID: 827c8d7fe599e0b04276fd26ba134b590669fcabfa8be543fef3a14bcc821457
                                                                            • Opcode Fuzzy Hash: d418944562558cc12c77e9038faa1a4574b3bf4dd51b8a84a5ff8c6afae70c38
                                                                            • Instruction Fuzzy Hash: 59110033A8930ABAFF056B549C83DAA7B9CDF15769B10002AF604E6192DB74AD4073E5
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                            • String ID: 0.0.0.0
                                                                            • API String ID: 642191829-3771769585
                                                                            • Opcode ID: 1cdc6ed60ce5a52880f22f52fe755e6df12b3b95dc4048a9ea1580f552850f8c
                                                                            • Instruction ID: d34fa532e441afb71486a62143c4ec39690239e0a56ebedc6d9167006e734e9e
                                                                            • Opcode Fuzzy Hash: 1cdc6ed60ce5a52880f22f52fe755e6df12b3b95dc4048a9ea1580f552850f8c
                                                                            • Instruction Fuzzy Hash: C4113671800109ABDF24BB60DC0BEEF37ACDF10721F110169F50997091EF749A84BAA0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$LocalTime
                                                                            • String ID:
                                                                            • API String ID: 952045576-0
                                                                            • Opcode ID: a0f7e5e9f7d4d00d0b9771717efb8663b4049cd28b6b057da1f1a6c38c6e415c
                                                                            • Instruction ID: 39171252ec8f187d48992d126f802ad34ea456cae342bf39270cdf8da945fd72
                                                                            • Opcode Fuzzy Hash: a0f7e5e9f7d4d00d0b9771717efb8663b4049cd28b6b057da1f1a6c38c6e415c
                                                                            • Instruction Fuzzy Hash: A941B265C1021875DF11EBF48C8A9CFB7B8EF45311F508466EA18E3122FB38E249D3A5
                                                                            APIs
                                                                            • ShowWindow.USER32(FFFFFFFF,?,?,?,?,?,00000005,?,?,00F4F8B0,00000005,00000000), ref: 00F4F953
                                                                            • ShowWindow.USER32(FFFFFFFF,00000006,?,?,?,?,00000005,?,?,00F4F8B0,00000005,00000000), ref: 00F8F3D1
                                                                            • ShowWindow.USER32(FFFFFFFF,?,?,?,?,?,00000005,?,?,00F4F8B0,00000005,00000000), ref: 00F8F454
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ShowWindow
                                                                            • String ID:
                                                                            • API String ID: 1268545403-0
                                                                            • Opcode ID: bf60cd3a61fe0f655412e55c30edb87e4501d8894395e3537eb113ebb6c109e6
                                                                            • Instruction ID: ff0cd6909c41fd8ee0396dabbab53e08f7effb3d49b604922d9575ab560d859b
                                                                            • Opcode Fuzzy Hash: bf60cd3a61fe0f655412e55c30edb87e4501d8894395e3537eb113ebb6c109e6
                                                                            • Instruction Fuzzy Hash: 9E413B31A18640BED7399F28CD88B6A7F91AF56320F14443DE88F53660C732A888FB51
                                                                            APIs
                                                                            • DeleteObject.GDI32(00000000), ref: 00FC2D1B
                                                                            • GetDC.USER32(00000000), ref: 00FC2D23
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FC2D2E
                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 00FC2D3A
                                                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00FC2D76
                                                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00FC2D87
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00FC5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00FC2DC2
                                                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00FC2DE1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 3864802216-0
                                                                            • Opcode ID: 5b3de7f600d99fa2f699bbd0c12e164d7ad65a2bc6f29f56a1086ddbb73076cf
                                                                            • Instruction ID: 1df263becc5009b442f24b95207ba55718f795c6955a319820b7bee4ee98c451
                                                                            • Opcode Fuzzy Hash: 5b3de7f600d99fa2f699bbd0c12e164d7ad65a2bc6f29f56a1086ddbb73076cf
                                                                            • Instruction Fuzzy Hash: 3B318B72201214BFEB118F548E8AFEB3BA9EF59721F084055FE099B291C6759C41DBA0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _memcmp
                                                                            • String ID:
                                                                            • API String ID: 2931989736-0
                                                                            • Opcode ID: 0f07bcf1d6cb21f5e8eab80baf54bbc3e85b81d8f5ba53ac9ee75cfb7d3ecc93
                                                                            • Instruction ID: 83d55d4e5326150de52a84ca164190786bada12305a5a498d99994093df9cc15
                                                                            • Opcode Fuzzy Hash: 0f07bcf1d6cb21f5e8eab80baf54bbc3e85b81d8f5ba53ac9ee75cfb7d3ecc93
                                                                            • Instruction Fuzzy Hash: 52213A62F4090A77FA159D208E93FBA734DBF51B91F400024FE049A541F724FE18B7A6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: NULL Pointer assignment$Not an Object type
                                                                            • API String ID: 0-572801152
                                                                            • Opcode ID: 44101eb7786fbb970139b5d3724655a22747fd81021fb3c89fc287d3e02f26fd
                                                                            • Instruction ID: e67c65d8a13b8ca435ddd919b18ac7848cb12bfe9e7744cc8c47259162e6f17b
                                                                            • Opcode Fuzzy Hash: 44101eb7786fbb970139b5d3724655a22747fd81021fb3c89fc287d3e02f26fd
                                                                            • Instruction Fuzzy Hash: 1BD1EC71A0060AAFDF10DFA9C880BEEB7B5BF48754F148069E915AB280E774DD45DFA0
                                                                            APIs
                                                                            • GetCPInfo.KERNEL32(?,?), ref: 00F715CE
                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00F71651
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F716E4
                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00F716FB
                                                                              • Part of subcall function 00F63820: RtlAllocateHeap.NTDLL(00000000,?,01001444,?,00F4FDF5,?,?,00F3A976,00000010,01001440,00F313FC,?,00F313C6,?,00F31129), ref: 00F63852
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F71777
                                                                            • __freea.LIBCMT ref: 00F717A2
                                                                            • __freea.LIBCMT ref: 00F717AE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                            • String ID:
                                                                            • API String ID: 2829977744-0
                                                                            • Opcode ID: 9fb93cf540668aa19f5110a743e8f913f88fe02be32ba3005e4d76b080ecde18
                                                                            • Instruction ID: c355d6a0854e5fef48adfa5a83f3fd6fa7b75be8c114fd17bc4825693d8c5b1b
                                                                            • Opcode Fuzzy Hash: 9fb93cf540668aa19f5110a743e8f913f88fe02be32ba3005e4d76b080ecde18
                                                                            • Instruction Fuzzy Hash: 2C91E972E002165ADF288E7CCC41EEE7BB5BF45720F18865AE809E7140D735DD49E7A2
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInit
                                                                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                            • API String ID: 2610073882-625585964
                                                                            • Opcode ID: 312d84e09f280afffc34c17b6098f924fe9da3761646bae1de57daaead6957c3
                                                                            • Instruction ID: 58adcbcaa3e07216c8e19873b7213d93130a4f85e21e5a84d83824af8c521fe0
                                                                            • Opcode Fuzzy Hash: 312d84e09f280afffc34c17b6098f924fe9da3761646bae1de57daaead6957c3
                                                                            • Instruction Fuzzy Hash: CA918271E00219ABDF20CF66C944FEEBBB9AF45720F108559E505AB282D770A945DFA0
                                                                            APIs
                                                                            • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00FA125C
                                                                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00FA1284
                                                                            • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00FA12A8
                                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00FA12D8
                                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00FA135F
                                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00FA13C4
                                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00FA1430
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                            • String ID:
                                                                            • API String ID: 2550207440-0
                                                                            • Opcode ID: 5128f450fba227871a9a28dc9eaea11ff6983f7edfd78113ae10de96c6f6e317
                                                                            • Instruction ID: fac13f3e811d0e54b938b7b9a742abac063dc05f1aec0379687a03ebeb524c2b
                                                                            • Opcode Fuzzy Hash: 5128f450fba227871a9a28dc9eaea11ff6983f7edfd78113ae10de96c6f6e317
                                                                            • Instruction Fuzzy Hash: 9691E6B1E002099FDB00DF98C885BBE77B5FF46325F164029E941EB291D778E945EB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ObjectSelect$BeginCreatePath
                                                                            • String ID:
                                                                            • API String ID: 3225163088-0
                                                                            • Opcode ID: 5dae07ea525b743813cd26840e974860c7ea799bac5a0f18f93977ed48b7846a
                                                                            • Instruction ID: 88fa6172958918ca1419e835d425b4355d02cf37769c299c72b3d5da56e6afef
                                                                            • Opcode Fuzzy Hash: 5dae07ea525b743813cd26840e974860c7ea799bac5a0f18f93977ed48b7846a
                                                                            • Instruction Fuzzy Hash: 01912871E44219AFCB10DFA9CC84AEEBFB8FF49320F244159E915B7251D378A941EB60
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 00FB396B
                                                                            • CharUpperBuffW.USER32(?,?), ref: 00FB3A7A
                                                                            • _wcslen.LIBCMT ref: 00FB3A8A
                                                                            • VariantClear.OLEAUT32(?), ref: 00FB3C1F
                                                                              • Part of subcall function 00FA0CDF: VariantInit.OLEAUT32(00000000), ref: 00FA0D1F
                                                                              • Part of subcall function 00FA0CDF: VariantCopy.OLEAUT32(?,?), ref: 00FA0D28
                                                                              • Part of subcall function 00FA0CDF: VariantClear.OLEAUT32(?), ref: 00FA0D34
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                            • API String ID: 4137639002-1221869570
                                                                            • Opcode ID: 0989ea8c6d0c7ccda54a1fd939b6ac90b6ab5bb8f30e450c8a70efcfee0b44ae
                                                                            • Instruction ID: 94c5b8781c4eff2b0e30bac6a968ff606a1de6f42630eacc59e5225866a13ce3
                                                                            • Opcode Fuzzy Hash: 0989ea8c6d0c7ccda54a1fd939b6ac90b6ab5bb8f30e450c8a70efcfee0b44ae
                                                                            • Instruction Fuzzy Hash: 47913675A083059FC704EF25C88196AB7E5BF88324F14892DF88997351DB34EE45EF92
                                                                            APIs
                                                                              • Part of subcall function 00F9000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F8FF41,80070057,?,?,?,00F9035E), ref: 00F9002B
                                                                              • Part of subcall function 00F9000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F8FF41,80070057,?,?), ref: 00F90046
                                                                              • Part of subcall function 00F9000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F8FF41,80070057,?,?), ref: 00F90054
                                                                              • Part of subcall function 00F9000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F8FF41,80070057,?), ref: 00F90064
                                                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00FB4C51
                                                                            • _wcslen.LIBCMT ref: 00FB4D59
                                                                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00FB4DCF
                                                                            • CoTaskMemFree.OLE32(?), ref: 00FB4DDA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                            • String ID: NULL Pointer assignment
                                                                            • API String ID: 614568839-2785691316
                                                                            • Opcode ID: b0e300ec7ef065fcbbc514f1caa359b92cda2067cc70a2616502c603e42cc0b0
                                                                            • Instruction ID: e30c6d2a873ff69eb17a38e74bf793399945412841a283dac941502e25bc3fdf
                                                                            • Opcode Fuzzy Hash: b0e300ec7ef065fcbbc514f1caa359b92cda2067cc70a2616502c603e42cc0b0
                                                                            • Instruction Fuzzy Hash: AE911671D0021DAFDF14DFA5CC91AEEB7B8BF48310F108169E915A7291DB74AA44EFA0
                                                                            APIs
                                                                            • GetMenu.USER32(?), ref: 00FC2183
                                                                            • GetMenuItemCount.USER32(00000000), ref: 00FC21B5
                                                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00FC21DD
                                                                            • _wcslen.LIBCMT ref: 00FC2213
                                                                            • GetMenuItemID.USER32(?,?), ref: 00FC224D
                                                                            • GetSubMenu.USER32(?,?), ref: 00FC225B
                                                                              • Part of subcall function 00F93A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F93A57
                                                                              • Part of subcall function 00F93A3D: GetCurrentThreadId.KERNEL32 ref: 00F93A5E
                                                                              • Part of subcall function 00F93A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F925B3), ref: 00F93A65
                                                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00FC22E3
                                                                              • Part of subcall function 00F9E97B: Sleep.KERNEL32 ref: 00F9E9F3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                            • String ID:
                                                                            • API String ID: 4196846111-0
                                                                            • Opcode ID: c8992d118db4b69f63e474608d94486fd79e16d8c80a5f80da998ef943ff92b9
                                                                            • Instruction ID: fca90c13dc46fdff3ec4498fa4246aea8f6052bb9046697920af51f5db19a856
                                                                            • Opcode Fuzzy Hash: c8992d118db4b69f63e474608d94486fd79e16d8c80a5f80da998ef943ff92b9
                                                                            • Instruction Fuzzy Hash: 40718E75E00206AFDB54EF64C942FAEB7F1EF48320F148459E816EB341D738AD41AB90
                                                                            APIs
                                                                            • IsWindow.USER32(01165B40), ref: 00FC7F37
                                                                            • IsWindowEnabled.USER32(01165B40), ref: 00FC7F43
                                                                            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00FC801E
                                                                            • SendMessageW.USER32(01165B40,000000B0,?,?), ref: 00FC8051
                                                                            • IsDlgButtonChecked.USER32(?,?), ref: 00FC8089
                                                                            • GetWindowLongW.USER32(01165B40,000000EC), ref: 00FC80AB
                                                                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00FC80C3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                            • String ID:
                                                                            • API String ID: 4072528602-0
                                                                            • Opcode ID: a7c9d5c89eb35499d845a01c9883ac1d155b951869c30c00dbbafd3939fd442d
                                                                            • Instruction ID: bd51882eb656ea21542f2eafa2c4330420c1156ea6f0821bb3e8b6c3fda23153
                                                                            • Opcode Fuzzy Hash: a7c9d5c89eb35499d845a01c9883ac1d155b951869c30c00dbbafd3939fd442d
                                                                            • Instruction Fuzzy Hash: 0C71BF34A08346AFEB21AF64CEC6FAABBB5EF09360F14005DE95553251CB31A845FF90
                                                                            APIs
                                                                            • GetParent.USER32(?), ref: 00F9AEF9
                                                                            • GetKeyboardState.USER32(?), ref: 00F9AF0E
                                                                            • SetKeyboardState.USER32(?), ref: 00F9AF6F
                                                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00F9AF9D
                                                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 00F9AFBC
                                                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00F9AFFD
                                                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00F9B020
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                            • String ID:
                                                                            • API String ID: 87235514-0
                                                                            • Opcode ID: 898a758c5ab2a417faf40bc7f9c8a9331b514608025077334aed0470737c4a35
                                                                            • Instruction ID: 1d9dd83d8c2c3e31ea27f98fc55a4fae7bebcd8fd7e38b04e582f279ec8b4e92
                                                                            • Opcode Fuzzy Hash: 898a758c5ab2a417faf40bc7f9c8a9331b514608025077334aed0470737c4a35
                                                                            • Instruction Fuzzy Hash: C851D1A1A047D53DFF3743348D49BBABEA95B06318F088589E1D9458D2C3D9ACC8F791
                                                                            APIs
                                                                            • GetParent.USER32(00000000), ref: 00F9AD19
                                                                            • GetKeyboardState.USER32(?), ref: 00F9AD2E
                                                                            • SetKeyboardState.USER32(?), ref: 00F9AD8F
                                                                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00F9ADBB
                                                                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00F9ADD8
                                                                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00F9AE17
                                                                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00F9AE38
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                            • String ID:
                                                                            • API String ID: 87235514-0
                                                                            • Opcode ID: 42d1c60442cb784ff7be0458aa38a04342d56bbe6c1db5310b3b2ab3c7444861
                                                                            • Instruction ID: c41996d84e70317f353046b2aaca43859b5f1397a88bf9c91e99b7c4ed3d5c84
                                                                            • Opcode Fuzzy Hash: 42d1c60442cb784ff7be0458aa38a04342d56bbe6c1db5310b3b2ab3c7444861
                                                                            • Instruction Fuzzy Hash: CC51D5A1D047D53DFF3793358C55B7A7EA85B46310F088489E1D9468C2D294EC98F7D2
                                                                            APIs
                                                                            • GetConsoleCP.KERNEL32(00F73CD6,?,?,?,?,?,?,?,?,00F65BA3,?,?,00F73CD6,?,?), ref: 00F65470
                                                                            • __fassign.LIBCMT ref: 00F654EB
                                                                            • __fassign.LIBCMT ref: 00F65506
                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00F73CD6,00000005,00000000,00000000), ref: 00F6552C
                                                                            • WriteFile.KERNEL32(?,00F73CD6,00000000,00F65BA3,00000000,?,?,?,?,?,?,?,?,?,00F65BA3,?), ref: 00F6554B
                                                                            • WriteFile.KERNEL32(?,?,00000001,00F65BA3,00000000,?,?,?,?,?,?,?,?,?,00F65BA3,?), ref: 00F65584
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                            • String ID:
                                                                            • API String ID: 1324828854-0
                                                                            • Opcode ID: d42a9af1b3bf286618d9fbeed2ab7ebaf2030c7a0ba37f7a5818f2655aa06e73
                                                                            • Instruction ID: 4d5c1456a2f136d58c50f59d9c43b0430267d5aa722060bf6fa8a63f0cee9254
                                                                            • Opcode Fuzzy Hash: d42a9af1b3bf286618d9fbeed2ab7ebaf2030c7a0ba37f7a5818f2655aa06e73
                                                                            • Instruction Fuzzy Hash: B851DFB1E006499FDB10CFA8D846AEEBBF9EF08710F18411EF946F3291D6309A41DB60
                                                                            APIs
                                                                            • _ValidateLocalCookies.LIBCMT ref: 00F52D4B
                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00F52D53
                                                                            • _ValidateLocalCookies.LIBCMT ref: 00F52DE1
                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00F52E0C
                                                                            • _ValidateLocalCookies.LIBCMT ref: 00F52E61
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                            • String ID: csm
                                                                            • API String ID: 1170836740-1018135373
                                                                            • Opcode ID: c8a663c2390f4e43e973773d04606ebb373973cc707460d5bfb0aeef2f00cc0f
                                                                            • Instruction ID: aa77299c459bc567a4c195cc1a1f228f1b5d5abc269d3407529d1dcd09fce808
                                                                            • Opcode Fuzzy Hash: c8a663c2390f4e43e973773d04606ebb373973cc707460d5bfb0aeef2f00cc0f
                                                                            • Instruction Fuzzy Hash: 9041E834E002089BCF10DF68CC45A9EBBB5BF46326F148255EE146B352D735DA09EBD0
                                                                            APIs
                                                                              • Part of subcall function 00FB304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00FB307A
                                                                              • Part of subcall function 00FB304E: _wcslen.LIBCMT ref: 00FB309B
                                                                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00FB1112
                                                                            • WSAGetLastError.WSOCK32 ref: 00FB1121
                                                                            • WSAGetLastError.WSOCK32 ref: 00FB11C9
                                                                            • closesocket.WSOCK32(00000000), ref: 00FB11F9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                            • String ID:
                                                                            • API String ID: 2675159561-0
                                                                            • Opcode ID: 2a0ef10c9c87fd122812cc3daeea518ef75f3952ad7f2137a419058c82276be4
                                                                            • Instruction ID: b5c976218307d2e1381e8cb5b95845b53b58bca90738b4a8aba6aaf5840bd138
                                                                            • Opcode Fuzzy Hash: 2a0ef10c9c87fd122812cc3daeea518ef75f3952ad7f2137a419058c82276be4
                                                                            • Instruction Fuzzy Hash: 5D41D036600208AFDB109F29CC95BEABBA9FF45364F148059F909AB291C774AD41DFE0
                                                                            APIs
                                                                              • Part of subcall function 00F9DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F9CF22,?), ref: 00F9DDFD
                                                                              • Part of subcall function 00F9DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F9CF22,?), ref: 00F9DE16
                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 00F9CF45
                                                                            • MoveFileW.KERNEL32(?,?), ref: 00F9CF7F
                                                                            • _wcslen.LIBCMT ref: 00F9D005
                                                                            • _wcslen.LIBCMT ref: 00F9D01B
                                                                            • SHFileOperationW.SHELL32(?), ref: 00F9D061
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                            • String ID: \*.*
                                                                            • API String ID: 3164238972-1173974218
                                                                            • Opcode ID: 44f0a99d364e1bc74ef17fc3219208d88c95d082609533be5bf813fa61762c59
                                                                            • Instruction ID: 798038c7c8da9977500c7a0a1551f0061b0ee4cc95e207464b4c97a01ba858f4
                                                                            • Opcode Fuzzy Hash: 44f0a99d364e1bc74ef17fc3219208d88c95d082609533be5bf813fa61762c59
                                                                            • Instruction Fuzzy Hash: 0F415871D051185FEF12EBA4DD81EDDB7B8AF04384F1000E6E509E7141EA74A688DB50
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00FC2E1C
                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00FC2E4F
                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00FC2E84
                                                                            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00FC2EB6
                                                                            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00FC2EE0
                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00FC2EF1
                                                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00FC2F0B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: LongWindow$MessageSend
                                                                            • String ID:
                                                                            • API String ID: 2178440468-0
                                                                            • Opcode ID: a6bac163865a9f5be888c63df0f3e06919d170a28ccf99a38b944aaf13c2a55c
                                                                            • Instruction ID: 8cffeba59296894baebce81cd110e9f7d85ad5971e7da97e64dee41f5b893d1d
                                                                            • Opcode Fuzzy Hash: a6bac163865a9f5be888c63df0f3e06919d170a28ccf99a38b944aaf13c2a55c
                                                                            • Instruction Fuzzy Hash: 6D311931A04156AFDB61DF58DE86FA537E1FB4A720F150168F9449F2A1CB72EC40EB41
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F97769
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F9778F
                                                                            • SysAllocString.OLEAUT32(00000000), ref: 00F97792
                                                                            • SysAllocString.OLEAUT32(?), ref: 00F977B0
                                                                            • SysFreeString.OLEAUT32(?), ref: 00F977B9
                                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 00F977DE
                                                                            • SysAllocString.OLEAUT32(?), ref: 00F977EC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                            • String ID:
                                                                            • API String ID: 3761583154-0
                                                                            • Opcode ID: f8e6235b0db88bcd2ed4a0cbd4bc709ea414c0c2789b7c63a6d3e45ee21c786c
                                                                            • Instruction ID: cc796317202ed4ff2e8db7fd06cc56a432131a937b43d5ef1d38b84e603ce071
                                                                            • Opcode Fuzzy Hash: f8e6235b0db88bcd2ed4a0cbd4bc709ea414c0c2789b7c63a6d3e45ee21c786c
                                                                            • Instruction Fuzzy Hash: 9F21C476A04319AFEF10EFE9CC89DBB77ACEB093647048025F908DB150D670DC45A7A1
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F97842
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F97868
                                                                            • SysAllocString.OLEAUT32(00000000), ref: 00F9786B
                                                                            • SysAllocString.OLEAUT32 ref: 00F9788C
                                                                            • SysFreeString.OLEAUT32 ref: 00F97895
                                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 00F978AF
                                                                            • SysAllocString.OLEAUT32(?), ref: 00F978BD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                            • String ID:
                                                                            • API String ID: 3761583154-0
                                                                            • Opcode ID: 64c239070df873630eada7400e4d7362ba8cd975b436ce56503a95b72c6157af
                                                                            • Instruction ID: 897c6a86ecf36a18a5b75055c2d706635aae71ff2ecb935f3ba1f0e7d60c4c9d
                                                                            • Opcode Fuzzy Hash: 64c239070df873630eada7400e4d7362ba8cd975b436ce56503a95b72c6157af
                                                                            • Instruction Fuzzy Hash: E4217731A14308AFEF10EFA8DC89DAA77ECFB097607148125F915CB1A1D674DC41DB64
                                                                            APIs
                                                                            • GetStdHandle.KERNEL32(0000000C), ref: 00FA04F2
                                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FA052E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHandlePipe
                                                                            • String ID: nul
                                                                            • API String ID: 1424370930-2873401336
                                                                            • Opcode ID: a48ff1ec74a7bdbbc197a68f0ee333138bf94b1f32c0cb059dbcc114a097e150
                                                                            • Instruction ID: f21d93a65fe0dc82b1eb36043876e90b48503e1c300d1c159a3db5e3d67f4d1e
                                                                            • Opcode Fuzzy Hash: a48ff1ec74a7bdbbc197a68f0ee333138bf94b1f32c0cb059dbcc114a097e150
                                                                            • Instruction Fuzzy Hash: 782191B5D003059FDB208F29EC05A9A7BB4AF46760F244A18E8A1D31E0DB709940EF60
                                                                            APIs
                                                                            • GetStdHandle.KERNEL32(000000F6), ref: 00FA05C6
                                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FA0601
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHandlePipe
                                                                            • String ID: nul
                                                                            • API String ID: 1424370930-2873401336
                                                                            • Opcode ID: 42503efe5c6855636095ae7789e8034aad8362f63c81a9c2e836c23228e6679d
                                                                            • Instruction ID: df54424ff4cd0ed0065d456441b41f135855c0deb3ebef8f1fe7c4f48069cf96
                                                                            • Opcode Fuzzy Hash: 42503efe5c6855636095ae7789e8034aad8362f63c81a9c2e836c23228e6679d
                                                                            • Instruction Fuzzy Hash: FD2183B59003059FDB209F69AC05E9A77F4BF96734F200A19F9A1E73E0DB719860EB50
                                                                            APIs
                                                                              • Part of subcall function 00F6D7A3: _free.LIBCMT ref: 00F6D7CC
                                                                            • _free.LIBCMT ref: 00F6D82D
                                                                              • Part of subcall function 00F629C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F6D7D1,00000000,00000000,00000000,00000000,?,00F6D7F8,00000000,00000007,00000000,?,00F6DBF5,00000000), ref: 00F629DE
                                                                              • Part of subcall function 00F629C8: GetLastError.KERNEL32(00000000,?,00F6D7D1,00000000,00000000,00000000,00000000,?,00F6D7F8,00000000,00000007,00000000,?,00F6DBF5,00000000,00000000), ref: 00F629F0
                                                                            • _free.LIBCMT ref: 00F6D838
                                                                            • _free.LIBCMT ref: 00F6D843
                                                                            • _free.LIBCMT ref: 00F6D897
                                                                            • _free.LIBCMT ref: 00F6D8A2
                                                                            • _free.LIBCMT ref: 00F6D8AD
                                                                            • _free.LIBCMT ref: 00F6D8B8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                            • Instruction ID: d650bb73ab1b75fc19b729ebf519ff975ed6d7710430088d82a6002db4b53f5d
                                                                            • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                            • Instruction Fuzzy Hash: F4115B71B40B04AADA25BFB0CC47FCB7BFCAF40740F440825B299A6092DA69B505B662
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00F9DA74
                                                                            • LoadStringW.USER32(00000000), ref: 00F9DA7B
                                                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00F9DA91
                                                                            • LoadStringW.USER32(00000000), ref: 00F9DA98
                                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F9DADC
                                                                            Strings
                                                                            • %s (%d) : ==> %s: %s %s, xrefs: 00F9DAB9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadModuleString$Message
                                                                            • String ID: %s (%d) : ==> %s: %s %s
                                                                            • API String ID: 4072794657-3128320259
                                                                            • Opcode ID: 23d4a50ed12875d37a6ab0c047a63d2119aab1a315a33966e0655725abe4506d
                                                                            • Instruction ID: df3d85e96833a06ef0b816e6c9763479e904a114061c589aa2b3f0e94be33267
                                                                            • Opcode Fuzzy Hash: 23d4a50ed12875d37a6ab0c047a63d2119aab1a315a33966e0655725abe4506d
                                                                            • Instruction Fuzzy Hash: 280117F650020C7FEB11EBA49E8AEE7766CDB04701F404455F749E2041EA749E856F75
                                                                            APIs
                                                                            • InterlockedExchange.KERNEL32(0115DAC0,0115DAC0), ref: 00FA097B
                                                                            • EnterCriticalSection.KERNEL32(0115DAA0,00000000), ref: 00FA098D
                                                                            • TerminateThread.KERNEL32(0115DAB8,000001F6), ref: 00FA099B
                                                                            • WaitForSingleObject.KERNEL32(0115DAB8,000003E8), ref: 00FA09A9
                                                                            • CloseHandle.KERNEL32(0115DAB8), ref: 00FA09B8
                                                                            • InterlockedExchange.KERNEL32(0115DAC0,000001F6), ref: 00FA09C8
                                                                            • LeaveCriticalSection.KERNEL32(0115DAA0), ref: 00FA09CF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                            • String ID:
                                                                            • API String ID: 3495660284-0
                                                                            • Opcode ID: 5a2c2b89bcbfcde72cf81ccc04067a09d1a0f38b106c0385c0904bc696f4baed
                                                                            • Instruction ID: b13c9852d3bcff426178ce099224bb39a5ff3944b79f181bebb6ce438f9e4f68
                                                                            • Opcode Fuzzy Hash: 5a2c2b89bcbfcde72cf81ccc04067a09d1a0f38b106c0385c0904bc696f4baed
                                                                            • Instruction Fuzzy Hash: 5DF01972442A06BBD7415BA4EF8AED6BA39FF06712F402025F206928A0CB759465EFD0
                                                                            APIs
                                                                            • GetClientRect.USER32(?,?), ref: 00F35D30
                                                                            • GetWindowRect.USER32(?,?), ref: 00F35D71
                                                                            • ScreenToClient.USER32(?,?), ref: 00F35D99
                                                                            • GetClientRect.USER32(?,?), ref: 00F35ED7
                                                                            • GetWindowRect.USER32(?,?), ref: 00F35EF8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$Client$Window$Screen
                                                                            • String ID:
                                                                            • API String ID: 1296646539-0
                                                                            • Opcode ID: 69886b21d9eb3343aab4e6884466c18856ac9cdef58e31bb6452c2d0665d696a
                                                                            • Instruction ID: 0fcf1b24f651401454c33e10509d9f3dc5aa27d8b27c127de2a66b2f337702f8
                                                                            • Opcode Fuzzy Hash: 69886b21d9eb3343aab4e6884466c18856ac9cdef58e31bb6452c2d0665d696a
                                                                            • Instruction Fuzzy Hash: 0DB17A35A0074ADBDB10CFA9C5807EEB7F1FF48320F14841AE8A9D7250DB34AA91EB55
                                                                            APIs
                                                                            • __allrem.LIBCMT ref: 00F600BA
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F600D6
                                                                            • __allrem.LIBCMT ref: 00F600ED
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F6010B
                                                                            • __allrem.LIBCMT ref: 00F60122
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F60140
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                            • String ID:
                                                                            • API String ID: 1992179935-0
                                                                            • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                            • Instruction ID: 58678b1a9af3c042052dfda87c743ecbaf68b50661eb5899ee5a7509716764ac
                                                                            • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                            • Instruction Fuzzy Hash: 0581F672A00706ABE7249F78CC41B6B73E9AF42334F24463AF951D7681EB74D948B790
                                                                            APIs
                                                                              • Part of subcall function 00FB3149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,00FB101C,00000000,?,?,00000000), ref: 00FB3195
                                                                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00FB1DC0
                                                                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00FB1DE1
                                                                            • WSAGetLastError.WSOCK32 ref: 00FB1DF2
                                                                            • inet_ntoa.WSOCK32(?), ref: 00FB1E8C
                                                                            • htons.WSOCK32(?,?,?,?,?), ref: 00FB1EDB
                                                                            • _strlen.LIBCMT ref: 00FB1F35
                                                                              • Part of subcall function 00F939E8: _strlen.LIBCMT ref: 00F939F2
                                                                              • Part of subcall function 00F36D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,00F4CF58,?,?,?), ref: 00F36DBA
                                                                              • Part of subcall function 00F36D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,00F4CF58,?,?,?), ref: 00F36DED
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                                            • String ID:
                                                                            • API String ID: 1923757996-0
                                                                            • Opcode ID: 8327ebaad63b5c93e2f4315cf800812d658ec9ae6b2605f9bd340134848d98d6
                                                                            • Instruction ID: f411383df65eccaf937b0551690ec13984b6095cd45aa47dce3ac0df2f8387cd
                                                                            • Opcode Fuzzy Hash: 8327ebaad63b5c93e2f4315cf800812d658ec9ae6b2605f9bd340134848d98d6
                                                                            • Instruction Fuzzy Hash: 55A1E031604300AFC320DF21CCA5F6A7BA5BF84328F94894CF5565B2A2CB75ED46EB91
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00F582D9,00F582D9,?,?,?,00F6644F,00000001,00000001,8BE85006), ref: 00F66258
                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00F6644F,00000001,00000001,8BE85006,?,?,?), ref: 00F662DE
                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00F663D8
                                                                            • __freea.LIBCMT ref: 00F663E5
                                                                              • Part of subcall function 00F63820: RtlAllocateHeap.NTDLL(00000000,?,01001444,?,00F4FDF5,?,?,00F3A976,00000010,01001440,00F313FC,?,00F313C6,?,00F31129), ref: 00F63852
                                                                            • __freea.LIBCMT ref: 00F663EE
                                                                            • __freea.LIBCMT ref: 00F66413
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1414292761-0
                                                                            • Opcode ID: f6a5a3dfacb4b755b3fbdcac2cea45d04834f8cc7e21b20d569e6b5817b809f9
                                                                            • Instruction ID: 661cffd7ce330cc872c56ed4ce8c86223a28083d6fdd07e81600f501186a2267
                                                                            • Opcode Fuzzy Hash: f6a5a3dfacb4b755b3fbdcac2cea45d04834f8cc7e21b20d569e6b5817b809f9
                                                                            • Instruction Fuzzy Hash: AE51C372A00216ABDF258F64DD82EBF77A9EF44760F15462AFC05D7240EB34DC44E6A0
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                              • Part of subcall function 00FBC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FBB6AE,?,?), ref: 00FBC9B5
                                                                              • Part of subcall function 00FBC998: _wcslen.LIBCMT ref: 00FBC9F1
                                                                              • Part of subcall function 00FBC998: _wcslen.LIBCMT ref: 00FBCA68
                                                                              • Part of subcall function 00FBC998: _wcslen.LIBCMT ref: 00FBCA9E
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FBBCCA
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FBBD25
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00FBBD6A
                                                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00FBBD99
                                                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00FBBDF3
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00FBBDFF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                            • String ID:
                                                                            • API String ID: 1120388591-0
                                                                            • Opcode ID: 9d1da0831895c156659ddb46e8adf2092a642e7ee1aaf41ec2eebb25ec31b8e4
                                                                            • Instruction ID: 7d869a2b9a01da0c2bd4e7deedfe650e886c982b2a96a3cd6fa4d36ca040e6bd
                                                                            • Opcode Fuzzy Hash: 9d1da0831895c156659ddb46e8adf2092a642e7ee1aaf41ec2eebb25ec31b8e4
                                                                            • Instruction Fuzzy Hash: E381BC71608241AFC714DF25C881E6ABBE5FF84318F14895CF4998B2A2CB75ED05EF92
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(00000035), ref: 00F8F7B9
                                                                            • SysAllocString.OLEAUT32(00000001), ref: 00F8F860
                                                                            • VariantCopy.OLEAUT32(00F8FA64,00000000), ref: 00F8F889
                                                                            • VariantClear.OLEAUT32(00F8FA64), ref: 00F8F8AD
                                                                            • VariantCopy.OLEAUT32(00F8FA64,00000000), ref: 00F8F8B1
                                                                            • VariantClear.OLEAUT32(?), ref: 00F8F8BB
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearCopy$AllocInitString
                                                                            • String ID:
                                                                            • API String ID: 3859894641-0
                                                                            • Opcode ID: ea214a1cbdf64d1a2c5643def45322ee16266fd00839d183385769e461eb9403
                                                                            • Instruction ID: db98c6b59cd22b95452b3a137c449cc956cb3b4e92d049a2c02fd263c1ece836
                                                                            • Opcode Fuzzy Hash: ea214a1cbdf64d1a2c5643def45322ee16266fd00839d183385769e461eb9403
                                                                            • Instruction Fuzzy Hash: D751D932A00310BEDF14BF65DC96BA9B3A4EF45320F249466E905DF291DB748C48E7A6
                                                                            APIs
                                                                              • Part of subcall function 00F37620: _wcslen.LIBCMT ref: 00F37625
                                                                              • Part of subcall function 00F36B57: _wcslen.LIBCMT ref: 00F36B6A
                                                                            • GetOpenFileNameW.COMDLG32(00000058), ref: 00FA94E5
                                                                            • _wcslen.LIBCMT ref: 00FA9506
                                                                            • _wcslen.LIBCMT ref: 00FA952D
                                                                            • GetSaveFileNameW.COMDLG32(00000058), ref: 00FA9585
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$FileName$OpenSave
                                                                            • String ID: X
                                                                            • API String ID: 83654149-3081909835
                                                                            • Opcode ID: 93d00e17fff04eccca06d6ebd704267e99e4f7d17d846ee5cae2f04ef2c26287
                                                                            • Instruction ID: fb3f2075051f50f42c67a6834994d7e0d2bb76a5c31450503cbe2922ea8c72be
                                                                            • Opcode Fuzzy Hash: 93d00e17fff04eccca06d6ebd704267e99e4f7d17d846ee5cae2f04ef2c26287
                                                                            • Instruction Fuzzy Hash: 4EE1A4719083409FC724DF24C881B6AB7E4BF85324F08856DF8899B2A2DB75ED05DB92
                                                                            APIs
                                                                              • Part of subcall function 00F49BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00F49BB2
                                                                            • BeginPaint.USER32(?,?,?), ref: 00F49241
                                                                            • GetWindowRect.USER32(?,?), ref: 00F492A5
                                                                            • ScreenToClient.USER32(?,?), ref: 00F492C2
                                                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00F492D3
                                                                            • EndPaint.USER32(?,?,?,?,?), ref: 00F49321
                                                                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00F871EA
                                                                              • Part of subcall function 00F49339: BeginPath.GDI32(00000000), ref: 00F49357
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                            • String ID:
                                                                            • API String ID: 3050599898-0
                                                                            • Opcode ID: 0c246fef1cc3a881da84d4e74ebeea32ddd29bca5d46d24695972a2acfcb03e3
                                                                            • Instruction ID: 545b6b04968487f833eca11160505099abafa373a5eea883581d5b3943a866c9
                                                                            • Opcode Fuzzy Hash: 0c246fef1cc3a881da84d4e74ebeea32ddd29bca5d46d24695972a2acfcb03e3
                                                                            • Instruction Fuzzy Hash: 5B419131608301AFD721EF24CC89FBB7BA8EF46320F140269F998872E1C7759945EB61
                                                                            APIs
                                                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 00FA080C
                                                                            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00FA0847
                                                                            • EnterCriticalSection.KERNEL32(?), ref: 00FA0863
                                                                            • LeaveCriticalSection.KERNEL32(?), ref: 00FA08DC
                                                                            • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00FA08F3
                                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FA0921
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                            • String ID:
                                                                            • API String ID: 3368777196-0
                                                                            • Opcode ID: aace6ead36f306f03ac2c42d19b69e1ca4382648410966ee2dda28674216b3d2
                                                                            • Instruction ID: 98d948fc84e3f77e3259e5ac559735b81e95e7d384df232913599d448724e8d6
                                                                            • Opcode Fuzzy Hash: aace6ead36f306f03ac2c42d19b69e1ca4382648410966ee2dda28674216b3d2
                                                                            • Instruction Fuzzy Hash: B7417C71900209EFDF149F54DC85AAAB7B8FF05310F1440A9ED049B297DB34DE65EBA4
                                                                            APIs
                                                                            • ShowWindow.USER32(?,00000000,?,?,?,?,00F86C2A), ref: 00FC824C
                                                                            • EnableWindow.USER32(00000000,00000000), ref: 00FC8272
                                                                            • ShowWindow.USER32(?,00000000,?,?,?,?,00F86C2A), ref: 00FC82D1
                                                                            • ShowWindow.USER32(00000000,00000004,?,?,?,?,00F86C2A), ref: 00FC82E5
                                                                            • EnableWindow.USER32(00000000,00000001), ref: 00FC830B
                                                                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00FC832F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Show$Enable$MessageSend
                                                                            • String ID:
                                                                            • API String ID: 642888154-0
                                                                            • Opcode ID: 9f2bfdf7c161bbfc78181579a81a0680b54aad369af3a07a06f4faaf45f96cbc
                                                                            • Instruction ID: ce1ed3d66f1645423ede8ba1bd3d08d3c20f4774d7f754127d66d38f2df23064
                                                                            • Opcode Fuzzy Hash: 9f2bfdf7c161bbfc78181579a81a0680b54aad369af3a07a06f4faaf45f96cbc
                                                                            • Instruction Fuzzy Hash: E341B934A01645EFDB22CF15CA8AFE47BE0FB06764F18516DE5484F262CB32A842EF50
                                                                            APIs
                                                                            • IsWindowVisible.USER32(?), ref: 00F94C95
                                                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00F94CB2
                                                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00F94CEA
                                                                            • _wcslen.LIBCMT ref: 00F94D08
                                                                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00F94D10
                                                                            • _wcsstr.LIBVCRUNTIME ref: 00F94D1A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                            • String ID:
                                                                            • API String ID: 72514467-0
                                                                            • Opcode ID: c7e6ec4d9607032f06afde41200f15c5a326b7e0a17badc23a5ec39fa2d67fbf
                                                                            • Instruction ID: ca75e8ab7f81fc78c8bc3ce2b6c9a834c93541015d93d3956fabb2b3480534a4
                                                                            • Opcode Fuzzy Hash: c7e6ec4d9607032f06afde41200f15c5a326b7e0a17badc23a5ec39fa2d67fbf
                                                                            • Instruction Fuzzy Hash: B4212936A042047BFF155B35ED0AE7B7F9CDF55760F10402AF809CB191EA65EC01B6A0
                                                                            APIs
                                                                              • Part of subcall function 00F33AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F33A97,?,?,00F32E7F,?,?,?,00000000), ref: 00F33AC2
                                                                            • _wcslen.LIBCMT ref: 00FA587B
                                                                            • CoInitialize.OLE32(00000000), ref: 00FA5995
                                                                            • CoCreateInstance.OLE32(00FCFCF8,00000000,00000001,00FCFB68,?), ref: 00FA59AE
                                                                            • CoUninitialize.OLE32 ref: 00FA59CC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                            • String ID: .lnk
                                                                            • API String ID: 3172280962-24824748
                                                                            • Opcode ID: 696904c6f9f25b335417546040b45a6984a56e7b00d98044bad99af8be55b215
                                                                            • Instruction ID: 398e7affa00d16a19d5dc451be9adb73797cd8db24a4da124c3b4d8a889c699c
                                                                            • Opcode Fuzzy Hash: 696904c6f9f25b335417546040b45a6984a56e7b00d98044bad99af8be55b215
                                                                            • Instruction Fuzzy Hash: 0FD166B5A047019FC714DF25C880A2ABBE5FF8AB20F14885DF8899B361D735EC45DB92
                                                                            APIs
                                                                              • Part of subcall function 00F90FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F90FCA
                                                                              • Part of subcall function 00F90FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F90FD6
                                                                              • Part of subcall function 00F90FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F90FE5
                                                                              • Part of subcall function 00F90FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F90FEC
                                                                              • Part of subcall function 00F90FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F91002
                                                                            • GetLengthSid.ADVAPI32(?,00000000,00F91335), ref: 00F917AE
                                                                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00F917BA
                                                                            • HeapAlloc.KERNEL32(00000000), ref: 00F917C1
                                                                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 00F917DA
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000,00F91335), ref: 00F917EE
                                                                            • HeapFree.KERNEL32(00000000), ref: 00F917F5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                            • String ID:
                                                                            • API String ID: 3008561057-0
                                                                            • Opcode ID: df23123833eaaf32221ddbd2587828e9b75b719c07658df5561bf436fab36b5e
                                                                            • Instruction ID: 2d5236ad9d3c61401fbf0c4ffd48a6434aeefe81b675b53bc36e4f5c3c6a62e0
                                                                            • Opcode Fuzzy Hash: df23123833eaaf32221ddbd2587828e9b75b719c07658df5561bf436fab36b5e
                                                                            • Instruction Fuzzy Hash: 7911AC3290020AFFEF119FA5CD4AFAF7BA9FB41365F144028F44597221C739A940EBA0
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00F914FF
                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00F91506
                                                                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00F91515
                                                                            • CloseHandle.KERNEL32(00000004), ref: 00F91520
                                                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F9154F
                                                                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00F91563
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                            • String ID:
                                                                            • API String ID: 1413079979-0
                                                                            • Opcode ID: fa42eaaf1faaeb196f894ccd1dafbe2b027d180b4e63cc8b23bd98b57a74b9d6
                                                                            • Instruction ID: b9444e9c2cc4f2321ac5cd28b7d10830b69c4d2d6b8b850e792eac43d4afa2b1
                                                                            • Opcode Fuzzy Hash: fa42eaaf1faaeb196f894ccd1dafbe2b027d180b4e63cc8b23bd98b57a74b9d6
                                                                            • Instruction Fuzzy Hash: C5111A7250024EABEF12CF98DE49FDA7BA9FF49754F054025FA05A2060C3768E61AB60
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,00F53379,00F52FE5), ref: 00F53390
                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00F5339E
                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00F533B7
                                                                            • SetLastError.KERNEL32(00000000,?,00F53379,00F52FE5), ref: 00F53409
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastValue___vcrt_
                                                                            • String ID:
                                                                            • API String ID: 3852720340-0
                                                                            • Opcode ID: 0c3c7c39c297814cfd10b2e4327c511d60e4356a88d768564804c1040825b960
                                                                            • Instruction ID: 8bfb04a77b69eb68bb435842096da64f7d912c9ac7fbddf3628a0db9fb5e17e4
                                                                            • Opcode Fuzzy Hash: 0c3c7c39c297814cfd10b2e4327c511d60e4356a88d768564804c1040825b960
                                                                            • Instruction Fuzzy Hash: B301B533A09329AEE615277C7D86A663E58DF053FB720022DFE10851F1EF554D0AB588
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,00F65686,00F73CD6,?,00000000,?,00F65B6A,?,?,?,?,?,00F5E6D1,?,00FF8A48), ref: 00F62D78
                                                                            • _free.LIBCMT ref: 00F62DAB
                                                                            • _free.LIBCMT ref: 00F62DD3
                                                                            • SetLastError.KERNEL32(00000000,?,?,?,?,00F5E6D1,?,00FF8A48,00000010,00F34F4A,?,?,00000000,00F73CD6), ref: 00F62DE0
                                                                            • SetLastError.KERNEL32(00000000,?,?,?,?,00F5E6D1,?,00FF8A48,00000010,00F34F4A,?,?,00000000,00F73CD6), ref: 00F62DEC
                                                                            • _abort.LIBCMT ref: 00F62DF2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free$_abort
                                                                            • String ID:
                                                                            • API String ID: 3160817290-0
                                                                            • Opcode ID: 81b5c04f40282a77e11b73b5c8bb2c8a2e9ac8b2965e1a88b8c004082194b095
                                                                            • Instruction ID: 0450a4dc0566e9defa97b2e03db9d944f721e227956adf8889668de538f9fe6b
                                                                            • Opcode Fuzzy Hash: 81b5c04f40282a77e11b73b5c8bb2c8a2e9ac8b2965e1a88b8c004082194b095
                                                                            • Instruction Fuzzy Hash: 43F0C832E05E1527C3923739BD16F6E356DAFC27B1F250519F828931D6EF28880272A0
                                                                            APIs
                                                                              • Part of subcall function 00F49639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F49693
                                                                              • Part of subcall function 00F49639: SelectObject.GDI32(?,00000000), ref: 00F496A2
                                                                              • Part of subcall function 00F49639: BeginPath.GDI32(?), ref: 00F496B9
                                                                              • Part of subcall function 00F49639: SelectObject.GDI32(?,00000000), ref: 00F496E2
                                                                            • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00FC8A4E
                                                                            • LineTo.GDI32(?,00000003,00000000), ref: 00FC8A62
                                                                            • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00FC8A70
                                                                            • LineTo.GDI32(?,00000000,00000003), ref: 00FC8A80
                                                                            • EndPath.GDI32(?), ref: 00FC8A90
                                                                            • StrokePath.GDI32(?), ref: 00FC8AA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                            • String ID:
                                                                            • API String ID: 43455801-0
                                                                            • Opcode ID: 859806fb41bc43775542a447cae9e32963f06a0985b1308590483ff211a33c39
                                                                            • Instruction ID: f850df26a5e1e46ad96711fc6d2467278d67d361d4d15f59cba1a0654929e3b9
                                                                            • Opcode Fuzzy Hash: 859806fb41bc43775542a447cae9e32963f06a0985b1308590483ff211a33c39
                                                                            • Instruction Fuzzy Hash: AE11097644010DFFDB129F90DD89EAA7F6CEB08390F048016FA599A1A1C7729D55EFA0
                                                                            APIs
                                                                            • GetDC.USER32(00000000), ref: 00F95218
                                                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 00F95229
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F95230
                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 00F95238
                                                                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00F9524F
                                                                            • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00F95261
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDevice$Release
                                                                            • String ID:
                                                                            • API String ID: 1035833867-0
                                                                            • Opcode ID: 10969ddb90bba011222401d2698ee146da33a389b64b186db9b49753af71e373
                                                                            • Instruction ID: ca30bc7bf841b3472f23890a763e62255cb6f0aff9eff6ab1ce47ef195f88b6d
                                                                            • Opcode Fuzzy Hash: 10969ddb90bba011222401d2698ee146da33a389b64b186db9b49753af71e373
                                                                            • Instruction Fuzzy Hash: BB018475E01708BBEF105BA59D4AE4EBF78EB44751F044065FA08A7280D6709800DBA0
                                                                            APIs
                                                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F31BF4
                                                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00F31BFC
                                                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F31C07
                                                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F31C12
                                                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00F31C1A
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F31C22
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual
                                                                            • String ID:
                                                                            • API String ID: 4278518827-0
                                                                            • Opcode ID: 8557dd3bb649fae0f15c8831364d3896f253883c04ae49aedb72e8a983dba543
                                                                            • Instruction ID: 37f0e19f2c8846bbb16a2589e9272c1a2b61fb8f43e42a892d8f83bb0facc490
                                                                            • Opcode Fuzzy Hash: 8557dd3bb649fae0f15c8831364d3896f253883c04ae49aedb72e8a983dba543
                                                                            • Instruction Fuzzy Hash: A50167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BE15C4BA42C7F5A864CBE5
                                                                            APIs
                                                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00F9EB30
                                                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00F9EB46
                                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 00F9EB55
                                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F9EB64
                                                                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F9EB6E
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F9EB75
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                            • String ID:
                                                                            • API String ID: 839392675-0
                                                                            • Opcode ID: b277e2c5883c5243653607a608f67d736f93fe945957a66b9aacd779d35e36f8
                                                                            • Instruction ID: faf9e1b729c313b92347992b1ae5ad31732b55c6b5687c1153e93032cd32690c
                                                                            • Opcode Fuzzy Hash: b277e2c5883c5243653607a608f67d736f93fe945957a66b9aacd779d35e36f8
                                                                            • Instruction Fuzzy Hash: 29F03A72A4015CBBE7215B639E0EEEF3A7CEFCAB15F000158F609D2091D7A15A01EAF5
                                                                            APIs
                                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00F9187F
                                                                            • UnloadUserProfile.USERENV(?,?), ref: 00F9188B
                                                                            • CloseHandle.KERNEL32(?), ref: 00F91894
                                                                            • CloseHandle.KERNEL32(?), ref: 00F9189C
                                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00F918A5
                                                                            • HeapFree.KERNEL32(00000000), ref: 00F918AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                            • String ID:
                                                                            • API String ID: 146765662-0
                                                                            • Opcode ID: 3386af84c6987b7fcaf6d9dcdab1511a72c274ea4820873ca94364af8a9bf220
                                                                            • Instruction ID: ef155633d59e276a5af5091e68882571fa7643a5aa355976980335e276226bd7
                                                                            • Opcode Fuzzy Hash: 3386af84c6987b7fcaf6d9dcdab1511a72c274ea4820873ca94364af8a9bf220
                                                                            • Instruction Fuzzy Hash: 87E0ED36404509BBDB015FA2EE0DD05BF39FF497217108220F22982471CB335420EF90
                                                                            APIs
                                                                              • Part of subcall function 00F37620: _wcslen.LIBCMT ref: 00F37625
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F9C6EE
                                                                            • _wcslen.LIBCMT ref: 00F9C735
                                                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F9C79C
                                                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00F9C7CA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ItemMenu$Info_wcslen$Default
                                                                            • String ID: 0
                                                                            • API String ID: 1227352736-4108050209
                                                                            • Opcode ID: 54f3d2375ff3f7447dc281c4c9ff879cac4b2a0f70828a9204b9c62f55d8e647
                                                                            • Instruction ID: f92fb6b11d25ac4061ab42134f943a575ac20d3e6ea1e49fd1e1279f7d25fc3e
                                                                            • Opcode Fuzzy Hash: 54f3d2375ff3f7447dc281c4c9ff879cac4b2a0f70828a9204b9c62f55d8e647
                                                                            • Instruction Fuzzy Hash: D551AF71A043009BEB159F68C985B6B77E4AF89320F040A2DF999D31D1DB74D908EBD3
                                                                            APIs
                                                                            • ShellExecuteExW.SHELL32(0000003C), ref: 00FBAEA3
                                                                              • Part of subcall function 00F37620: _wcslen.LIBCMT ref: 00F37625
                                                                            • GetProcessId.KERNEL32(00000000), ref: 00FBAF38
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00FBAF67
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                            • String ID: <$@
                                                                            • API String ID: 146682121-1426351568
                                                                            • Opcode ID: 8300382bb76bd4a280148996f2f5f9423d9da36d7fc95d912a4849207b14fc4d
                                                                            • Instruction ID: b597d7ee9e031a87c508b610e0b9cb2ac27562155db3c3164940831a52da74d6
                                                                            • Opcode Fuzzy Hash: 8300382bb76bd4a280148996f2f5f9423d9da36d7fc95d912a4849207b14fc4d
                                                                            • Instruction Fuzzy Hash: FB716975A00619DFCB14EF66C885A9EBBF0BF08320F048499E856AB352C774ED45EF91
                                                                            APIs
                                                                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F97206
                                                                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00F9723C
                                                                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00F9724D
                                                                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00F972CF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$AddressCreateInstanceProc
                                                                            • String ID: DllGetClassObject
                                                                            • API String ID: 753597075-1075368562
                                                                            • Opcode ID: c25a12262ec1d93283289550d1a49275569e08ecbbe2edb180d77107b3c7426e
                                                                            • Instruction ID: 4665484bdf1e05574b8ed9f8ddc36e3201d0f12831aaae9a7737fbd19665e359
                                                                            • Opcode Fuzzy Hash: c25a12262ec1d93283289550d1a49275569e08ecbbe2edb180d77107b3c7426e
                                                                            • Instruction Fuzzy Hash: C4418D71A24304EFEF15DF54C885B9A7BA9EF44710F2480A9BD099F24AD7B0D944EFA0
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FC3E35
                                                                            • IsMenu.USER32(?), ref: 00FC3E4A
                                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00FC3E92
                                                                            • DrawMenuBar.USER32 ref: 00FC3EA5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$DrawInfoInsert
                                                                            • String ID: 0
                                                                            • API String ID: 3076010158-4108050209
                                                                            • Opcode ID: 05cf3527c98872804c4296126f5d708a012feff35e43a020f6f12784f058ea2f
                                                                            • Instruction ID: 65ad72ca42df5c3d2570dcd54e174e692ee7b4189882b3e354946ebd2cd6a204
                                                                            • Opcode Fuzzy Hash: 05cf3527c98872804c4296126f5d708a012feff35e43a020f6f12784f058ea2f
                                                                            • Instruction Fuzzy Hash: 63414A75A0020AAFDB10DF50D985EAABBB5FF493A4F04812DF90597250D734EE49EFA0
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                              • Part of subcall function 00F93CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F93CCA
                                                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00F91E66
                                                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00F91E79
                                                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00F91EA9
                                                                              • Part of subcall function 00F36B57: _wcslen.LIBCMT ref: 00F36B6A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$_wcslen$ClassName
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 2081771294-1403004172
                                                                            • Opcode ID: 0d5daddd1490a381f3cec1807478d2c65e3684306c38be6fa1f1e7e7d0ba8b72
                                                                            • Instruction ID: 681a47ab4e912ac555ece12a0ece61b1a8561f213f8148c9a79e6d1e87b69cf1
                                                                            • Opcode Fuzzy Hash: 0d5daddd1490a381f3cec1807478d2c65e3684306c38be6fa1f1e7e7d0ba8b72
                                                                            • Instruction Fuzzy Hash: 4C213B75A00109BFEF14AB64DD46CFFB7B8EF45360F104129F919A71E1DB785909B620
                                                                            APIs
                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00F54D1E,00F628E9,?,00F54CBE,00F628E9,00FF88B8,0000000C,00F54E15,00F628E9,00000002), ref: 00F54D8D
                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00F54DA0
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,00F54D1E,00F628E9,?,00F54CBE,00F628E9,00FF88B8,0000000C,00F54E15,00F628E9,00000002,00000000), ref: 00F54DC3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                            • API String ID: 4061214504-1276376045
                                                                            • Opcode ID: e51c13866f658861d9d2873d5f43be678a4299c399d35df78ead9835ba72d9f5
                                                                            • Instruction ID: 12350ae1fd9e3c98157d1d052510587eafdf9d2dd3ca097311f0c99613e7c113
                                                                            • Opcode Fuzzy Hash: e51c13866f658861d9d2873d5f43be678a4299c399d35df78ead9835ba72d9f5
                                                                            • Instruction Fuzzy Hash: 7BF0813090020CABDB109B90DD0AFADBBB5EF04716F040155ED09A3250CF349984EAD1
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F34EDD,?,01001418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00F34E9C
                                                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F34EAE
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,00F34EDD,?,01001418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00F34EC0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Library$AddressFreeLoadProc
                                                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                            • API String ID: 145871493-3689287502
                                                                            • Opcode ID: 09484a0c0c73b445ebc1331bc67daf69b3493894139f3d7dc65df07184c2418c
                                                                            • Instruction ID: b215839a817e5f5c46ce1eb0e0df179e8000a55ac2bb1b41372e909a1b840b8f
                                                                            • Opcode Fuzzy Hash: 09484a0c0c73b445ebc1331bc67daf69b3493894139f3d7dc65df07184c2418c
                                                                            • Instruction Fuzzy Hash: 98E08635E015225BD22117266C1AF6B7554AFC1B72B0D0115FD08D3120DB60ED4260E1
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F73CDE,?,01001418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00F34E62
                                                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F34E74
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,00F73CDE,?,01001418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00F34E87
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Library$AddressFreeLoadProc
                                                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                            • API String ID: 145871493-1355242751
                                                                            • Opcode ID: f45ff7c2d87c046ac400204faae754e08b896d94e639111b7c70538ed378b6ae
                                                                            • Instruction ID: 8728d81927d4be91d1e1972a42dc781d1ec228600e57f7cdcfc1caa6b9e10817
                                                                            • Opcode Fuzzy Hash: f45ff7c2d87c046ac400204faae754e08b896d94e639111b7c70538ed378b6ae
                                                                            • Instruction Fuzzy Hash: C0D0C232D026225786221B26AC0AE8B3A18AF81F3530D0115F908A3114CF20ED42B1D0
                                                                            APIs
                                                                            • GetCurrentProcessId.KERNEL32 ref: 00FBA427
                                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00FBA435
                                                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00FBA468
                                                                            • CloseHandle.KERNEL32(?), ref: 00FBA63D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CloseCountersCurrentHandleOpen
                                                                            • String ID:
                                                                            • API String ID: 3488606520-0
                                                                            • Opcode ID: a2f6f8bba3840cb6b0fa7878bd2016296a228ecc3b357cd6cfd79379874716a9
                                                                            • Instruction ID: 44cda2fed4d5aa9d6418713f416045908ba8535090108cd479edfeb33c9e1bde
                                                                            • Opcode Fuzzy Hash: a2f6f8bba3840cb6b0fa7878bd2016296a228ecc3b357cd6cfd79379874716a9
                                                                            • Instruction Fuzzy Hash: 4CA1A271604300AFD720DF25C886F2AB7E5AF44724F14881DFA9A9B392DB74EC419F92
                                                                            APIs
                                                                              • Part of subcall function 00F9DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F9CF22,?), ref: 00F9DDFD
                                                                              • Part of subcall function 00F9DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F9CF22,?), ref: 00F9DE16
                                                                              • Part of subcall function 00F9E199: GetFileAttributesW.KERNEL32(?,00F9CF95), ref: 00F9E19A
                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 00F9E473
                                                                            • MoveFileW.KERNEL32(?,?), ref: 00F9E4AC
                                                                            • _wcslen.LIBCMT ref: 00F9E5EB
                                                                            • _wcslen.LIBCMT ref: 00F9E603
                                                                            • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00F9E650
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 3183298772-0
                                                                            • Opcode ID: ce8a98f9d61d7508ecd2e7261a222bde4605937f2eb7413e9f0ecb4a19a7a268
                                                                            • Instruction ID: 309144dd3c8ce6b9aa4ac0b8fab9c391aa56b027abedbcf6f232142fd57ce621
                                                                            • Opcode Fuzzy Hash: ce8a98f9d61d7508ecd2e7261a222bde4605937f2eb7413e9f0ecb4a19a7a268
                                                                            • Instruction Fuzzy Hash: 9D5192B24083459BDB24DBA4DC819DF73ECAF84350F00491EF689D3191EF79A588D766
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                              • Part of subcall function 00FBC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FBB6AE,?,?), ref: 00FBC9B5
                                                                              • Part of subcall function 00FBC998: _wcslen.LIBCMT ref: 00FBC9F1
                                                                              • Part of subcall function 00FBC998: _wcslen.LIBCMT ref: 00FBCA68
                                                                              • Part of subcall function 00FBC998: _wcslen.LIBCMT ref: 00FBCA9E
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FBBAA5
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FBBB00
                                                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00FBBB63
                                                                            • RegCloseKey.ADVAPI32(?,?), ref: 00FBBBA6
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00FBBBB3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                            • String ID:
                                                                            • API String ID: 826366716-0
                                                                            • Opcode ID: 8803b01100614447e3c23928a40a54c009a41ff2509bc314cc81f8a55ff01e59
                                                                            • Instruction ID: d34bfbb8ca028ca833a4bc876bb5b18a722eacdc8eb755b9afc87e43a2bf7cff
                                                                            • Opcode Fuzzy Hash: 8803b01100614447e3c23928a40a54c009a41ff2509bc314cc81f8a55ff01e59
                                                                            • Instruction Fuzzy Hash: D961C031608201AFC314DF15C891E6ABBE9FF84318F14855CF4998B2A2CB75ED45EF92
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 00F98BCD
                                                                            • VariantClear.OLEAUT32 ref: 00F98C3E
                                                                            • VariantClear.OLEAUT32 ref: 00F98C9D
                                                                            • VariantClear.OLEAUT32(?), ref: 00F98D10
                                                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00F98D3B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$Clear$ChangeInitType
                                                                            • String ID:
                                                                            • API String ID: 4136290138-0
                                                                            • Opcode ID: 291cb3f6aecedb64109d19e0e41055d8679fbc140f1cd58d27088411cf332c3c
                                                                            • Instruction ID: 632c99ed75b9ae2abd439d1b1f1db4e73cf0c7803dc2e67ab8c909231fbeac65
                                                                            • Opcode Fuzzy Hash: 291cb3f6aecedb64109d19e0e41055d8679fbc140f1cd58d27088411cf332c3c
                                                                            • Instruction Fuzzy Hash: AE515AB5A00219EFDB14CF68C894EAAB7F8FF89350B158559E909DB350E730E912CF90
                                                                            APIs
                                                                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00FA8BAE
                                                                            • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00FA8BDA
                                                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00FA8C32
                                                                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00FA8C57
                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00FA8C5F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfile$SectionWrite$String
                                                                            • String ID:
                                                                            • API String ID: 2832842796-0
                                                                            • Opcode ID: 9b86b98fced3469eab07ca88bdc245d60feb22d6e1be6e42565956ab1500a54e
                                                                            • Instruction ID: 4caab79c85e38ea0b0c85e20ee5f7ac28c0ef68540cbf162fd9db3403921b898
                                                                            • Opcode Fuzzy Hash: 9b86b98fced3469eab07ca88bdc245d60feb22d6e1be6e42565956ab1500a54e
                                                                            • Instruction Fuzzy Hash: 46515C75A002189FCB14DF65C881E69BBF5FF49364F088058E849AB362CB35ED51EFA0
                                                                            APIs
                                                                            • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00FB8F40
                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00FB8FD0
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00FB8FEC
                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00FB9032
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00FB9052
                                                                              • Part of subcall function 00F4F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00FA1043,?,753CE610), ref: 00F4F6E6
                                                                              • Part of subcall function 00F4F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00F8FA64,00000000,00000000,?,?,00FA1043,?,753CE610,?,00F8FA64), ref: 00F4F70D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                            • String ID:
                                                                            • API String ID: 666041331-0
                                                                            • Opcode ID: 3d4fa56d8c05933ea2d8d3fca2d224b6fe95fa51da0125bfa52f429a7cfd8ec3
                                                                            • Instruction ID: 00bb09037e7ba97529a196c3ebb94a5494ebce70c968f45d73665df09d9dc711
                                                                            • Opcode Fuzzy Hash: 3d4fa56d8c05933ea2d8d3fca2d224b6fe95fa51da0125bfa52f429a7cfd8ec3
                                                                            • Instruction Fuzzy Hash: 27515C35A04205DFCB10EF65C4949ADBBB1FF49364F088098E9099B362DB75ED86EF90
                                                                            APIs
                                                                            • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00FC6C33
                                                                            • SetWindowLongW.USER32(?,000000EC,?), ref: 00FC6C4A
                                                                            • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00FC6C73
                                                                            • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00FAAB79,00000000,00000000), ref: 00FC6C98
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00FC6CC7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$MessageSendShow
                                                                            • String ID:
                                                                            • API String ID: 3688381893-0
                                                                            • Opcode ID: 312eada402ed8e009ee223a034f6da86f9da9a4dc7c01ee9cb50a097e028ece0
                                                                            • Instruction ID: b1af642546ff78b5c768931054fd3d0dde7bff86df1ca3f81b2be8168dad400f
                                                                            • Opcode Fuzzy Hash: 312eada402ed8e009ee223a034f6da86f9da9a4dc7c01ee9cb50a097e028ece0
                                                                            • Instruction Fuzzy Hash: EC41D635A08105AFD724CF28CE56FA57BA5EB49361F15022CF899E73E1C371ED41EA90
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: 8fc6d05bf3c004f0ac263b6d92f9ae5c5b69f05f0e4fd748d9b62e99f74c0aa8
                                                                            • Instruction ID: 1252ad06e9ae2c6491d5981706a9e4941cca49a26b06d9f260bf5a2816d51164
                                                                            • Opcode Fuzzy Hash: 8fc6d05bf3c004f0ac263b6d92f9ae5c5b69f05f0e4fd748d9b62e99f74c0aa8
                                                                            • Instruction Fuzzy Hash: A741D232E00604AFCB24DF78CD81A6DB7B5EF89724F154569EA15EB351DB31AD01EB80
                                                                            APIs
                                                                            • GetCursorPos.USER32(?), ref: 00F49141
                                                                            • ScreenToClient.USER32(00000000,?), ref: 00F4915E
                                                                            • GetAsyncKeyState.USER32(00000001), ref: 00F49183
                                                                            • GetAsyncKeyState.USER32(00000002), ref: 00F4919D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: AsyncState$ClientCursorScreen
                                                                            • String ID:
                                                                            • API String ID: 4210589936-0
                                                                            • Opcode ID: c6dcd07f1e1abe0ab576f625aa98e7fb1a7a0f484a3a94a1f829852331aceb8c
                                                                            • Instruction ID: dd7ffb77db66b8080dd88197b2aca3585f64e64ebf479c2d68b8cb13329303fb
                                                                            • Opcode Fuzzy Hash: c6dcd07f1e1abe0ab576f625aa98e7fb1a7a0f484a3a94a1f829852331aceb8c
                                                                            • Instruction Fuzzy Hash: 21414131A0861AABDF15AF64C848BEEBB74FB45334F244219E829A7290C7746950EB91
                                                                            APIs
                                                                            • GetInputState.USER32 ref: 00FA38CB
                                                                            • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00FA3922
                                                                            • TranslateMessage.USER32(?), ref: 00FA394B
                                                                            • DispatchMessageW.USER32(?), ref: 00FA3955
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FA3966
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                            • String ID:
                                                                            • API String ID: 2256411358-0
                                                                            • Opcode ID: b4976348c6d576d258c91ed9e9b385b00c209ad7212622d5b3d777b492cdc689
                                                                            • Instruction ID: a8222961002ed6795e81dc3d54faa6a617179952d8b0aef25fde84b9affabc81
                                                                            • Opcode Fuzzy Hash: b4976348c6d576d258c91ed9e9b385b00c209ad7212622d5b3d777b492cdc689
                                                                            • Instruction Fuzzy Hash: ED31C6B1D04345AFEB36CB34D849BB737A9EB0B314F04455DF49682190E3B9D684EB11
                                                                            APIs
                                                                            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00FAC21E,00000000), ref: 00FACF38
                                                                            • InternetReadFile.WININET(?,00000000,?,?), ref: 00FACF6F
                                                                            • GetLastError.KERNEL32(?,00000000,?,?,?,00FAC21E,00000000), ref: 00FACFB4
                                                                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,00FAC21E,00000000), ref: 00FACFC8
                                                                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,00FAC21E,00000000), ref: 00FACFF2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                            • String ID:
                                                                            • API String ID: 3191363074-0
                                                                            • Opcode ID: b14b361ead18fad01c09199e98a8507e6c113c33e4183f4f6ba87a9031c9fa53
                                                                            • Instruction ID: 8134017e5519e02cd549d593034839d111ea2229e5cc164e51dd44a44b78faff
                                                                            • Opcode Fuzzy Hash: b14b361ead18fad01c09199e98a8507e6c113c33e4183f4f6ba87a9031c9fa53
                                                                            • Instruction Fuzzy Hash: 3A314DB1904209AFDB24DFA5D985AAABBF9EB15351B10442EF51AD3140DB30AD41EBB0
                                                                            APIs
                                                                            • GetWindowRect.USER32(?,?), ref: 00F91915
                                                                            • PostMessageW.USER32(00000001,00000201,00000001), ref: 00F919C1
                                                                            • Sleep.KERNEL32(00000000,?,?,?), ref: 00F919C9
                                                                            • PostMessageW.USER32(00000001,00000202,00000000), ref: 00F919DA
                                                                            • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00F919E2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePostSleep$RectWindow
                                                                            • String ID:
                                                                            • API String ID: 3382505437-0
                                                                            • Opcode ID: 4ff9ce3a2849a7a1dfb40212bba2fa2d6c0afd8a787cebe00d6c54a6c396d95c
                                                                            • Instruction ID: 91777e01488a4ab13e1da44ec4d3b05c9850647347eb4d46697cdd28d6c6d234
                                                                            • Opcode Fuzzy Hash: 4ff9ce3a2849a7a1dfb40212bba2fa2d6c0afd8a787cebe00d6c54a6c396d95c
                                                                            • Instruction Fuzzy Hash: 0331AF72A0021AEFDF14CFA8CE99ADE3BB5FB44325F104225F925A72D1C7709954EB90
                                                                            APIs
                                                                            • IsWindow.USER32(00000000), ref: 00FB0951
                                                                            • GetForegroundWindow.USER32 ref: 00FB0968
                                                                            • GetDC.USER32(00000000), ref: 00FB09A4
                                                                            • GetPixel.GDI32(00000000,?,00000003), ref: 00FB09B0
                                                                            • ReleaseDC.USER32(00000000,00000003), ref: 00FB09E8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ForegroundPixelRelease
                                                                            • String ID:
                                                                            • API String ID: 4156661090-0
                                                                            • Opcode ID: 778064abd396831a90d5bb23594929d17f62b04e904192e692c5fb30a87477b9
                                                                            • Instruction ID: 816d347705af43968114199f8e6272177f19166a4d5e35d52153a97914687180
                                                                            • Opcode Fuzzy Hash: 778064abd396831a90d5bb23594929d17f62b04e904192e692c5fb30a87477b9
                                                                            • Instruction Fuzzy Hash: 35218175A00204AFD714EF65CD85EAEBBE9EF49750F048068F84A97752CB34AC04EF90
                                                                            APIs
                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 00F6CDC6
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00F6CDE9
                                                                              • Part of subcall function 00F63820: RtlAllocateHeap.NTDLL(00000000,?,01001444,?,00F4FDF5,?,?,00F3A976,00000010,01001440,00F313FC,?,00F313C6,?,00F31129), ref: 00F63852
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00F6CE0F
                                                                            • _free.LIBCMT ref: 00F6CE22
                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00F6CE31
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                            • String ID:
                                                                            • API String ID: 336800556-0
                                                                            • Opcode ID: ff0a92cf47cfbbb1118f4563c237212df8d3b7fb0ce512589ad8e7aa4685c9b4
                                                                            • Instruction ID: d07f85d726826827cc7ff66ebb54f9dfb4592d89d96b0c917592762a49e07802
                                                                            • Opcode Fuzzy Hash: ff0a92cf47cfbbb1118f4563c237212df8d3b7fb0ce512589ad8e7aa4685c9b4
                                                                            • Instruction Fuzzy Hash: 4A01D472A022157F232116BA6D89D7B797DDED6FA13150129F989C7200EA6A8D01B1F0
                                                                            APIs
                                                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F49693
                                                                            • SelectObject.GDI32(?,00000000), ref: 00F496A2
                                                                            • BeginPath.GDI32(?), ref: 00F496B9
                                                                            • SelectObject.GDI32(?,00000000), ref: 00F496E2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ObjectSelect$BeginCreatePath
                                                                            • String ID:
                                                                            • API String ID: 3225163088-0
                                                                            • Opcode ID: bd08838dc90f2fa06c25a3eef665e6de7be1b2ae4b266160afe7e0b28ecdf777
                                                                            • Instruction ID: 1f833d71c485e68d8f4dbe77b5684db6c0cf6727c30a0e4627474b3d0ea8b4bd
                                                                            • Opcode Fuzzy Hash: bd08838dc90f2fa06c25a3eef665e6de7be1b2ae4b266160afe7e0b28ecdf777
                                                                            • Instruction Fuzzy Hash: 8721A73191A305EFDB229F25ED09BAA3F74BB50325F110215F854971E4D3B5D851EF90
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _memcmp
                                                                            • String ID:
                                                                            • API String ID: 2931989736-0
                                                                            • Opcode ID: a46967d6594a2b53ddfaa819e23b872cc96cb6ad52fc3c68fcc150d61baf5191
                                                                            • Instruction ID: c94f58478b8800250e259a2f2f448be6de9798ea3be1f5ed481c9ad06dc2d624
                                                                            • Opcode Fuzzy Hash: a46967d6594a2b53ddfaa819e23b872cc96cb6ad52fc3c68fcc150d61baf5191
                                                                            • Instruction Fuzzy Hash: 1B01DB6264160EBAFA0955509E92FBA735D9B617A5B004024FE045A141F730FF14B3A3
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,?,00F5F2DE,00F63863,01001444,?,00F4FDF5,?,?,00F3A976,00000010,01001440,00F313FC,?,00F313C6), ref: 00F62DFD
                                                                            • _free.LIBCMT ref: 00F62E32
                                                                            • _free.LIBCMT ref: 00F62E59
                                                                            • SetLastError.KERNEL32(00000000,00F31129), ref: 00F62E66
                                                                            • SetLastError.KERNEL32(00000000,00F31129), ref: 00F62E6F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$_free
                                                                            • String ID:
                                                                            • API String ID: 3170660625-0
                                                                            • Opcode ID: 8c2e8feb4d63ce866bd3273c4920e55e6cec88047e890a0ac3ac345915e7ac47
                                                                            • Instruction ID: b5a1cd081173df500862646f7ca9595da4dcd0538bc4ef0a106afd0f69a09613
                                                                            • Opcode Fuzzy Hash: 8c2e8feb4d63ce866bd3273c4920e55e6cec88047e890a0ac3ac345915e7ac47
                                                                            • Instruction Fuzzy Hash: 8E012836A45E0467C75227357D86E2B366DEFE17B1B250038F425A32D2EF3A8C01B160
                                                                            APIs
                                                                            • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F8FF41,80070057,?,?,?,00F9035E), ref: 00F9002B
                                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F8FF41,80070057,?,?), ref: 00F90046
                                                                            • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F8FF41,80070057,?,?), ref: 00F90054
                                                                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F8FF41,80070057,?), ref: 00F90064
                                                                            • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F8FF41,80070057,?,?), ref: 00F90070
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 3897988419-0
                                                                            • Opcode ID: 8df11c1cdb20887e1529adc35e68a1c4fafd0a3c6bc93f4ea60481277f11266b
                                                                            • Instruction ID: 1ba4f4742c68d84245f5e6c315cd007b862d43f3d75a33e801c4c8ba48c819f7
                                                                            • Opcode Fuzzy Hash: 8df11c1cdb20887e1529adc35e68a1c4fafd0a3c6bc93f4ea60481277f11266b
                                                                            • Instruction Fuzzy Hash: 2B018F72A00208BFEF108F68DD05FAA7AEDEB44761F144124F909D3260DB71DD40ABA0
                                                                            APIs
                                                                            • QueryPerformanceCounter.KERNEL32(?), ref: 00F9E997
                                                                            • QueryPerformanceFrequency.KERNEL32(?), ref: 00F9E9A5
                                                                            • Sleep.KERNEL32(00000000), ref: 00F9E9AD
                                                                            • QueryPerformanceCounter.KERNEL32(?), ref: 00F9E9B7
                                                                            • Sleep.KERNEL32 ref: 00F9E9F3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                            • String ID:
                                                                            • API String ID: 2833360925-0
                                                                            • Opcode ID: 3379186f8ff7d9c7e46b555e0c5617e71f1af2e083b339d5e5f754311263474e
                                                                            • Instruction ID: 2641d4df9c4d97a53ed404f92dc43e34f3308e9198874dc92532920ec800d6bb
                                                                            • Opcode Fuzzy Hash: 3379186f8ff7d9c7e46b555e0c5617e71f1af2e083b339d5e5f754311263474e
                                                                            • Instruction Fuzzy Hash: E0015731C0162DDBDF40EBE6DD5AAEDBB78FB08310F050946E502B2241CB309950ABA1
                                                                            APIs
                                                                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F91114
                                                                            • GetLastError.KERNEL32(?,00000000,00000000,?,?,00F90B9B,?,?,?), ref: 00F91120
                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F90B9B,?,?,?), ref: 00F9112F
                                                                            • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F90B9B,?,?,?), ref: 00F91136
                                                                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F9114D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 842720411-0
                                                                            • Opcode ID: c5592ab2a98ba22b2df340d2582a6c2f2775da9b13c23f9375efa234c3561d0b
                                                                            • Instruction ID: e7d7f97926d6eb8be0a351c720680409d9906bbc47a077e5f8cf1f53e15e5490
                                                                            • Opcode Fuzzy Hash: c5592ab2a98ba22b2df340d2582a6c2f2775da9b13c23f9375efa234c3561d0b
                                                                            • Instruction Fuzzy Hash: 3C016D75500209BFDB114F65DD4EE6A3B6EFF85360B150424FA49C3360DB31DC41AAA0
                                                                            APIs
                                                                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F90FCA
                                                                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F90FD6
                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F90FE5
                                                                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F90FEC
                                                                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F91002
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 44706859-0
                                                                            • Opcode ID: 400786bf12b0b6318772ca0ff069f850d3e347a8b572b9418a274bea4645dab5
                                                                            • Instruction ID: f0cf8b190df2e7fd07a609ea1ba6fd70d881e3ae1f76b1278bac349ab3bf2d3f
                                                                            • Opcode Fuzzy Hash: 400786bf12b0b6318772ca0ff069f850d3e347a8b572b9418a274bea4645dab5
                                                                            • Instruction Fuzzy Hash: 2EF06235540305EBDB214FA5DD4EF563B6DFF89761F144424F949C7261CA71DC40DAA0
                                                                            APIs
                                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F9102A
                                                                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F91036
                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F91045
                                                                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F9104C
                                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F91062
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 44706859-0
                                                                            • Opcode ID: bb8e2d5f7e0b857f47de851a227f1b86b7c3ab85965eadb9510881d66aa13e4a
                                                                            • Instruction ID: b7070b0cbbfcab6e9c0f0112e945abd31922c6ebb920551d9e97fa2ff4f56800
                                                                            • Opcode Fuzzy Hash: bb8e2d5f7e0b857f47de851a227f1b86b7c3ab85965eadb9510881d66aa13e4a
                                                                            • Instruction Fuzzy Hash: D5F06235540305EBDB215FA5ED4AF563B6DFF89761F140424F949C7261CA72D8409AA0
                                                                            APIs
                                                                            • CloseHandle.KERNEL32(?,?,?,?,00FA017D,?,00FA32FC,?,00000001,00F72592,?), ref: 00FA0324
                                                                            • CloseHandle.KERNEL32(?,?,?,?,00FA017D,?,00FA32FC,?,00000001,00F72592,?), ref: 00FA0331
                                                                            • CloseHandle.KERNEL32(?,?,?,?,00FA017D,?,00FA32FC,?,00000001,00F72592,?), ref: 00FA033E
                                                                            • CloseHandle.KERNEL32(?,?,?,?,00FA017D,?,00FA32FC,?,00000001,00F72592,?), ref: 00FA034B
                                                                            • CloseHandle.KERNEL32(?,?,?,?,00FA017D,?,00FA32FC,?,00000001,00F72592,?), ref: 00FA0358
                                                                            • CloseHandle.KERNEL32(?,?,?,?,00FA017D,?,00FA32FC,?,00000001,00F72592,?), ref: 00FA0365
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandle
                                                                            • String ID:
                                                                            • API String ID: 2962429428-0
                                                                            • Opcode ID: c3ad3fcc27041ec3c8cdd1eff83dc02a0b95e8cdeb02210087b47c7ee1f1b6fc
                                                                            • Instruction ID: 0aeb2e48c00258c130073634ea7236a5d4cf56cd13b74875ad27b74a8072f579
                                                                            • Opcode Fuzzy Hash: c3ad3fcc27041ec3c8cdd1eff83dc02a0b95e8cdeb02210087b47c7ee1f1b6fc
                                                                            • Instruction Fuzzy Hash: 3901A2B2800B159FCB309F66E880812F7F9BF613253158A3FD19652931C771A954EF80
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00F6D752
                                                                              • Part of subcall function 00F629C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F6D7D1,00000000,00000000,00000000,00000000,?,00F6D7F8,00000000,00000007,00000000,?,00F6DBF5,00000000), ref: 00F629DE
                                                                              • Part of subcall function 00F629C8: GetLastError.KERNEL32(00000000,?,00F6D7D1,00000000,00000000,00000000,00000000,?,00F6D7F8,00000000,00000007,00000000,?,00F6DBF5,00000000,00000000), ref: 00F629F0
                                                                            • _free.LIBCMT ref: 00F6D764
                                                                            • _free.LIBCMT ref: 00F6D776
                                                                            • _free.LIBCMT ref: 00F6D788
                                                                            • _free.LIBCMT ref: 00F6D79A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: 6b16d924ea5049960f3fec5e180d636768039d3bbca1a704d226523bad88477d
                                                                            • Instruction ID: eb0b73c048461cc04f4a29c0db57788a319b222139c097f566e2c5e39e875839
                                                                            • Opcode Fuzzy Hash: 6b16d924ea5049960f3fec5e180d636768039d3bbca1a704d226523bad88477d
                                                                            • Instruction Fuzzy Hash: EEF0FF32F4461CAB8669EB68FAC5C267BFDBF44760B940805F048D7501CB24FC80F6A5
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00F95C58
                                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00F95C6F
                                                                            • MessageBeep.USER32(00000000), ref: 00F95C87
                                                                            • KillTimer.USER32(?,0000040A), ref: 00F95CA3
                                                                            • EndDialog.USER32(?,00000001), ref: 00F95CBD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                            • String ID:
                                                                            • API String ID: 3741023627-0
                                                                            • Opcode ID: c8e3826e29ff6584c379f69feebbe46623a4e50bc539cede09a22386945fcbb2
                                                                            • Instruction ID: b95e44192bcd50cf9ea1a4ee57d697b2df386b197944adf3b6e465246d4473a1
                                                                            • Opcode Fuzzy Hash: c8e3826e29ff6584c379f69feebbe46623a4e50bc539cede09a22386945fcbb2
                                                                            • Instruction Fuzzy Hash: 93016770500704ABFF255B20DF4FF9577B8BB00F05F000559E646A15E1D7F45944AB90
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00F622BE
                                                                              • Part of subcall function 00F629C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F6D7D1,00000000,00000000,00000000,00000000,?,00F6D7F8,00000000,00000007,00000000,?,00F6DBF5,00000000), ref: 00F629DE
                                                                              • Part of subcall function 00F629C8: GetLastError.KERNEL32(00000000,?,00F6D7D1,00000000,00000000,00000000,00000000,?,00F6D7F8,00000000,00000007,00000000,?,00F6DBF5,00000000,00000000), ref: 00F629F0
                                                                            • _free.LIBCMT ref: 00F622D0
                                                                            • _free.LIBCMT ref: 00F622E3
                                                                            • _free.LIBCMT ref: 00F622F4
                                                                            • _free.LIBCMT ref: 00F62305
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: cc6843ed631d07c22d3fad7460ac43cf1fbf492cd29d226e112c0598228b45c2
                                                                            • Instruction ID: aa2bbad4af0e0cb53714d3c12d2c0ca7e376937310798e4d4d601d83c32f7215
                                                                            • Opcode Fuzzy Hash: cc6843ed631d07c22d3fad7460ac43cf1fbf492cd29d226e112c0598228b45c2
                                                                            • Instruction Fuzzy Hash: 2EF030B09009248B8767AF58FC019283BB4BB187E1F00051AF450D2269C73E4411FBE5
                                                                            APIs
                                                                            • EndPath.GDI32(?), ref: 00F495D4
                                                                            • StrokeAndFillPath.GDI32(?,?,00F871F7,00000000,?,?,?), ref: 00F495F0
                                                                            • SelectObject.GDI32(?,00000000), ref: 00F49603
                                                                            • DeleteObject.GDI32 ref: 00F49616
                                                                            • StrokePath.GDI32(?), ref: 00F49631
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                            • String ID:
                                                                            • API String ID: 2625713937-0
                                                                            • Opcode ID: 1ec6558f40112519879b1ba33c22776beb45c59ed82277d4679148dc12c2ad04
                                                                            • Instruction ID: eb9a115fe45329663b6298e43f8977f86d12dd524ffa7f819700acd6cff3f37d
                                                                            • Opcode Fuzzy Hash: 1ec6558f40112519879b1ba33c22776beb45c59ed82277d4679148dc12c2ad04
                                                                            • Instruction Fuzzy Hash: 9AF03C31509208EBDB275F65EE0DB653F61BB00332F148214F9A9960F4CB7A8991EF60
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: __freea$_free
                                                                            • String ID: a/p$am/pm
                                                                            • API String ID: 3432400110-3206640213
                                                                            • Opcode ID: a9bd80f194cdf2b3e74ff5058b8fd7d63cf37508d7549c21de56218fbab196b8
                                                                            • Instruction ID: d204e4756f066e60072195444a80b3e5e6d37ab56c804836dc9940ecab1d33d3
                                                                            • Opcode Fuzzy Hash: a9bd80f194cdf2b3e74ff5058b8fd7d63cf37508d7549c21de56218fbab196b8
                                                                            • Instruction Fuzzy Hash: E0D10132D00206DADB289F68C856BFEB7B5FF06320F2C4159E906AB751D7359D80EB91
                                                                            APIs
                                                                              • Part of subcall function 00F50242: EnterCriticalSection.KERNEL32(0100070C,01001884,?,?,00F4198B,01002518,?,?,?,00F312F9,00000000), ref: 00F5024D
                                                                              • Part of subcall function 00F50242: LeaveCriticalSection.KERNEL32(0100070C,?,00F4198B,01002518,?,?,?,00F312F9,00000000), ref: 00F5028A
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                              • Part of subcall function 00F500A3: __onexit.LIBCMT ref: 00F500A9
                                                                            • __Init_thread_footer.LIBCMT ref: 00FB7BFB
                                                                              • Part of subcall function 00F501F8: EnterCriticalSection.KERNEL32(0100070C,?,?,00F48747,01002514), ref: 00F50202
                                                                              • Part of subcall function 00F501F8: LeaveCriticalSection.KERNEL32(0100070C,?,00F48747,01002514), ref: 00F50235
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                            • String ID: 5$G$Variable must be of type 'Object'.
                                                                            • API String ID: 535116098-3733170431
                                                                            • Opcode ID: 31e303b9a8e3e188c8ad27bde810fa227686b6872cf81456a50f15d104e9a9cd
                                                                            • Instruction ID: e73325fed7b5483a56d0b0da1bdcd043bbe22ac84a628c038eafd21bdc741555
                                                                            • Opcode Fuzzy Hash: 31e303b9a8e3e188c8ad27bde810fa227686b6872cf81456a50f15d104e9a9cd
                                                                            • Instruction Fuzzy Hash: 70919A70A04209AFCB14EF56D891DEDBBB1BF88350F148049F846AB292DB75AE41EF51
                                                                            APIs
                                                                              • Part of subcall function 00F9B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F921D0,?,?,00000034,00000800,?,00000034), ref: 00F9B42D
                                                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00F92760
                                                                              • Part of subcall function 00F9B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F921FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00F9B3F8
                                                                              • Part of subcall function 00F9B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00F9B355
                                                                              • Part of subcall function 00F9B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00F92194,00000034,?,?,00001004,00000000,00000000), ref: 00F9B365
                                                                              • Part of subcall function 00F9B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00F92194,00000034,?,?,00001004,00000000,00000000), ref: 00F9B37B
                                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F927CD
                                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F9281A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                            • String ID: @
                                                                            • API String ID: 4150878124-2766056989
                                                                            • Opcode ID: 471358b870f5b91ec497d7d39208cd6a4eac61b849f9089f32b277c66bd99a40
                                                                            • Instruction ID: d6cb8534c5b52ab299347c7e4ae2775eb6a40896fa800300e7069d01af4bdd28
                                                                            • Opcode Fuzzy Hash: 471358b870f5b91ec497d7d39208cd6a4eac61b849f9089f32b277c66bd99a40
                                                                            • Instruction Fuzzy Hash: 1A412A72900218BEEF10DFA4DD46EEEBBB8AF09310F004095EA55B7181DA716E45EBA1
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\EPIRTURMEROOO0060.exe,00000104), ref: 00F61769
                                                                            • _free.LIBCMT ref: 00F61834
                                                                            • _free.LIBCMT ref: 00F6183E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _free$FileModuleName
                                                                            • String ID: C:\Users\user\Desktop\EPIRTURMEROOO0060.exe
                                                                            • API String ID: 2506810119-1661907559
                                                                            • Opcode ID: fcc38755f7fd9b6d9e25132d88d093264a89839740ed0bfdd77be7e4793b9189
                                                                            • Instruction ID: 2ababf98555e20861330bff6d60c9abdf0ad3c89aefdc6c4f64c2c242e78ecd5
                                                                            • Opcode Fuzzy Hash: fcc38755f7fd9b6d9e25132d88d093264a89839740ed0bfdd77be7e4793b9189
                                                                            • Instruction Fuzzy Hash: 3D3161B1E00218ABDB22DFA99C85D9EBBFCFB85360F184166F844D7201D6748E41EB90
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00F9C306
                                                                            • DeleteMenu.USER32(?,00000007,00000000), ref: 00F9C34C
                                                                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,01001990,01165C80), ref: 00F9C395
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Delete$InfoItem
                                                                            • String ID: 0
                                                                            • API String ID: 135850232-4108050209
                                                                            • Opcode ID: 0111b8111ad49048d5168acf27f0eec5cd3a84b4b2dc97f05815a2f8b041e251
                                                                            • Instruction ID: 98856ed0535e1aedee5d71d9d1d3a9417583b43fa1ab72c7d6088b911a5b2fe2
                                                                            • Opcode Fuzzy Hash: 0111b8111ad49048d5168acf27f0eec5cd3a84b4b2dc97f05815a2f8b041e251
                                                                            • Instruction Fuzzy Hash: F041C2716043019FEB24DF29DC85F1ABBE8AF85320F048A1DF9A5972D1D774E904EB92
                                                                            APIs
                                                                              • Part of subcall function 00FB335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00FB3077,?,?), ref: 00FB3378
                                                                            • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00FB307A
                                                                            • _wcslen.LIBCMT ref: 00FB309B
                                                                            • htons.WSOCK32(00000000,?,?,00000000), ref: 00FB3106
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                            • String ID: 255.255.255.255
                                                                            • API String ID: 946324512-2422070025
                                                                            • Opcode ID: b23d50ddf5c4c8cdfcbfd5a5d8f9064b7b49653351afdb0dfff87beb7df71f92
                                                                            • Instruction ID: 9ece32de23d5a81e73eb6c4c169683459d7e9b15d8c8b0a07fbf64f13db7eb73
                                                                            • Opcode Fuzzy Hash: b23d50ddf5c4c8cdfcbfd5a5d8f9064b7b49653351afdb0dfff87beb7df71f92
                                                                            • Instruction Fuzzy Hash: BF313739A042059FCB10DF2EC881EEA77E0EF14368F248059E8158B392DB71EE41EF60
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00FC4705
                                                                            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00FC4713
                                                                            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00FC471A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$DestroyWindow
                                                                            • String ID: msctls_updown32
                                                                            • API String ID: 4014797782-2298589950
                                                                            • Opcode ID: 7e8dbee1562d04f99203d0fafdbfacae28cc0133b424c25ff92261d75f59a344
                                                                            • Instruction ID: ae979b70d3dedf99ecba5009ce0ce6dc257f40f0041dcf2e904e49806b5dcff0
                                                                            • Opcode Fuzzy Hash: 7e8dbee1562d04f99203d0fafdbfacae28cc0133b424c25ff92261d75f59a344
                                                                            • Instruction Fuzzy Hash: 2D215CB5600209AFDB11DF64DD92EA737ADEF4A3A4B040059FA049B391CB35FC51EBA0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen
                                                                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                            • API String ID: 176396367-2734436370
                                                                            • Opcode ID: cee39e8cb9b8c95786c38081db46b38d2cd3bb17627a8aee80e1941c49ba465b
                                                                            • Instruction ID: c2b1b17625fdeac2479356f4cd9e8bcfbc23544161a30db31a5ea0e90bb62fb9
                                                                            • Opcode Fuzzy Hash: cee39e8cb9b8c95786c38081db46b38d2cd3bb17627a8aee80e1941c49ba465b
                                                                            • Instruction Fuzzy Hash: C321387250861166EB31AA2CDC03FB7B7E89F91320F16402EF94997041EBD6AD49F2D6
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 00FA4A08
                                                                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00FA4A5C
                                                                            • SetErrorMode.KERNEL32(00000000,?,?,00FCCC08), ref: 00FA4AD0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$InformationVolume
                                                                            • String ID: %lu
                                                                            • API String ID: 2507767853-685833217
                                                                            • Opcode ID: 84558129202e02ab0e26badab146f832dcef51c96398ccdf932705a516cd1dd1
                                                                            • Instruction ID: 4844c1a13d1e979ef8e6185e9c9014be76801a3aa8b03f8289a150f1e822ca1d
                                                                            • Opcode Fuzzy Hash: 84558129202e02ab0e26badab146f832dcef51c96398ccdf932705a516cd1dd1
                                                                            • Instruction Fuzzy Hash: 5831D271A00109AFDB10DF54C981EAA7BF8EF49318F1480A9F908DB352DBB5ED45DBA1
                                                                            APIs
                                                                              • Part of subcall function 00F36B57: _wcslen.LIBCMT ref: 00F36B6A
                                                                              • Part of subcall function 00F92DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00F92DC5
                                                                              • Part of subcall function 00F92DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F92DD6
                                                                              • Part of subcall function 00F92DA7: GetCurrentThreadId.KERNEL32 ref: 00F92DDD
                                                                              • Part of subcall function 00F92DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00F92DE4
                                                                            • GetFocus.USER32 ref: 00F92F78
                                                                              • Part of subcall function 00F92DEE: GetParent.USER32(00000000), ref: 00F92DF9
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 00F92FC3
                                                                            • EnumChildWindows.USER32(?,00F9303B), ref: 00F92FEB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                            • String ID: %s%d
                                                                            • API String ID: 1272988791-1110647743
                                                                            • Opcode ID: 6a68c89fbe8085b73ebcd8546853e00f036716ad7b9169833f39c134f5de0ce7
                                                                            • Instruction ID: 200ea05bc1e4f80ba94e9b98c556b933312176d9683331a85250cf9e566f82d0
                                                                            • Opcode Fuzzy Hash: 6a68c89fbe8085b73ebcd8546853e00f036716ad7b9169833f39c134f5de0ce7
                                                                            • Instruction Fuzzy Hash: A311E4716002096BDF407F708D8AEED776AAF84314F048075FA0DDB252DE349909BB60
                                                                            APIs
                                                                            • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00F8D3BF
                                                                            • FreeLibrary.KERNEL32 ref: 00F8D3E5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: AddressFreeLibraryProc
                                                                            • String ID: GetSystemWow64DirectoryW$X64
                                                                            • API String ID: 3013587201-2590602151
                                                                            • Opcode ID: d27686f5e2e605ed7376e409a77e64eabd7294ef8a0285a6022128f787e478d3
                                                                            • Instruction ID: 172dc952ed4a04bd7e07173994fe51fc9cdf407a610ba4be07aa4342d8d01dc6
                                                                            • Opcode Fuzzy Hash: d27686f5e2e605ed7376e409a77e64eabd7294ef8a0285a6022128f787e478d3
                                                                            • Instruction Fuzzy Hash: D6F0AB33C02622EBD33232118C59FE9B310AF00701F598119F80AE30C5DB20CD40B3C2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 91c007c858b434a6ad71b7f3f90c97feccc5e6965d9e7f80df4d1452e8f26b85
                                                                            • Instruction ID: 37154d77f25197aa91f4d7bfe25a4a65b797ddb586c17450675e663f5d632791
                                                                            • Opcode Fuzzy Hash: 91c007c858b434a6ad71b7f3f90c97feccc5e6965d9e7f80df4d1452e8f26b85
                                                                            • Instruction Fuzzy Hash: 2FC11B75A0021AEFEB14CF94C894EAEB7B5FF48714F208598E505EB251DB31DD81EB90
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: __alldvrm$_strrchr
                                                                            • String ID:
                                                                            • API String ID: 1036877536-0
                                                                            • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                            • Instruction ID: 3ed389782f5bb65d5dc2de8273a291c3a6ba9efb038f9df5db23cccda3cf183f
                                                                            • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                            • Instruction Fuzzy Hash: 69A18E72E00356AFDB26DF18CC917AEBBF4EF62360F14416DE5559B282C238AD81E750
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInitInitializeUninitialize
                                                                            • String ID:
                                                                            • API String ID: 1998397398-0
                                                                            • Opcode ID: d4ad0e93f901fe972b2dbf10538d96c8e849ef9c65fe674cb9620a0a7fad0543
                                                                            • Instruction ID: b39d47d2208e0af4756d68bfe410d5ffb296b27c51d78dcfbf7e9ea675f45a70
                                                                            • Opcode Fuzzy Hash: d4ad0e93f901fe972b2dbf10538d96c8e849ef9c65fe674cb9620a0a7fad0543
                                                                            • Instruction Fuzzy Hash: 94A16D756043009FCB14EF29C985A5AB7E5FF88720F088859F9499B362DB34ED01EF91
                                                                            APIs
                                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00FCFC08,?), ref: 00F905F0
                                                                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00FCFC08,?), ref: 00F90608
                                                                            • CLSIDFromProgID.OLE32(?,?,00000000,00FCCC40,000000FF,?,00000000,00000800,00000000,?,00FCFC08,?), ref: 00F9062D
                                                                            • _memcmp.LIBVCRUNTIME ref: 00F9064E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FromProg$FreeTask_memcmp
                                                                            • String ID:
                                                                            • API String ID: 314563124-0
                                                                            • Opcode ID: 92ae87863a495b29ef2d9bcff8561358fd805c13720f4551e46a7b9b59f57a4f
                                                                            • Instruction ID: 3be96a316969fd47948b5f153b0480f2a9617160e179b2de2673cb55748e5ac8
                                                                            • Opcode Fuzzy Hash: 92ae87863a495b29ef2d9bcff8561358fd805c13720f4551e46a7b9b59f57a4f
                                                                            • Instruction Fuzzy Hash: 2B810671A00109EFDF04DF94C984EEEB7B9FF89315F244598E506AB250DB71AE06DB60
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _free
                                                                            • String ID:
                                                                            • API String ID: 269201875-0
                                                                            • Opcode ID: 45dd52bc277abc44171b19370028dbc6b263b63f58575fd09b55dbae38520e62
                                                                            • Instruction ID: 05494fe114e7ecd7b13d5a6bf4f518c400be1d326ba01e6b5c6a21c075082c78
                                                                            • Opcode Fuzzy Hash: 45dd52bc277abc44171b19370028dbc6b263b63f58575fd09b55dbae38520e62
                                                                            • Instruction Fuzzy Hash: A3414B72A001006BDB25EFBC9C46AAE3AA5FF42770F14C267F91DD3191E678484D7263
                                                                            APIs
                                                                            • GetWindowRect.USER32(0115CAD8,?), ref: 00FC62E2
                                                                            • ScreenToClient.USER32(?,?), ref: 00FC6315
                                                                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00FC6382
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ClientMoveRectScreen
                                                                            • String ID:
                                                                            • API String ID: 3880355969-0
                                                                            • Opcode ID: 1b5d700d0dfe11628755d150dddcad2f4e95233dacf4b28a84ffc6fe2c5469d2
                                                                            • Instruction ID: bf83720ceec6ca5109f84a9acb3aaa16d93d31e14db46e4f098114a5e3102ec3
                                                                            • Opcode Fuzzy Hash: 1b5d700d0dfe11628755d150dddcad2f4e95233dacf4b28a84ffc6fe2c5469d2
                                                                            • Instruction Fuzzy Hash: 35512974A0424AAFCF24DF54DA82EAE7BB5EB85360F10815DF855D7290D730ED41EB90
                                                                            APIs
                                                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 00FB1AFD
                                                                            • WSAGetLastError.WSOCK32 ref: 00FB1B0B
                                                                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00FB1B8A
                                                                            • WSAGetLastError.WSOCK32 ref: 00FB1B94
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$socket
                                                                            • String ID:
                                                                            • API String ID: 1881357543-0
                                                                            • Opcode ID: e88621152209e5ef7fa380af039d79caa9ebe4d1dc63a2c984a63505037064aa
                                                                            • Instruction ID: f063d57c0ef76b605c32fc25a43d85fd37c5de1175585ab9d38cb90267ea0ecc
                                                                            • Opcode Fuzzy Hash: e88621152209e5ef7fa380af039d79caa9ebe4d1dc63a2c984a63505037064aa
                                                                            • Instruction Fuzzy Hash: 7B41D175600200AFE720AF20CC86F6A7BE5AB84728F54C44CFA1A9F7D2D776DD419B90
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5de933fc2a69f588e7fa42309e840968b18bd5b12c63ab7d53002d7bd5fb337b
                                                                            • Instruction ID: 6c3c73fe338719740ba25122972b498e1e4f57cf0753cbb5d6e54ddd09d620c5
                                                                            • Opcode Fuzzy Hash: 5de933fc2a69f588e7fa42309e840968b18bd5b12c63ab7d53002d7bd5fb337b
                                                                            • Instruction Fuzzy Hash: AD415C71A00314BFD724EF38CC41BAA7BE9EB84720F10852EF546DB282D775A941A790
                                                                            APIs
                                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00FA5783
                                                                            • GetLastError.KERNEL32(?,00000000), ref: 00FA57A9
                                                                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00FA57CE
                                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00FA57FA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                                                            • String ID:
                                                                            • API String ID: 3321077145-0
                                                                            • Opcode ID: 988a562bf4042f3a6119665eaa9470cb38901522df2337f4ac197d54f6682959
                                                                            • Instruction ID: c4d1088c09934395c5e1108c997bcbc14161476c46c18b3feec1b7880874e4b1
                                                                            • Opcode Fuzzy Hash: 988a562bf4042f3a6119665eaa9470cb38901522df2337f4ac197d54f6682959
                                                                            • Instruction Fuzzy Hash: FA415079600614DFCF14EF15C545A5DBBE1EF49720F188488E94AAB365CB38FD00EB91
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00F56D71,00000000,00000000,00F582D9,?,00F582D9,?,00000001,00F56D71,8BE85006,00000001,00F582D9,00F582D9), ref: 00F6D910
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F6D999
                                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00F6D9AB
                                                                            • __freea.LIBCMT ref: 00F6D9B4
                                                                              • Part of subcall function 00F63820: RtlAllocateHeap.NTDLL(00000000,?,01001444,?,00F4FDF5,?,?,00F3A976,00000010,01001440,00F313FC,?,00F313C6,?,00F31129), ref: 00F63852
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                            • String ID:
                                                                            • API String ID: 2652629310-0
                                                                            • Opcode ID: 610af1e008eadf5144d6936ea13cbe5f498beccbecf8cccf8deb520ec823ef2e
                                                                            • Instruction ID: 343bbbc2808ad964d4fa05fa913f449d35f20d184cc2418da1e1659ab40003a4
                                                                            • Opcode Fuzzy Hash: 610af1e008eadf5144d6936ea13cbe5f498beccbecf8cccf8deb520ec823ef2e
                                                                            • Instruction Fuzzy Hash: DF31AD72E0020AABDB249F65DC45EAF7BA5EB41760B054168FC08D7250EB39DD54EBA0
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 00FC5352
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00FC5375
                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00FC5382
                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00FC53A8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: LongWindow$InvalidateMessageRectSend
                                                                            • String ID:
                                                                            • API String ID: 3340791633-0
                                                                            • Opcode ID: f330c96ec31f7fac195330eb1ec34079432ea5c990695ea256f4224f2cfc17e2
                                                                            • Instruction ID: 2f15c45d5230e1203f65f9ccce4913eeb304e6964b833b42361a5eee89fab928
                                                                            • Opcode Fuzzy Hash: f330c96ec31f7fac195330eb1ec34079432ea5c990695ea256f4224f2cfc17e2
                                                                            • Instruction Fuzzy Hash: 4831F431F55A4AAFEB349A54CE07FE83763AB04BA0F584109FA54861D1C7B5B9C0BB41
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00F9ABF1
                                                                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00F9AC0D
                                                                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 00F9AC74
                                                                            • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00F9ACC6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: KeyboardState$InputMessagePostSend
                                                                            • String ID:
                                                                            • API String ID: 432972143-0
                                                                            • Opcode ID: ac7fb27e375aa883a92a70b4d75d9b030f516400b4c1bf5d635df5d49db35795
                                                                            • Instruction ID: 705542e6f9446113ed645ee0f96bda573398a2957e515c6cd753d3285f1a216b
                                                                            • Opcode Fuzzy Hash: ac7fb27e375aa883a92a70b4d75d9b030f516400b4c1bf5d635df5d49db35795
                                                                            • Instruction Fuzzy Hash: FE310530E04718AFFF35CB658C05BFA7BA5AB89321F04471AE4859A1D1C379C985B7E2
                                                                            APIs
                                                                            • ClientToScreen.USER32(?,?), ref: 00FC769A
                                                                            • GetWindowRect.USER32(?,?), ref: 00FC7710
                                                                            • PtInRect.USER32(?,?,00FC8B89), ref: 00FC7720
                                                                            • MessageBeep.USER32(00000000), ref: 00FC778C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$BeepClientMessageScreenWindow
                                                                            • String ID:
                                                                            • API String ID: 1352109105-0
                                                                            • Opcode ID: 57f80ab76b4b377d76344c180b6a67b8dfdbd0873dc88378e98086c01b204c0e
                                                                            • Instruction ID: 2706c54389c97afd460ffaaf5805b87cd334c78682ba863188766b506fab85a8
                                                                            • Opcode Fuzzy Hash: 57f80ab76b4b377d76344c180b6a67b8dfdbd0873dc88378e98086c01b204c0e
                                                                            • Instruction Fuzzy Hash: 53419F34A0531AAFCB11EF68CA86FA9BBF4BF48310F1440ACE4549B251C335E941EF90
                                                                            APIs
                                                                            • GetForegroundWindow.USER32 ref: 00FC16EB
                                                                              • Part of subcall function 00F93A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F93A57
                                                                              • Part of subcall function 00F93A3D: GetCurrentThreadId.KERNEL32 ref: 00F93A5E
                                                                              • Part of subcall function 00F93A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F925B3), ref: 00F93A65
                                                                            • GetCaretPos.USER32(?), ref: 00FC16FF
                                                                            • ClientToScreen.USER32(00000000,?), ref: 00FC174C
                                                                            • GetForegroundWindow.USER32 ref: 00FC1752
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                            • String ID:
                                                                            • API String ID: 2759813231-0
                                                                            • Opcode ID: eaac3cd5f3c66db447d64c0b11e089de4fce33e396c2a38ec1774a330176d5e2
                                                                            • Instruction ID: c81cc2dbdc9121c65e2ef24a6afc1ade7a166ade41c80ec209fe53d5728002a5
                                                                            • Opcode Fuzzy Hash: eaac3cd5f3c66db447d64c0b11e089de4fce33e396c2a38ec1774a330176d5e2
                                                                            • Instruction Fuzzy Hash: B9316FB5D00209AFCB04EFA9C981DAEBBF9EF49314B5080A9E415E7212D735DE45DFA0
                                                                            APIs
                                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00F9D501
                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00F9D50F
                                                                            • Process32NextW.KERNEL32(00000000,?), ref: 00F9D52F
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00F9D5DC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                            • String ID:
                                                                            • API String ID: 420147892-0
                                                                            • Opcode ID: 2ebc3bda44476cb4995eaabe391839b9d0b2850b133ccec874c7adc05233b6f6
                                                                            • Instruction ID: b480a7dcbcd31ad065d48cf73f78da5fd6c4033d5d583559a1c02ec4f9b1769d
                                                                            • Opcode Fuzzy Hash: 2ebc3bda44476cb4995eaabe391839b9d0b2850b133ccec874c7adc05233b6f6
                                                                            • Instruction Fuzzy Hash: C53193711083009FD700EF54CC81AAFBBE8EFD9364F54092DF585871A1EBB19949EB92
                                                                            APIs
                                                                              • Part of subcall function 00F49BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00F49BB2
                                                                            • GetCursorPos.USER32(?), ref: 00FC9001
                                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00F87711,?,?,?,?,?), ref: 00FC9016
                                                                            • GetCursorPos.USER32(?), ref: 00FC905E
                                                                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00F87711,?,?,?), ref: 00FC9094
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                            • String ID:
                                                                            • API String ID: 2864067406-0
                                                                            • Opcode ID: 6ec8b9c1d8a60871e04ae01a5d36c1ceff41918a6dbb61b24890c8a92ddd5717
                                                                            • Instruction ID: da46561950884c40e9e33c2e754a0a8d6e17880cfdd9a247b78716adc36e45a0
                                                                            • Opcode Fuzzy Hash: 6ec8b9c1d8a60871e04ae01a5d36c1ceff41918a6dbb61b24890c8a92ddd5717
                                                                            • Instruction Fuzzy Hash: 4321A135A04018FFDB268FA4C95AFFA7BB9EF89360F044059F90547261C3759990FBA0
                                                                            APIs
                                                                            • GetFileAttributesW.KERNEL32(?,00FCCB68), ref: 00F9D2FB
                                                                            • GetLastError.KERNEL32 ref: 00F9D30A
                                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F9D319
                                                                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00FCCB68), ref: 00F9D376
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectory$AttributesErrorFileLast
                                                                            • String ID:
                                                                            • API String ID: 2267087916-0
                                                                            • Opcode ID: 97040ad723ebd0b6d1df70264071991255904af57961bbcc0e5cf465db70b37a
                                                                            • Instruction ID: df3759248d71d8651e3de0c0996159e0b962174c1ad243e89a264bb905beadce
                                                                            • Opcode Fuzzy Hash: 97040ad723ebd0b6d1df70264071991255904af57961bbcc0e5cf465db70b37a
                                                                            • Instruction Fuzzy Hash: 8F21A370908201DF9B00DF24C981CAA77E4EF95375F604A1DF499C32A1D731D946EB93
                                                                            APIs
                                                                              • Part of subcall function 00F91014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F9102A
                                                                              • Part of subcall function 00F91014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F91036
                                                                              • Part of subcall function 00F91014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F91045
                                                                              • Part of subcall function 00F91014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F9104C
                                                                              • Part of subcall function 00F91014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F91062
                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00F915BE
                                                                            • _memcmp.LIBVCRUNTIME ref: 00F915E1
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F91617
                                                                            • HeapFree.KERNEL32(00000000), ref: 00F9161E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                            • String ID:
                                                                            • API String ID: 1592001646-0
                                                                            • Opcode ID: d1903b948c66c0b1005c146cb2111eef9e686bca703b2126e95ed651a1df688e
                                                                            • Instruction ID: bc1e9651343886d12b2cced1c69e201e80e31b4ea2c2869d1f33eb5c388694b6
                                                                            • Opcode Fuzzy Hash: d1903b948c66c0b1005c146cb2111eef9e686bca703b2126e95ed651a1df688e
                                                                            • Instruction Fuzzy Hash: 6D219D31E4010AEFEF10DFA5C945BEEB7B8FF44354F094469E445AB241E730AA05EBA0
                                                                            APIs
                                                                            • GetWindowLongW.USER32(?,000000EC), ref: 00FC280A
                                                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00FC2824
                                                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00FC2832
                                                                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00FC2840
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$AttributesLayered
                                                                            • String ID:
                                                                            • API String ID: 2169480361-0
                                                                            • Opcode ID: d3b228249a4b88d41e4896d7682ac21cdca9a57f2610573b3e37a5ab61f1aae2
                                                                            • Instruction ID: 90ae92ab2bbb8444204a605236d93b3d63febed4131398b61940ba9cb78cca3c
                                                                            • Opcode Fuzzy Hash: d3b228249a4b88d41e4896d7682ac21cdca9a57f2610573b3e37a5ab61f1aae2
                                                                            • Instruction Fuzzy Hash: 04212131204112AFD7549B24CD82FAA7B95EF85324F18810CF42A8B6E2CB75FC42DBD0
                                                                            APIs
                                                                              • Part of subcall function 00F98D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00F9790A,?,000000FF,?,00F98754,00000000,?,0000001C,?,?), ref: 00F98D8C
                                                                              • Part of subcall function 00F98D7D: lstrcpyW.KERNEL32(00000000,?,?,00F9790A,?,000000FF,?,00F98754,00000000,?,0000001C,?,?,00000000), ref: 00F98DB2
                                                                              • Part of subcall function 00F98D7D: lstrcmpiW.KERNEL32(00000000,?,00F9790A,?,000000FF,?,00F98754,00000000,?,0000001C,?,?), ref: 00F98DE3
                                                                            • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00F98754,00000000,?,0000001C,?,?,00000000), ref: 00F97923
                                                                            • lstrcpyW.KERNEL32(00000000,?,?,00F98754,00000000,?,0000001C,?,?,00000000), ref: 00F97949
                                                                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,00F98754,00000000,?,0000001C,?,?,00000000), ref: 00F97984
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: lstrcmpilstrcpylstrlen
                                                                            • String ID: cdecl
                                                                            • API String ID: 4031866154-3896280584
                                                                            • Opcode ID: 21ac3822de8a99590b9e2bb47382c9333d81b7a0a7c6bf17d33bf0f227f70d14
                                                                            • Instruction ID: e13d125cff2f83cdf12a088fd1d69fa4a3122f83991e28a52f1150d143969185
                                                                            • Opcode Fuzzy Hash: 21ac3822de8a99590b9e2bb47382c9333d81b7a0a7c6bf17d33bf0f227f70d14
                                                                            • Instruction Fuzzy Hash: 8911E43A600305ABDF156F35DC45E7A77A5EF85390B10402AE906C7264EB319801E791
                                                                            APIs
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00FC7D0B
                                                                            • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00FC7D2A
                                                                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00FC7D42
                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00FAB7AD,00000000), ref: 00FC7D6B
                                                                              • Part of subcall function 00F49BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00F49BB2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long
                                                                            • String ID:
                                                                            • API String ID: 847901565-0
                                                                            • Opcode ID: 295fcb37e195882e8fa669e50a33072c1c41f015a857531f4bb5b80e677a9ed1
                                                                            • Instruction ID: a53be2344b31aa2d7f78641576fc39fdd5d3c63e610d7c18ee23b33130be92a0
                                                                            • Opcode Fuzzy Hash: 295fcb37e195882e8fa669e50a33072c1c41f015a857531f4bb5b80e677a9ed1
                                                                            • Instruction Fuzzy Hash: 03118C32A0461AAFCB11AF28DD05FA63BA5AF45370F154728F83AD72E0D7319950EF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: deb6ea86a290ccee9b4b18be5c4b283ace8d800d54dfbcf5921a7fec86086f47
                                                                            • Instruction ID: 9c926f2455beb7f684b1754dfe9e0aa6b6c3b1a63d7bb371e58c5cf6df541965
                                                                            • Opcode Fuzzy Hash: deb6ea86a290ccee9b4b18be5c4b283ace8d800d54dfbcf5921a7fec86086f47
                                                                            • Instruction Fuzzy Hash: 4201D6B2A05A1A3EF62126786CC1F27762CEF817B8F380326F521522D2DB658C007170
                                                                            APIs
                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00F91A47
                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F91A59
                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F91A6F
                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F91A8A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: c95f1ae0b62abc97e428861f6881a217368176324097ae8309ec52497de6acfe
                                                                            • Instruction ID: 5b26874d3c5382e2365daeaecf66708e7217bf2de0668d02d439aedbe5874252
                                                                            • Opcode Fuzzy Hash: c95f1ae0b62abc97e428861f6881a217368176324097ae8309ec52497de6acfe
                                                                            • Instruction Fuzzy Hash: DF11F73AD01219FFEF119BA5CD85FADBB78FB08750F2000A1EA04B7290D6756E50EB94
                                                                            APIs
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00F9E1FD
                                                                            • MessageBoxW.USER32(?,?,?,?), ref: 00F9E230
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00F9E246
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00F9E24D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                            • String ID:
                                                                            • API String ID: 2880819207-0
                                                                            • Opcode ID: 37d9a2322d1752aa4faca06535714c8d71d04dbca4bf3bf6fe426e3b1a74a177
                                                                            • Instruction ID: 1921e3bad3547f460dbda3462876c3ce3b452763af2d3c0434ef616eea5ba6e2
                                                                            • Opcode Fuzzy Hash: 37d9a2322d1752aa4faca06535714c8d71d04dbca4bf3bf6fe426e3b1a74a177
                                                                            • Instruction Fuzzy Hash: 08112672D04258BFDB11DFA8AC0AE9E7FACEB45320F148215F928E3281D6B5CD0497A0
                                                                            APIs
                                                                            • CreateThread.KERNEL32(00000000,?,00F5CFF9,00000000,00000004,00000000), ref: 00F5D218
                                                                            • GetLastError.KERNEL32 ref: 00F5D224
                                                                            • __dosmaperr.LIBCMT ref: 00F5D22B
                                                                            • ResumeThread.KERNEL32(00000000), ref: 00F5D249
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                            • String ID:
                                                                            • API String ID: 173952441-0
                                                                            • Opcode ID: e543ae07f896ad487517e44655f8596fc7cd91413d29793d6ba16a916d5713fd
                                                                            • Instruction ID: e88086efaff1f943ff6face9ff8ae7ec90e14cbe71837f784065366db93005c4
                                                                            • Opcode Fuzzy Hash: e543ae07f896ad487517e44655f8596fc7cd91413d29793d6ba16a916d5713fd
                                                                            • Instruction Fuzzy Hash: A201F9768066087BD7315BA5DC05FAE7A69DF81332F100259FE25921D0DB75C909F7E0
                                                                            APIs
                                                                              • Part of subcall function 00F49BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00F49BB2
                                                                            • GetClientRect.USER32(?,?), ref: 00FC9F31
                                                                            • GetCursorPos.USER32(?), ref: 00FC9F3B
                                                                            • ScreenToClient.USER32(?,?), ref: 00FC9F46
                                                                            • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00FC9F7A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Client$CursorLongProcRectScreenWindow
                                                                            • String ID:
                                                                            • API String ID: 4127811313-0
                                                                            • Opcode ID: 807a31659244b3d523127e8e04aafbda2f249ef1444096f0afa1c2d3614a3ff9
                                                                            • Instruction ID: 8b8e8524542221f470c02f9840c8587ae4f7304e5a95da9b74b65fa5a59deff6
                                                                            • Opcode Fuzzy Hash: 807a31659244b3d523127e8e04aafbda2f249ef1444096f0afa1c2d3614a3ff9
                                                                            • Instruction Fuzzy Hash: D711183290411AEBDB11DF68DA8AEEE77B9FB45311F000459F911E3140D775BA81EBA1
                                                                            APIs
                                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00F3604C
                                                                            • GetStockObject.GDI32(00000011), ref: 00F36060
                                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F3606A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CreateMessageObjectSendStockWindow
                                                                            • String ID:
                                                                            • API String ID: 3970641297-0
                                                                            • Opcode ID: 02f35ae8e1257679a0184536f9dff1ab0e26630b06375459997c9135c8245870
                                                                            • Instruction ID: 3d0c240a2a2bfcd2c35ad5f9558606803bbad6230347ea99749be680023897f3
                                                                            • Opcode Fuzzy Hash: 02f35ae8e1257679a0184536f9dff1ab0e26630b06375459997c9135c8245870
                                                                            • Instruction Fuzzy Hash: 4C116DB2501508BFEF164FA49D46EEABB69EF093B4F044216FA1892110D736DC60FBA0
                                                                            APIs
                                                                            • ___BuildCatchObject.LIBVCRUNTIME ref: 00F53B56
                                                                              • Part of subcall function 00F53AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00F53AD2
                                                                              • Part of subcall function 00F53AA3: ___AdjustPointer.LIBCMT ref: 00F53AED
                                                                            • _UnwindNestedFrames.LIBCMT ref: 00F53B6B
                                                                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00F53B7C
                                                                            • CallCatchBlock.LIBVCRUNTIME ref: 00F53BA4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                            • String ID:
                                                                            • API String ID: 737400349-0
                                                                            • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                            • Instruction ID: 0c88a69af704ad1c8f587265d49967e995174b32f1cfcedfa479e9d3c69af7bc
                                                                            • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                            • Instruction Fuzzy Hash: A6012932500148BBDF125E99CC42EEB3B69EF887A9F044014FF4896121C736E965EBA0
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00F313C6,00000000,00000000,?,00F6301A,00F313C6,00000000,00000000,00000000,?,00F6328B,00000006,FlsSetValue), ref: 00F630A5
                                                                            • GetLastError.KERNEL32(?,00F6301A,00F313C6,00000000,00000000,00000000,?,00F6328B,00000006,FlsSetValue,00FD2290,FlsSetValue,00000000,00000364,?,00F62E46), ref: 00F630B1
                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00F6301A,00F313C6,00000000,00000000,00000000,?,00F6328B,00000006,FlsSetValue,00FD2290,FlsSetValue,00000000), ref: 00F630BF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad$ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 3177248105-0
                                                                            • Opcode ID: 14e61367aea5ce794db5bc23aff2e5a84b8ebd65705f29ca6036771b69a4475f
                                                                            • Instruction ID: bf14876d1139bb4fa61cf9e37d8b4c7e771b245d9707dfa6b38a28994ea76be0
                                                                            • Opcode Fuzzy Hash: 14e61367aea5ce794db5bc23aff2e5a84b8ebd65705f29ca6036771b69a4475f
                                                                            • Instruction Fuzzy Hash: 3101F732701226BBCB314B79AC45E677B98EF45BB9B100720F909E3140C721D909E6E0
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00F9747F
                                                                            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00F97497
                                                                            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00F974AC
                                                                            • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00F974CA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Type$Register$FileLoadModuleNameUser
                                                                            • String ID:
                                                                            • API String ID: 1352324309-0
                                                                            • Opcode ID: 120ac3b9d499ae46067795d1c0a6b4050c884f0d13dfc1d7a682a2dd8fd85c23
                                                                            • Instruction ID: 218c2d95ff1a4f2a4597e9fcdf24f7476090667effa338d39bdc6cb4327dbbf3
                                                                            • Opcode Fuzzy Hash: 120ac3b9d499ae46067795d1c0a6b4050c884f0d13dfc1d7a682a2dd8fd85c23
                                                                            • Instruction Fuzzy Hash: BE117CB1615314DBFB20DF19DD09F927BB8EB00B00F108569E61AD7192D770E904AB90
                                                                            APIs
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00F9ACD3,?,00008000), ref: 00F9B0C4
                                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00F9ACD3,?,00008000), ref: 00F9B0E9
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00F9ACD3,?,00008000), ref: 00F9B0F3
                                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00F9ACD3,?,00008000), ref: 00F9B126
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CounterPerformanceQuerySleep
                                                                            • String ID:
                                                                            • API String ID: 2875609808-0
                                                                            • Opcode ID: bb53a9da0ab159c19e107a50e9bf73054b1c5af7597a3e5445d04957fa461273
                                                                            • Instruction ID: 9fe8d4fdb16d49c5076d3f6a9e7d471c27c3a49995ee0732e7db330947261856
                                                                            • Opcode Fuzzy Hash: bb53a9da0ab159c19e107a50e9bf73054b1c5af7597a3e5445d04957fa461273
                                                                            • Instruction Fuzzy Hash: C0115B31C0162CE7DF00AFE5EA69AEEBF78FF49711F114095D941B3181CB305690AB91
                                                                            APIs
                                                                            • GetWindowRect.USER32(?,?), ref: 00FC7E33
                                                                            • ScreenToClient.USER32(?,?), ref: 00FC7E4B
                                                                            • ScreenToClient.USER32(?,?), ref: 00FC7E6F
                                                                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00FC7E8A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ClientRectScreen$InvalidateWindow
                                                                            • String ID:
                                                                            • API String ID: 357397906-0
                                                                            • Opcode ID: f4b712aacbdd29a9b24b8243c8c37e898a9bfc144ea35193784846a031a42314
                                                                            • Instruction ID: c0d0f4b62357bcf0236d9d663ba72efadd93a437388e007cdc9d813510399999
                                                                            • Opcode Fuzzy Hash: f4b712aacbdd29a9b24b8243c8c37e898a9bfc144ea35193784846a031a42314
                                                                            • Instruction Fuzzy Hash: 9A1143B9D0020AAFDB41DF98C985AEEBBF5FF08310F505056E915E3210D735AA55DF90
                                                                            APIs
                                                                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00F92DC5
                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F92DD6
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00F92DDD
                                                                            • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00F92DE4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                            • String ID:
                                                                            • API String ID: 2710830443-0
                                                                            • Opcode ID: 44e4dbd15b1b616dd9f7fb305a2cb2d33b23498a9e6252eeb57a4e60a5161bc9
                                                                            • Instruction ID: 144dee92e64faa8a6624549b5f151be75f179b1a7d99048983155b2a260a818c
                                                                            • Opcode Fuzzy Hash: 44e4dbd15b1b616dd9f7fb305a2cb2d33b23498a9e6252eeb57a4e60a5161bc9
                                                                            • Instruction Fuzzy Hash: 2CE065715012287AEB2017639D0EFE73E5CEF42B61F000015F109D20409AA18445F6F0
                                                                            APIs
                                                                              • Part of subcall function 00F49639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F49693
                                                                              • Part of subcall function 00F49639: SelectObject.GDI32(?,00000000), ref: 00F496A2
                                                                              • Part of subcall function 00F49639: BeginPath.GDI32(?), ref: 00F496B9
                                                                              • Part of subcall function 00F49639: SelectObject.GDI32(?,00000000), ref: 00F496E2
                                                                            • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00FC8887
                                                                            • LineTo.GDI32(?,?,?), ref: 00FC8894
                                                                            • EndPath.GDI32(?), ref: 00FC88A4
                                                                            • StrokePath.GDI32(?), ref: 00FC88B2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                            • String ID:
                                                                            • API String ID: 1539411459-0
                                                                            • Opcode ID: 95405e36052e4e5ad9e37b7c1c0df9d0fc9e25b668cc719f878a003f69f3baf9
                                                                            • Instruction ID: 9b63ccc69464b041c584f1f44f85084b2d9998bae0e21f412e6f42e7b647afa8
                                                                            • Opcode Fuzzy Hash: 95405e36052e4e5ad9e37b7c1c0df9d0fc9e25b668cc719f878a003f69f3baf9
                                                                            • Instruction Fuzzy Hash: 0AF05E36045259FADB225F94AD0AFDE3F59AF06310F048004FA55A60E1C7B95511EFE5
                                                                            APIs
                                                                            • GetSysColor.USER32(00000008), ref: 00F498CC
                                                                            • SetTextColor.GDI32(?,?), ref: 00F498D6
                                                                            • SetBkMode.GDI32(?,00000001), ref: 00F498E9
                                                                            • GetStockObject.GDI32(00000005), ref: 00F498F1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Color$ModeObjectStockText
                                                                            • String ID:
                                                                            • API String ID: 4037423528-0
                                                                            • Opcode ID: 96552f8f42157becf96a02fbaa393c25dfad74ce8a45c905fd37aa6f158082d6
                                                                            • Instruction ID: 5c1c4ceddffb8e5fd02ad80ee2e231ab27fad2f1d231e62b30bd7e67d193f91e
                                                                            • Opcode Fuzzy Hash: 96552f8f42157becf96a02fbaa393c25dfad74ce8a45c905fd37aa6f158082d6
                                                                            • Instruction Fuzzy Hash: B0E06531644284AEDB216B75BD0AFD93F10AB51735F188219F6FD590E1C3718640BB10
                                                                            APIs
                                                                            • GetCurrentThread.KERNEL32 ref: 00F91634
                                                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,00F911D9), ref: 00F9163B
                                                                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00F911D9), ref: 00F91648
                                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,00F911D9), ref: 00F9164F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentOpenProcessThreadToken
                                                                            • String ID:
                                                                            • API String ID: 3974789173-0
                                                                            • Opcode ID: bca393a582915906600dd5a68e5298d5218136badb4826c3382f8c126f5301ba
                                                                            • Instruction ID: fe12c3bd0f2ca3a3df0fe1b138b698db01c2aa7ecb957ea13cd944e2b6fa2322
                                                                            • Opcode Fuzzy Hash: bca393a582915906600dd5a68e5298d5218136badb4826c3382f8c126f5301ba
                                                                            • Instruction Fuzzy Hash: FBE08671E41215DBEB201FA0AF0EF863B7CBF847A1F184818F249CA080D6358441E790
                                                                            APIs
                                                                            • GetDesktopWindow.USER32 ref: 00F8D858
                                                                            • GetDC.USER32(00000000), ref: 00F8D862
                                                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00F8D882
                                                                            • ReleaseDC.USER32(?), ref: 00F8D8A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 2889604237-0
                                                                            • Opcode ID: 674cf15e36a41e750dc82351f9c6450270ee939679fdbaa66f429d474ec3ba35
                                                                            • Instruction ID: 76a214a5b8b12438c8e0a5f1706fcfd5792bfbbde9d2bf25199ea6c5332c53dd
                                                                            • Opcode Fuzzy Hash: 674cf15e36a41e750dc82351f9c6450270ee939679fdbaa66f429d474ec3ba35
                                                                            • Instruction Fuzzy Hash: 1EE09AB5840209DFCB41AFA4DA0DA6DBBB5FB48311F148459E84EE7250C7399942BF90
                                                                            APIs
                                                                            • GetDesktopWindow.USER32 ref: 00F8D86C
                                                                            • GetDC.USER32(00000000), ref: 00F8D876
                                                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00F8D882
                                                                            • ReleaseDC.USER32(?), ref: 00F8D8A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 2889604237-0
                                                                            • Opcode ID: a7a1b9e512ac22d0ca4b0a8023fe0e2fc676f5e90cf111d13c9f0095ab054513
                                                                            • Instruction ID: 1162f6728b65c86691595b0d65a79818ae836713465b2b0507efc878af7135cc
                                                                            • Opcode Fuzzy Hash: a7a1b9e512ac22d0ca4b0a8023fe0e2fc676f5e90cf111d13c9f0095ab054513
                                                                            • Instruction Fuzzy Hash: CCE092B5C00208EFCB51AFA4DA0DA6DBBB5BB48311F148449E94EE7250CB399902BF90
                                                                            APIs
                                                                            • __Init_thread_footer.LIBCMT ref: 00F3BEB3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Init_thread_footer
                                                                            • String ID: D%$D%
                                                                            • API String ID: 1385522511-485025506
                                                                            • Opcode ID: 3738c92ba9d45e618168756cf39bff34c91476b95b40f9e89446452b06fb443b
                                                                            • Instruction ID: 2e8cdb7c856792cddef04331c4262e98887227b240044b8142f20c7b13a7833d
                                                                            • Opcode Fuzzy Hash: 3738c92ba9d45e618168756cf39bff34c91476b95b40f9e89446452b06fb443b
                                                                            • Instruction Fuzzy Hash: A1911B75E00206DFCB28CF59C0A16A9B7F1FF58325F24416EDA85AB351D731E981EB90
                                                                            APIs
                                                                              • Part of subcall function 00F37620: _wcslen.LIBCMT ref: 00F37625
                                                                            • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00FA4ED4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Connection_wcslen
                                                                            • String ID: *$LPT
                                                                            • API String ID: 1725874428-3443410124
                                                                            • Opcode ID: d1161a41e9ba979f50bc7d99ac94216b5c4f69db62ec486190a9fe281499e679
                                                                            • Instruction ID: 11a1675128611ebb7451a58e27779045c30c2c71d7ce061ed7b57ee7681c0533
                                                                            • Opcode Fuzzy Hash: d1161a41e9ba979f50bc7d99ac94216b5c4f69db62ec486190a9fe281499e679
                                                                            • Instruction Fuzzy Hash: 409161B5A00204DFCB14DF58C485EAABBF1BF85314F198099E80A9F3A2C775ED85DB91
                                                                            APIs
                                                                            • __startOneArgErrorHandling.LIBCMT ref: 00F5E30D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorHandling__start
                                                                            • String ID: pow
                                                                            • API String ID: 3213639722-2276729525
                                                                            • Opcode ID: 023a1bf50456337be355d760fd0149bb4c13f172e2e70535d91bca03659d9005
                                                                            • Instruction ID: 0d9bc7823350ded7b9a10e338e7994d098e8451abdb5872f95de85bef107a9db
                                                                            • Opcode Fuzzy Hash: 023a1bf50456337be355d760fd0149bb4c13f172e2e70535d91bca03659d9005
                                                                            • Instruction Fuzzy Hash: F3518E61E0C30196CB197724CD0137A7F94AB60766F304D99E8D5422EDEB358DCDBB86
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: #
                                                                            • API String ID: 0-1885708031
                                                                            • Opcode ID: e67a0cc5154406ed5a4adab4a49b7dd42ff53276188d4d5b9f7a8c39a10ead4d
                                                                            • Instruction ID: b01389cc9061adf678ca0a7a0d2c8c4b74af5ce210c5fa4434a6d370a628fe42
                                                                            • Opcode Fuzzy Hash: e67a0cc5154406ed5a4adab4a49b7dd42ff53276188d4d5b9f7a8c39a10ead4d
                                                                            • Instruction Fuzzy Hash: 2C51F235E04246DFDB15EF28C8816FE7BA8FF55320F244055ECA19B290D7789E42EB90
                                                                            APIs
                                                                            • Sleep.KERNEL32(00000000), ref: 00F4F2A2
                                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 00F4F2BB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: GlobalMemorySleepStatus
                                                                            • String ID: @
                                                                            • API String ID: 2783356886-2766056989
                                                                            • Opcode ID: 9bc0238f8b4b1e576644f9e1fb9be883e4f1d92a634d6e1db54c38277f40d65d
                                                                            • Instruction ID: 9d882b8d41fcdfa7a3181e5d1932858686253ff690acd0059ad2a47548e15605
                                                                            • Opcode Fuzzy Hash: 9bc0238f8b4b1e576644f9e1fb9be883e4f1d92a634d6e1db54c38277f40d65d
                                                                            • Instruction Fuzzy Hash: B95137B140C7489BD320AF11DC86BAFBBF8FB84310F81885DF2D952195EB748529DB66
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00FB57E0
                                                                            • _wcslen.LIBCMT ref: 00FB57EC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper_wcslen
                                                                            • String ID: CALLARGARRAY
                                                                            • API String ID: 157775604-1150593374
                                                                            • Opcode ID: 137e8301410ef08a20abfd5c6fdfe2dfbb8c8c765377634c79ba21cff42a6e40
                                                                            • Instruction ID: 3dc8b9b62c3fb12eed21150cdf7ad36c66e92bbe5f23d8a3675c98f87961abe0
                                                                            • Opcode Fuzzy Hash: 137e8301410ef08a20abfd5c6fdfe2dfbb8c8c765377634c79ba21cff42a6e40
                                                                            • Instruction Fuzzy Hash: A3419F31E002099FCB14DFAAC882AEEBBB5EF59724F144029E505A7251E778DD81EF90
                                                                            APIs
                                                                            • _wcslen.LIBCMT ref: 00FAD130
                                                                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00FAD13A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CrackInternet_wcslen
                                                                            • String ID: |
                                                                            • API String ID: 596671847-2343686810
                                                                            • Opcode ID: f0b2c2aea5d41ad610cb2ebcc6b8f947a6f40f55f3303617beefbfe8ba816bab
                                                                            • Instruction ID: 3c3e24b0e313a9c1e000d4691af83ae882838879d596ca375fcbaa8b9e5a803f
                                                                            • Opcode Fuzzy Hash: f0b2c2aea5d41ad610cb2ebcc6b8f947a6f40f55f3303617beefbfe8ba816bab
                                                                            • Instruction Fuzzy Hash: 97313E71D00109EBDF15EFA4CC85AEE7FB9FF05310F104019F815A6161D735AA46EB64
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00FC461F
                                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00FC4634
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: '
                                                                            • API String ID: 3850602802-1997036262
                                                                            • Opcode ID: 324617a1965e0b82d2be3681b3fc854bdd4fd450c0dda0cc8d465c66b9bf87fe
                                                                            • Instruction ID: 04f453ed61a9012287b9bdcc55f16a289f42a13e948bd65ad1ac080fcd153758
                                                                            • Opcode Fuzzy Hash: 324617a1965e0b82d2be3681b3fc854bdd4fd450c0dda0cc8d465c66b9bf87fe
                                                                            • Instruction Fuzzy Hash: FF313975A0020A9FDB14CF69CA91FDABBB5FF49310F14446AE904AB385D770A941EF90
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00FC327C
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FC3287
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: Combobox
                                                                            • API String ID: 3850602802-2096851135
                                                                            • Opcode ID: dc7d7178ff97b112af1062aa60839d8961a44e29976a54a82e3781722ab77d2e
                                                                            • Instruction ID: 4bb80e7008905cd6f0f185c6a15de268f17b467753a9be9f46b4d57226114778
                                                                            • Opcode Fuzzy Hash: dc7d7178ff97b112af1062aa60839d8961a44e29976a54a82e3781722ab77d2e
                                                                            • Instruction Fuzzy Hash: A811E27170020A7FEF219E54DD82FFB376AEB943B4F108128F91897290D631DD51A760
                                                                            APIs
                                                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00FACD7D
                                                                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00FACDA6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$OpenOption
                                                                            • String ID: <local>
                                                                            • API String ID: 942729171-4266983199
                                                                            • Opcode ID: 1efb0971847ed22c4c3ef3e778e2f9957dd375969a73a2059a4a0a5b2b057621
                                                                            • Instruction ID: d9033af4d6d3a068badd62f66f0eda61cdae57e31349da8564ea043a804d582b
                                                                            • Opcode Fuzzy Hash: 1efb0971847ed22c4c3ef3e778e2f9957dd375969a73a2059a4a0a5b2b057621
                                                                            • Instruction Fuzzy Hash: 8411A3B26156367AD7244B668C45FE7BE6CEF137B4F004226F12983180D7609840E6F0
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                            • CharUpperBuffW.USER32(?,?,?), ref: 00F96CB6
                                                                            • _wcslen.LIBCMT ref: 00F96CC2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen$BuffCharUpper
                                                                            • String ID: STOP
                                                                            • API String ID: 1256254125-2411985666
                                                                            • Opcode ID: 7037d3262c2765224f4b3c141a971d56b61d883d949c79d045520ee352b5c99c
                                                                            • Instruction ID: 40d850fc4dd9e01afce3b2102aa4ac832e267dab023be549c44c86cd99108c35
                                                                            • Opcode Fuzzy Hash: 7037d3262c2765224f4b3c141a971d56b61d883d949c79d045520ee352b5c99c
                                                                            • Instruction Fuzzy Hash: 95010432A045278ADF219FBDDC819BF37A4EE60720B000525F862D3190EA75E840E650
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                              • Part of subcall function 00F93CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F93CCA
                                                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00F91D4C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_wcslen
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 624084870-1403004172
                                                                            • Opcode ID: ace332fe397bd5fc68e2fcc80f3b7d09884bf3a1cfce263f8df272968cf13764
                                                                            • Instruction ID: b3a8068ee0d18b4b04a8bb5850bda1e2aefa452bcf7da58f7c97388acd5997b4
                                                                            • Opcode Fuzzy Hash: ace332fe397bd5fc68e2fcc80f3b7d09884bf3a1cfce263f8df272968cf13764
                                                                            • Instruction Fuzzy Hash: FB012831E04219AB9F08EBA0CD11DFE73A8FF423A0F00051AF922573D1EAB45908F660
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                              • Part of subcall function 00F93CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F93CCA
                                                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 00F91C46
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_wcslen
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 624084870-1403004172
                                                                            • Opcode ID: d22880e4433ba87f5eab090a903db8bd02279c2b7da883cd020772b1280a807e
                                                                            • Instruction ID: 455b3196ffa1e9e4dda661e818fbe137dfd2925e5240b3dc813e3d95be3543c8
                                                                            • Opcode Fuzzy Hash: d22880e4433ba87f5eab090a903db8bd02279c2b7da883cd020772b1280a807e
                                                                            • Instruction Fuzzy Hash: 0701F771A8810966EF04EB90CE52EFF77A8AF51350F100029B90663281EAA59E08F6B1
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                              • Part of subcall function 00F93CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F93CCA
                                                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00F91CC8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_wcslen
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 624084870-1403004172
                                                                            • Opcode ID: a546058634786fc42cd2f0f6d160e090df38f67543e6b43c2d1a330d3b465847
                                                                            • Instruction ID: efd387868d3981526ff41e826e1f807a56a92cf20bcde10fc1b08d2af3da6922
                                                                            • Opcode Fuzzy Hash: a546058634786fc42cd2f0f6d160e090df38f67543e6b43c2d1a330d3b465847
                                                                            • Instruction Fuzzy Hash: B601A775B4411966DF04E790CE01AFE77A8AF11350F540025B90573281EAA49F08F671
                                                                            APIs
                                                                              • Part of subcall function 00F39CB3: _wcslen.LIBCMT ref: 00F39CBD
                                                                              • Part of subcall function 00F93CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F93CCA
                                                                            • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00F91DD3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_wcslen
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 624084870-1403004172
                                                                            • Opcode ID: f4b579fabfa515b30d32df19aef31b0cab2f032b20b8ef0c2b72c2a1a47c28ba
                                                                            • Instruction ID: 965e39a0fb02353086f94202bf488538f1ce6cb4876726f328dcf4cc98abb5dd
                                                                            • Opcode Fuzzy Hash: f4b579fabfa515b30d32df19aef31b0cab2f032b20b8ef0c2b72c2a1a47c28ba
                                                                            • Instruction Fuzzy Hash: 1FF0F471A4421966EF04E7A4CD52FFE77A8BF41360F040926B922A32C1DAE4990CA2A0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: _wcslen
                                                                            • String ID: 3, 3, 16, 1
                                                                            • API String ID: 176396367-3042988571
                                                                            • Opcode ID: 2371fb37b72f348a23aceaa28538e4b891f1b6702e596a54f3188ea55ef53470
                                                                            • Instruction ID: a88b14117881bc444a12f04ff2ceaedf2d26917dce0a07c57a68b0c9a7af1d1c
                                                                            • Opcode Fuzzy Hash: 2371fb37b72f348a23aceaa28538e4b891f1b6702e596a54f3188ea55ef53470
                                                                            • Instruction Fuzzy Hash: 3EE02B06A04320E09331327BDCC29BF7689CFC5762710182BFE81C2266EA98DDD1B3A1
                                                                            APIs
                                                                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00F90B23
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: Message
                                                                            • String ID: AutoIt$Error allocating memory.
                                                                            • API String ID: 2030045667-4017498283
                                                                            • Opcode ID: 698c3ed119e4521c0f9be3dfac7435b92e49c0ab5eec890c008273e7c51ce9e4
                                                                            • Instruction ID: 3bffe48aaabe928ba1d8c17a70365d6a4517bac35ffc52aa5ede24b31d18bf3f
                                                                            • Opcode Fuzzy Hash: 698c3ed119e4521c0f9be3dfac7435b92e49c0ab5eec890c008273e7c51ce9e4
                                                                            • Instruction Fuzzy Hash: DEE0D8312443083AD21437547D03FC97E848F05F21F10042AFB9C959C38EE6649036E9
                                                                            APIs
                                                                              • Part of subcall function 00F4F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00F50D71,?,?,?,00F3100A), ref: 00F4F7CE
                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,00F3100A), ref: 00F50D75
                                                                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00F3100A), ref: 00F50D84
                                                                            Strings
                                                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00F50D7F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                            • API String ID: 55579361-631824599
                                                                            • Opcode ID: 8e258f0e16443c7adc37d65c1d7d48f0d40a7357dd90576b763490de58492a6a
                                                                            • Instruction ID: d8f19f91606a04279657718a7caebcbbbb70cdfd4c7b74361df04726444c09b9
                                                                            • Opcode Fuzzy Hash: 8e258f0e16443c7adc37d65c1d7d48f0d40a7357dd90576b763490de58492a6a
                                                                            • Instruction Fuzzy Hash: 42E06D702003418BD3309FB8DA05B82BBF0AF00741F00892DE986C7656DFB9E44CAB91
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: LocalTime
                                                                            • String ID: %.3d$X64
                                                                            • API String ID: 481472006-1077770165
                                                                            • Opcode ID: d40b073e54bc2aa37d24d9c43ed005dfb1834f2e07e27fff0907c3f6b23d0bac
                                                                            • Instruction ID: 31203d498f5cfe12c2427302e164e10b8d4915e3da72cbf3302a72d895cd4282
                                                                            • Opcode Fuzzy Hash: d40b073e54bc2aa37d24d9c43ed005dfb1834f2e07e27fff0907c3f6b23d0bac
                                                                            • Instruction Fuzzy Hash: 80D06262C49119F9CB50BAD4DD4AEF9B77CEF59341F508452FD0AD2080D628D5487761
                                                                            APIs
                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FC236C
                                                                            • PostMessageW.USER32(00000000), ref: 00FC2373
                                                                              • Part of subcall function 00F9E97B: Sleep.KERNEL32 ref: 00F9E9F3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FindMessagePostSleepWindow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 529655941-2988720461
                                                                            • Opcode ID: d36e5f4308706b78bd04952f7c117eb85cb11b37e714b41edef8bf9b1f795c7d
                                                                            • Instruction ID: c2a51021c431737ce0207b6e84e449734411e9f03029dcceb887d7b07198b14b
                                                                            • Opcode Fuzzy Hash: d36e5f4308706b78bd04952f7c117eb85cb11b37e714b41edef8bf9b1f795c7d
                                                                            • Instruction Fuzzy Hash: 43D0C9327813147AE664B7719E0FFC676149B04B14F004916B74AEA1E0C9A4A801AA94
                                                                            APIs
                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FC232C
                                                                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00FC233F
                                                                              • Part of subcall function 00F9E97B: Sleep.KERNEL32 ref: 00F9E9F3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: FindMessagePostSleepWindow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 529655941-2988720461
                                                                            • Opcode ID: a554b6024434706ca2263bc42d792f5577a182be18f556ab2016d4484aeff892
                                                                            • Instruction ID: f9bbeba68b68980550c66e8ee35171ead03d99d67503762cc617969e5b009a5e
                                                                            • Opcode Fuzzy Hash: a554b6024434706ca2263bc42d792f5577a182be18f556ab2016d4484aeff892
                                                                            • Instruction Fuzzy Hash: BDD0C936794314B6E664B7719E0FFD67A149B00B14F004916B74AEA1E0C9A4A801AA94
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00F6BE93
                                                                            • GetLastError.KERNEL32 ref: 00F6BEA1
                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F6BEFC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1720307830.0000000000F31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F30000, based on PE: true
                                                                            • Associated: 00000000.00000002.1720293427.0000000000F30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FCC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720355962.0000000000FF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720392451.0000000000FFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1720406394.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_f30000_EPIRTURMEROOO0060.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 1717984340-0
                                                                            • Opcode ID: aa605880860a04613c2cb0492c8aa5807a3ea2aa1d593daab5a73f34587878ed
                                                                            • Instruction ID: c61bfd96316b9ab7ee47d7bccf754ee254a42abc415ce1a205446e4adc5a56ad
                                                                            • Opcode Fuzzy Hash: aa605880860a04613c2cb0492c8aa5807a3ea2aa1d593daab5a73f34587878ed
                                                                            • Instruction Fuzzy Hash: 17410635A04206AFCF218FA5CC44BBA7BA5EF51320F144169F959DB1B1DB318C85FB60