Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EZZGTmJj4O.exe

Overview

General Information

Sample name:EZZGTmJj4O.exe
renamed because original name is a hash value
Original sample name:f5aee285a15220c811ec857d5465162dbaff9699b2ad4aa5b17dbc7e8158e223.exe
Analysis ID:1586032
MD5:bbba8cf191e975cdd0f0659a1594a13d
SHA1:be1f028b9d564a026d45d2ffc77817d8278353f5
SHA256:f5aee285a15220c811ec857d5465162dbaff9699b2ad4aa5b17dbc7e8158e223
Tags:exeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Found API chain indicative of sandbox detection
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • EZZGTmJj4O.exe (PID: 7432 cmdline: "C:\Users\user\Desktop\EZZGTmJj4O.exe" MD5: BBBA8CF191E975CDD0F0659A1594A13D)
    • RegSvcs.exe (PID: 7460 cmdline: "C:\Users\user\Desktop\EZZGTmJj4O.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.alltoursegypt.com", "Username": "admin@alltoursegypt.com", "Password": "OPldome23#12klein"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.4123121358.0000000002C9C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.4123121358.0000000002C71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000002.4123121358.0000000002C71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x34edb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x34f4d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x34fd7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x35069:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x350d3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x35145:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x351db:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x3526b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.EZZGTmJj4O.exe.3ca0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.EZZGTmJj4O.exe.3ca0000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 4 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 192.254.186.165, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7460, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 1.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.alltoursegypt.com", "Username": "admin@alltoursegypt.com", "Password": "OPldome23#12klein"}
                    Source: EZZGTmJj4O.exeReversingLabs: Detection: 57%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: EZZGTmJj4O.exeJoe Sandbox ML: detected
                    Source: EZZGTmJj4O.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: Binary string: wntdll.pdbUGP source: EZZGTmJj4O.exe, 00000000.00000003.1678380404.0000000003CE0000.00000004.00001000.00020000.00000000.sdmp, EZZGTmJj4O.exe, 00000000.00000003.1678523263.0000000003E80000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: EZZGTmJj4O.exe, 00000000.00000003.1678380404.0000000003CE0000.00000004.00001000.00020000.00000000.sdmp, EZZGTmJj4O.exe, 00000000.00000003.1678523263.0000000003E80000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0050DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0050DBBE
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_005168EE FindFirstFileW,FindClose,0_2_005168EE
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0051698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0051698F
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0050D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0050D076
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0050D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0050D3A9
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00519642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00519642
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0051979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0051979D
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00519B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00519B2B
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00515C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00515C97
                    Source: global trafficTCP traffic: 192.168.2.4:49879 -> 1.1.1.1:53
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewIP Address: 192.254.186.165 192.254.186.165
                    Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0051CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0051CE44
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.alltoursegypt.com
                    Source: RegSvcs.exe, 00000001.00000002.4123121358.0000000002C9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002D4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://alltoursegypt.com
                    Source: RegSvcs.exe, 00000001.00000002.4123121358.0000000002C9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002D4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.alltoursegypt.com
                    Source: RegSvcs.exe, 00000001.00000002.4124677437.000000000601F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002D4E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4124677437.0000000005F90000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4122607079.0000000000EB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/01
                    Source: RegSvcs.exe, 00000001.00000002.4124677437.000000000601F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002D4E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4124677437.0000000005F90000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4122607079.0000000000EB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                    Source: RegSvcs.exe, 00000001.00000002.4123121358.0000000002C21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegSvcs.exe, 00000001.00000002.4124677437.000000000601F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002D4E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4124677437.0000000005F90000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4122607079.0000000000EB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: RegSvcs.exe, 00000001.00000002.4124677437.000000000601F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002D4E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4124677437.0000000005F90000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4122607079.0000000000EB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: EZZGTmJj4O.exe, 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4122385964.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: EZZGTmJj4O.exe, 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4122385964.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: RegSvcs.exe, 00000001.00000002.4123121358.0000000002C21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: RegSvcs.exe, 00000001.00000002.4123121358.0000000002C21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.4:49730 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, NmHr1WHWKO.cs.Net Code: lhg
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0051EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0051EAFF
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0051ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0051ED6A
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0051EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0051EAFF
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0050AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0050AA57
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00539576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00539576

                    System Summary

                    barindex
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: EZZGTmJj4O.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: EZZGTmJj4O.exe, 00000000.00000000.1661042309.0000000000562000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7c8841b0-9
                    Source: EZZGTmJj4O.exe, 00000000.00000000.1661042309.0000000000562000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_ca8ba627-0
                    Source: EZZGTmJj4O.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e6878fe3-e
                    Source: EZZGTmJj4O.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0c0f1d1c-c
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0050D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0050D5EB
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00501201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00501201
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0050E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0050E8F6
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004ABF400_2_004ABF40
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_005120460_2_00512046
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004A80600_2_004A8060
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_005082980_2_00508298
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004DE4FF0_2_004DE4FF
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004D676B0_2_004D676B
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_005348730_2_00534873
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004ACAF00_2_004ACAF0
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004CCAA00_2_004CCAA0
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004BCC390_2_004BCC39
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004D6DD90_2_004D6DD9
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004BB1190_2_004BB119
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004A91C00_2_004A91C0
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C13940_2_004C1394
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C17060_2_004C1706
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C781B0_2_004C781B
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004B997D0_2_004B997D
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004A79200_2_004A7920
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C19B00_2_004C19B0
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C7A4A0_2_004C7A4A
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C1C770_2_004C1C77
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C7CA70_2_004C7CA7
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0052BE440_2_0052BE44
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004D9EEE0_2_004D9EEE
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C1F320_2_004C1F32
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0151DD400_2_0151DD40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_012441C81_2_012441C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0124AA331_2_0124AA33
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01244A981_2_01244A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01243E801_2_01243E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0124F9C81_2_0124F9C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066E5E681_2_066E5E68
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066E36901_2_066E3690
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066EA2601_2_066EA260
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066E93121_2_066E9312
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066E11481_2_066E1148
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066EE1F91_2_066EE1F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066E57881_2_066E5788
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066EC4A01_2_066EC4A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066E3DCF1_2_066E3DCF
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: String function: 004BF9F2 appears 31 times
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: String function: 004C0A30 appears 46 times
                    Source: EZZGTmJj4O.exe, 00000000.00000003.1678380404.0000000003E03000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs EZZGTmJj4O.exe
                    Source: EZZGTmJj4O.exe, 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename106790a0-b81d-4bde-9832-48ebd9bb7fec.exe4 vs EZZGTmJj4O.exe
                    Source: EZZGTmJj4O.exe, 00000000.00000003.1679896378.0000000003FFD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs EZZGTmJj4O.exe
                    Source: EZZGTmJj4O.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_005137B5 GetLastError,FormatMessageW,0_2_005137B5
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_005010BF AdjustTokenPrivileges,CloseHandle,0_2_005010BF
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_005016C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_005016C3
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_005151CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_005151CD
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0052A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0052A67C
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0051648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0051648E
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004A42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_004A42A2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeFile created: C:\Users\user\AppData\Local\Temp\autCA5E.tmpJump to behavior
                    Source: EZZGTmJj4O.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: EZZGTmJj4O.exeReversingLabs: Detection: 57%
                    Source: unknownProcess created: C:\Users\user\Desktop\EZZGTmJj4O.exe "C:\Users\user\Desktop\EZZGTmJj4O.exe"
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\EZZGTmJj4O.exe"
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\EZZGTmJj4O.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: EZZGTmJj4O.exeStatic file information: File size 1143808 > 1048576
                    Source: EZZGTmJj4O.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: EZZGTmJj4O.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: EZZGTmJj4O.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: EZZGTmJj4O.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: EZZGTmJj4O.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: EZZGTmJj4O.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: EZZGTmJj4O.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: EZZGTmJj4O.exe, 00000000.00000003.1678380404.0000000003CE0000.00000004.00001000.00020000.00000000.sdmp, EZZGTmJj4O.exe, 00000000.00000003.1678523263.0000000003E80000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: EZZGTmJj4O.exe, 00000000.00000003.1678380404.0000000003CE0000.00000004.00001000.00020000.00000000.sdmp, EZZGTmJj4O.exe, 00000000.00000003.1678523263.0000000003E80000.00000004.00001000.00020000.00000000.sdmp
                    Source: EZZGTmJj4O.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: EZZGTmJj4O.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: EZZGTmJj4O.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: EZZGTmJj4O.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: EZZGTmJj4O.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004A42DE
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C0A76 push ecx; ret 0_2_004C0A89
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01240C55 push edi; retf 1_2_01240C7A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_066EABF9 push ecx; iretd 1_2_066EAC00
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004BF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004BF98E
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00531C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00531C41
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95797
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeAPI/Special instruction interceptor: Address: 151D964
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7379Jump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeAPI coverage: 4.0 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0050DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0050DBBE
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_005168EE FindFirstFileW,FindClose,0_2_005168EE
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0051698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0051698F
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0050D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0050D076
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0050D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0050D3A9
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00519642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00519642
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0051979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0051979D
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00519B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00519B2B
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00515C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00515C97
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004A42DE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99648Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99546Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99434Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99326Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99213Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98969Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98625Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98516Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98406Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98297Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98188Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98063Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97828Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97719Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97594Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97484Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97266Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97156Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97047Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96938Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96797Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96688Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96360Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96235Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96110Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95985Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95860Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95735Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95610Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99874Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99435Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99277Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99167Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98884Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98761Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98653Jump to behavior
                    Source: RegSvcs.exe, 00000001.00000002.4124677437.0000000005F90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllV
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0051EAA2 BlockInput,0_2_0051EAA2
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004D2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004D2622
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004A42DE
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C4CE8 mov eax, dword ptr fs:[00000030h]0_2_004C4CE8
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0151C5A0 mov eax, dword ptr fs:[00000030h]0_2_0151C5A0
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0151DBD0 mov eax, dword ptr fs:[00000030h]0_2_0151DBD0
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0151DC30 mov eax, dword ptr fs:[00000030h]0_2_0151DC30
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00500B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00500B62
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004D2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004D2622
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004C083F
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C09D5 SetUnhandledExceptionFilter,0_2_004C09D5
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004C0C21
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: A2B008Jump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00501201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00501201
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004E2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_004E2BA5
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_0050B226 SendInput,keybd_event,0_2_0050B226
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_005222DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_005222DA
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\EZZGTmJj4O.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00500B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00500B62
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00501663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00501663
                    Source: EZZGTmJj4O.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: EZZGTmJj4O.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004C0698 cpuid 0_2_004C0698
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00518195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00518195
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004FD27A GetUserNameW,0_2_004FD27A
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004DBB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_004DBB6F
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_004A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004A42DE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: EZZGTmJj4O.exe, 00000000.00000002.1689816707.000000000165D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcupdate.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.EZZGTmJj4O.exe.3ca0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.4123121358.0000000002C9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4123121358.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4122385964.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: EZZGTmJj4O.exe PID: 7432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7460, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: EZZGTmJj4O.exeBinary or memory string: WIN_81
                    Source: EZZGTmJj4O.exeBinary or memory string: WIN_XP
                    Source: EZZGTmJj4O.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                    Source: EZZGTmJj4O.exeBinary or memory string: WIN_XPe
                    Source: EZZGTmJj4O.exeBinary or memory string: WIN_VISTA
                    Source: EZZGTmJj4O.exeBinary or memory string: WIN_7
                    Source: EZZGTmJj4O.exeBinary or memory string: WIN_8
                    Source: Yara matchFile source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.EZZGTmJj4O.exe.3ca0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.4123121358.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4122385964.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: EZZGTmJj4O.exe PID: 7432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7460, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.EZZGTmJj4O.exe.3ca0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.EZZGTmJj4O.exe.3ca0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.4123121358.0000000002C9C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4123121358.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.4122385964.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: EZZGTmJj4O.exe PID: 7432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7460, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00521204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00521204
                    Source: C:\Users\user\Desktop\EZZGTmJj4O.exeCode function: 0_2_00521806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00521806
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    221
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS138
                    System Information Discovery
                    Distributed Component Object Model221
                    Input Capture
                    13
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets341
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    Fallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts221
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials221
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    EZZGTmJj4O.exe58%ReversingLabsWin32.Trojan.AutoitInject
                    EZZGTmJj4O.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://mail.alltoursegypt.com0%Avira URL Cloudsafe
                    http://alltoursegypt.com0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    104.26.13.205
                    truefalse
                      high
                      alltoursegypt.com
                      192.254.186.165
                      truetrue
                        unknown
                        mail.alltoursegypt.com
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://mail.alltoursegypt.comRegSvcs.exe, 00000001.00000002.4123121358.0000000002C9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002D4E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.ipify.orgEZZGTmJj4O.exe, 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4122385964.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              http://r10.o.lencr.org0#RegSvcs.exe, 00000001.00000002.4124677437.000000000601F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002D4E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4124677437.0000000005F90000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4122607079.0000000000EB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://r10.i.lencr.org/01RegSvcs.exe, 00000001.00000002.4124677437.000000000601F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002D4E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4124677437.0000000005F90000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4122607079.0000000000EB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://account.dyn.com/EZZGTmJj4O.exe, 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4122385964.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                    high
                                    https://api.ipify.org/tRegSvcs.exe, 00000001.00000002.4123121358.0000000002C21000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.4123121358.0000000002C21000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://x1.c.lencr.org/0RegSvcs.exe, 00000001.00000002.4124677437.000000000601F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002D4E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4124677437.0000000005F90000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4122607079.0000000000EB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://x1.i.lencr.org/0RegSvcs.exe, 00000001.00000002.4124677437.000000000601F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002D4E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4124677437.0000000005F90000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4122607079.0000000000EB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://alltoursegypt.comRegSvcs.exe, 00000001.00000002.4123121358.0000000002C9C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.4123121358.0000000002D4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            104.26.13.205
                                            api.ipify.orgUnited States
                                            13335CLOUDFLARENETUSfalse
                                            192.254.186.165
                                            alltoursegypt.comUnited States
                                            46606UNIFIEDLAYER-AS-1UStrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1586032
                                            Start date and time:2025-01-08 16:36:06 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 7m 39s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:6
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:EZZGTmJj4O.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:f5aee285a15220c811ec857d5465162dbaff9699b2ad4aa5b17dbc7e8158e223.exe
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@3/2@2/2
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 99%
                                            • Number of executed functions: 49
                                            • Number of non-executed functions: 297
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                            • Excluded IPs from analysis (whitelisted): 20.12.23.50, 4.245.163.56, 13.107.246.45
                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                            • VT rate limit hit for: EZZGTmJj4O.exe
                                            TimeTypeDescription
                                            10:37:01API Interceptor10677015x Sleep call for process: RegSvcs.exe modified
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            104.26.13.205Yoranis Setup.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            BiXS3FRoLe.exeGet hashmaliciousTrojanRansomBrowse
                                            • api.ipify.org/
                                            lEUy79aLAW.exeGet hashmaliciousTrojanRansomBrowse
                                            • api.ipify.org/
                                            Simple1.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                            • api.ipify.org/
                                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                            • api.ipify.org/
                                            file.exeGet hashmaliciousRDPWrap ToolBrowse
                                            • api.ipify.org/
                                            Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                            • api.ipify.org/
                                            192.254.186.1654089137200.exeGet hashmaliciousAgentTeslaBrowse
                                              rDOC24INV0616.exeGet hashmaliciousAgentTeslaBrowse
                                                INVOICE NO. USF23-24072 IGR23110.exeGet hashmaliciousAgentTeslaBrowse
                                                  Shipping Documents 72908672134.exeGet hashmaliciousAgentTeslaBrowse
                                                    PUK ITALIA PO 120610549.EXE.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      api.ipify.orgproforma invoice pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 104.26.12.205
                                                      mail (4).emlGet hashmaliciousUnknownBrowse
                                                      • 172.67.74.152
                                                      random.exeGet hashmaliciousCStealerBrowse
                                                      • 104.26.12.205
                                                      random.exeGet hashmaliciousCStealerBrowse
                                                      • 172.67.74.152
                                                      http://sammobile.digidip.net/visit?url=https://massageclinic.com.au/wadblacks2&currurl=https://www.sammobile.com/2018/06/06/june-2018-security-patch-information-published-by-samsung/Get hashmaliciousGabagoolBrowse
                                                      • 104.26.13.205
                                                      Ref#66001032.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.12.205
                                                      https://www.google.co.th/url?q=jODz3y3HOSozuuQiApLh&rct=5CHARyytTPSJ3J3wDcT&sa=t&esrc=vyczmuFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%70%68%69%6C%2D%68%65%61%6C%74%68%2D%75%6B%2E%67%6C%69%74%63%68%2E%6D%65%2F#changyeol.choi@hyundaielevator.comGet hashmaliciousUnknownBrowse
                                                      • 172.67.74.152
                                                      https://www.google.co.th/url?q=jODz3y3HOSozuuQiApLh&rct=5CHARyytTPSJ3J3wDcT&sa=t&esrc=rmgfuFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%70%68%69%6C%2D%68%65%61%6C%74%68%2D%75%6B%2E%67%6C%69%74%63%68%2E%6D%65%2F#kh.jang@hyundaimovex.comGet hashmaliciousUnknownBrowse
                                                      • 172.67.74.152
                                                      https://www.google.co.th/url?q=jODz3y3HOSozuuQiApLh&rct=5CHARyytTPSJ3J3wDcT&sa=t&esrc=olgelfuabFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%70%68%69%6C%2D%68%65%61%6C%74%68%2D%75%6B%2E%67%6C%69%74%63%68%2E%6D%65%2F#kh.jang@hyundaimovex.comGet hashmaliciousUnknownBrowse
                                                      • 104.26.13.205
                                                      drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                      • 172.67.74.152
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      CLOUDFLARENETUSBgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 188.114.96.3
                                                      https://tintin.klipdesak.shop/rinko.pngGet hashmaliciousUnknownBrowse
                                                      • 104.21.112.1
                                                      https://my.remarkable.com/Get hashmaliciousUnknownBrowse
                                                      • 104.19.153.19
                                                      pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 188.114.97.3
                                                      HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 188.114.97.3
                                                      KSts9xW7qy.exeGet hashmaliciousFormBookBrowse
                                                      • 188.114.96.3
                                                      https://www.google.at/url?sa==60Pms7JnShWaY3TYp1tJfM6oLKC&rct=0GbqKUbKEUOA0yP6gBhAVbg0AlI6i1vFvwuOapuWmP7TbqjETP71sUvBq6eZihhNTt&sa=t&url=amp/growingf8th.org/t2dolalrwe/yNRMR4AUS6ZyXKIlbmuYFZ8PYol/cGF0ZS5yb3dlbGxAY2hlcm9rZWVicmljay5jb20=Get hashmaliciousUnknownBrowse
                                                      • 104.18.95.41
                                                      https://u18282959.ct.sendgrid.net/ls/click?upn=u001.rEMfFlpAoJgeimh0eSdetqZJOaDEFgZEM86yJv-2FFqn4BDVcYSBJ7qe3MiIpMf7EHr39f_olH575WPuDKQ6-2BlwfkTb3bEPQyZlspfhjzLUkESeUKdz-2BSLVmhS-2BiNhtE4sjBDlEtszfbsE5c6igxavK3muY3tYeP6QkmX-2BJi-2BaLU6j8Wsp6hQUS9QOYhOuxeiGpmu9xPXTXniG-2FhK47xPzbY2a7dAVr4WH1EaPd9qfgngR-2BS0-2BE0l9vGYKsxljCm-2F3LXvjLQIge-2FSmK3YEyKDG8HCxUjDZIuKEbjKZRrfVUUqiw37aYZrphVQ5WvB0QOlR-2Be2shKtaVihd3RfTtBEd0NyHk9A-3D-3DGet hashmaliciousUnknownBrowse
                                                      • 104.18.86.42
                                                      XL-1-6-25-(EXCEL LATEST 2025).htmlGet hashmaliciousHTMLPhisherBrowse
                                                      • 104.17.25.14
                                                      oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 188.114.96.3
                                                      UNIFIEDLAYER-AS-1UShttps://e.trustifi.com/#/fff2a0/670719/6dc158/ef68bf/5e1243/19ce62/f4cd99/c6b84a/e8666a/ef542d/85972d/627493/9a11d6/1f4096/1d247f/d78873/cd64d0/869af2/e9ab57/7015c1/91dda7/f34c0a/f30b47/688cba/a1d645/18dc79/33d9f9/9ee0a0/c61099/8f2456/8e1864/996369/790047/a93a09/347b17/38082d/363d49/f88c07/81bae2/57a7bb/6027c6/942952/b2de1b/e98aef/6a05c2/91297b/c70871/7f29c3/0a450d/ad0cac/967c2a/e7cb67/6e1193/8c4088/13aef1/e1d296/5056d4/51a97e/89a35b/c13e69/fa274a/5b7c2e/a8c901/02856f/1e0211/03ca84/d7b573/7e0de3/e2bdbb/7cab47/4dd465/addb41/2076e1/85559c/dbcb2d/514505/a6a54e/41e864/abb5a5/e59e4b/8c2df6/7e5cf3/b648da/8fbd98/4c7d8a/08e6a3/72f66f/a49cc6/18211b/1e6a5c/0d4fdeGet hashmaliciousHTMLPhisherBrowse
                                                      • 162.241.149.91
                                                      https://jmak-service.com/3225640388Get hashmaliciousHTMLPhisherBrowse
                                                      • 162.241.149.91
                                                      TR98760H.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 162.241.62.63
                                                      https://pozaweclip.upnana.com/Get hashmaliciousUnknownBrowse
                                                      • 162.241.149.91
                                                      https://us01-i-prod-estimating-storage.s3.amazonaws.com/598134325679181/562949954787293/Documents/1706942/Hoosier%20Crane%20Service%20Company.pdfGet hashmaliciousHTMLPhisherBrowse
                                                      • 162.241.149.91
                                                      miori.m68k.elfGet hashmaliciousUnknownBrowse
                                                      • 142.7.137.184
                                                      https://universidad-unidem.edu.mx/mah/i/amFjb2JAc3RlaW5ib3JuLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                      • 162.214.205.216
                                                      https://g248jqtc.r.ap-south-1.awstrack.me/L0/https://fub.direct/1/wpcpz2KV6CJLjr9Ku5V9crqS4vRSbleRYVQVlbRDO0VhTlcqWS8eK4WwWGYEcIFo0NTTfcu_ywSiT_-hMwRGjBfgg1rcvHOcCbgDl1KQiWE/https/westcommerce.com.br/e63o/1750871326/Ara/%23%3Fnl=amRpYkBhcmEuY29t/1/0109019433d34740-32de3bb4-8eb6-4b18-a944-d8e7ee993673-000000/ImcP_D-hsLxxvDJopI2vRjkqrI4=188Get hashmaliciousUnknownBrowse
                                                      • 50.116.112.103
                                                      vRecording__0023secs__Stgusa.htmlGet hashmaliciousUnknownBrowse
                                                      • 69.49.245.172
                                                      miori.sh4.elfGet hashmaliciousUnknownBrowse
                                                      • 198.154.232.177
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      3b5074b1b5d032e5620f69f9f700ff0eBgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.26.13.205
                                                      https://my.remarkable.com/Get hashmaliciousUnknownBrowse
                                                      • 104.26.13.205
                                                      pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 104.26.13.205
                                                      HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                      • 104.26.13.205
                                                      oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.26.13.205
                                                      z.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                      • 104.26.13.205
                                                      h.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                      • 104.26.13.205
                                                      web55.mp4.htaGet hashmaliciousLummaCBrowse
                                                      • 104.26.13.205
                                                      atomxml.ps1Get hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
                                                      • 104.26.13.205
                                                      QUOTATION - RFQ2496_PO 08775622879.pdf(87kb).com.exeGet hashmaliciousQuasarBrowse
                                                      • 104.26.13.205
                                                      No context
                                                      Process:C:\Users\user\Desktop\EZZGTmJj4O.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):247296
                                                      Entropy (8bit):6.696421543073817
                                                      Encrypted:false
                                                      SSDEEP:6144:dnlr0oGWDIsAXyO1/xotE4s29ztGv9WLFg2oNEm:dnlQoG0TAXyb919ho9EFgXt
                                                      MD5:8B54E1F9B3E2E55910A209CC8DC52C15
                                                      SHA1:893CF1C2FD079ADDE7CE001EAF444DCE32A40DC2
                                                      SHA-256:968FE8429062C04CE458661CC9A397DF53A2C17E43D4EBCDBEC9A6FC82B4A682
                                                      SHA-512:713A38C71847D2235EE68990381ED0C92DEA49A3F507D8708D95888B7621948EBC317553F8BE3D2CA14EA2A4F7B789E21D52F20A5D8E87DDFD32F39A5BABA53C
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:...DS7FY]1KF.TZ.OST4PZQqJXO6DP7FYY1KF7ZTZROST4PZQ1JXO6DP7FY.1KF9E.TR.Z...[..k.'_7pG46>C*+.954< 'tV5z#D$x&Xd.x.y4^/#.WYPvOST4PZQa.XOzES72..TKF7ZTZRO.T6QQP:JX.5DP?FYY1KF..WZRoST4.YQ1J.O6dP7F[Y1OF7ZTZROWT4PZQ1JXo2DP5FYY1KF5Z..ROCT4@ZQ1JHO6TP7FYY1[F7ZTZROST4P2.2J.O6DP.EY.4KF7ZTZROST4PZQ1JXO6DT7JYY1KF7ZTZROST4PZQ1JXO6DP7FYY1KF7ZTZROST4PZQ1JXO6DP7FyY1CF7ZTZROST4PRq1J.O6DP7FYY1KF..1"&OST..YQ1jXO6.S7F[Y1KF7ZTZROST4PzQ1*v=E637FY.4KF7.WZRIST4.YQ1JXO6DP7FYY1.F7.z(7#<74PVQ1JXO2DP5FYY.HF7ZTZROST4PZQqJX.6DP7FYY1KF7ZTZRO.7PZQ1J.O6DR7CY..IF#aUZQOST5PZW1JXO6DP7FYY1KF7ZTZROST4PZQ1JXO6DP7FYY1KF7ZTZROST).....q~9n=$^...!.Y..A..-..U.$.#[...qK...../R..O.[...8...1.?C X....l:Y>]<g'u^P.E.....g-.z.@Y.....-f.>\u.c..bs...>?.o.....0;Y~;!A&=ae%6V40.3.G7ZTZ........X2...G_)rK!g...`H*....$Q1J<O6D"7FY81KFpZTZ=OSTZPZQOJXOHDP7.YY1.F7ZcZROvT4P7Q1J|O6D.7FY.LDI..3!.T4PZQ.....)........l%.,.1l.5....3..8...r...Z.$..#.1W...H7BT2D^]2G{9....nQP0UXV5ITr8...x......#..g*.-1JXO6D.7F.Y1K.Z.ZRO.T.P..1JX..D.7.Y..F
                                                      Process:C:\Users\user\Desktop\EZZGTmJj4O.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):160252
                                                      Entropy (8bit):7.922757385698121
                                                      Encrypted:false
                                                      SSDEEP:3072:DD+wqNiOIxnL4BQ52AHY4/lLeXcvEECM2F0YB+w8MoWEOG1gkjrJgOm34WsV:DDuNipxLEAYktbvEECXBYMoxOGDCOm3M
                                                      MD5:20C2093AB96A528CFF109D3AC1A3CF84
                                                      SHA1:CFA709094FBBFAE5E9837B33F91C5910D1019922
                                                      SHA-256:91F317BCE7C84E28F6F9E37F2C3CE7BD58A400A9A97D07D3BA2CD86BA180F13B
                                                      SHA-512:07402B959917FD85F1928D25B5CF263BD3B3F247964EB6FA647FD03EDA65F6601334CFFE479204FA3F1ED959DA074CDEEAF2F88AD11021AC46BEB3C1B149593F
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:EA06......t.J..Y..itnF..Z.S.uI.B.Q........4V@...j.Z...fb.5....9..../.k3..V..\2O_..(.I...*...3Y..A'.U.....Ix.V,.K.V.4.K.q..f.v.N..X...9....4kgT.Tj5..*...*...,bp5z.J..hl+ .Db.6..A.....i.....*%Bj.i..j).S.uI...i.S..@..V.4;2.L.P....E...._=RoJ........fcC...J.1.D..;..LdR`......-@......'z.Q....,.f.h.N[..B..4{. ._...7.^..y..o4.U....L.i...........x.....8..:.7#I.H.5Z.D...+Up....k...>Z...!q.Nm..%{....v.......{Q..BI....Z................'...s.8|..#?..+.>.{1.N.3....'..../.s..B......@..e.~.[f..._E....X.|.F.+>..-..,.{.N.7...&..l.Y.Zi0.L.4p..g..a.>N...2..ctz...K....n.^.H.F..N.vH..O.4....8........@..u.......@.[1Z..u.`.Bn.h_...p...Q);.N.g!.k.G.&....Jx9N..W..e.....Y...<:.../...fq~D.]..\...v...I#....cW.A .....2.W..*=.s..h...BaU.U.....q..s.W.T_...w1..........lk..n..1...`..N...v. .G?.D.M.5...F.M&..... ..%.J..i9..#.8.&.A..i.7X..u.......UfcA.md...J....*...: ..N.Sz5v.0...xx..y.M....%.......Mt.+.J.U.....d...S.....Al..*.yM>.P.F.P.*.o.Q*3x.?O0..&.....O.....Vc..lf.-t.....i
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):7.005200799604094
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:EZZGTmJj4O.exe
                                                      File size:1'143'808 bytes
                                                      MD5:bbba8cf191e975cdd0f0659a1594a13d
                                                      SHA1:be1f028b9d564a026d45d2ffc77817d8278353f5
                                                      SHA256:f5aee285a15220c811ec857d5465162dbaff9699b2ad4aa5b17dbc7e8158e223
                                                      SHA512:f2282b0302bc16728c65e8a4dd700036f8fadabf59b595d4e77c51691c95ec5d770892cddd905fba102478ffca3bb7f7100266dab881daf5e7140ec7ed9ee06d
                                                      SSDEEP:24576:XqDEvCTbMWu7rQYlBQcBiT6rprG8aftK49Hx+:XTvC/MTQYxsWR7af44Vx
                                                      TLSH:AF35BF0273D1C062FF9B92334B5AF6515BBC69260123E62F13981DB9BE701B1563E7A3
                                                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                      Icon Hash:aaf3e3e3938382a0
                                                      Entrypoint:0x420577
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x6763608D [Wed Dec 18 23:53:49 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:1
                                                      File Version Major:5
                                                      File Version Minor:1
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:1
                                                      Import Hash:948cc502fe9226992dce9417f952fce3
                                                      Instruction
                                                      call 00007FFA60E9E9E3h
                                                      jmp 00007FFA60E9E2EFh
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      push dword ptr [ebp+08h]
                                                      mov esi, ecx
                                                      call 00007FFA60E9E4CDh
                                                      mov dword ptr [esi], 0049FDF0h
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      and dword ptr [ecx+04h], 00000000h
                                                      mov eax, ecx
                                                      and dword ptr [ecx+08h], 00000000h
                                                      mov dword ptr [ecx+04h], 0049FDF8h
                                                      mov dword ptr [ecx], 0049FDF0h
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      push dword ptr [ebp+08h]
                                                      mov esi, ecx
                                                      call 00007FFA60E9E49Ah
                                                      mov dword ptr [esi], 0049FE0Ch
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      and dword ptr [ecx+04h], 00000000h
                                                      mov eax, ecx
                                                      and dword ptr [ecx+08h], 00000000h
                                                      mov dword ptr [ecx+04h], 0049FE14h
                                                      mov dword ptr [ecx], 0049FE0Ch
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      mov esi, ecx
                                                      lea eax, dword ptr [esi+04h]
                                                      mov dword ptr [esi], 0049FDD0h
                                                      and dword ptr [eax], 00000000h
                                                      and dword ptr [eax+04h], 00000000h
                                                      push eax
                                                      mov eax, dword ptr [ebp+08h]
                                                      add eax, 04h
                                                      push eax
                                                      call 00007FFA60EA108Dh
                                                      pop ecx
                                                      pop ecx
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      lea eax, dword ptr [ecx+04h]
                                                      mov dword ptr [ecx], 0049FDD0h
                                                      push eax
                                                      call 00007FFA60EA10D8h
                                                      pop ecx
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      mov esi, ecx
                                                      lea eax, dword ptr [esi+04h]
                                                      mov dword ptr [esi], 0049FDD0h
                                                      push eax
                                                      call 00007FFA60EA10C1h
                                                      test byte ptr [ebp+08h], 00000001h
                                                      pop ecx
                                                      Programming Language:
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x408c8.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1150000x7594.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xd40000x408c80x40a0042835ca263f9ebd2c3f20224953c4b83False0.8978594958897486data7.82363413732697IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x1150000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                      RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                      RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                      RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                      RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                      RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                      RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                      RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                      RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                      RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                      RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                      RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                      RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                      RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                      RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                      RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                      RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                      RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                      RT_RCDATA0xdc7b80x37b8fdata1.000332984284018
                                                      RT_GROUP_ICON0x1143480x76dataEnglishGreat Britain0.6610169491525424
                                                      RT_GROUP_ICON0x1143c00x14dataEnglishGreat Britain1.25
                                                      RT_GROUP_ICON0x1143d40x14dataEnglishGreat Britain1.15
                                                      RT_GROUP_ICON0x1143e80x14dataEnglishGreat Britain1.25
                                                      RT_VERSION0x1143fc0xdcdataEnglishGreat Britain0.6181818181818182
                                                      RT_MANIFEST0x1144d80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                      DLLImport
                                                      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                      PSAPI.DLLGetProcessMemoryInfo
                                                      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                      UxTheme.dllIsThemeActive
                                                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                      USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                      GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                      OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 8, 2025 16:37:00.291865110 CET49730443192.168.2.4104.26.13.205
                                                      Jan 8, 2025 16:37:00.291910887 CET44349730104.26.13.205192.168.2.4
                                                      Jan 8, 2025 16:37:00.291970015 CET49730443192.168.2.4104.26.13.205
                                                      Jan 8, 2025 16:37:00.361346006 CET49730443192.168.2.4104.26.13.205
                                                      Jan 8, 2025 16:37:00.361366987 CET44349730104.26.13.205192.168.2.4
                                                      Jan 8, 2025 16:37:00.865892887 CET44349730104.26.13.205192.168.2.4
                                                      Jan 8, 2025 16:37:00.865995884 CET49730443192.168.2.4104.26.13.205
                                                      Jan 8, 2025 16:37:00.870477915 CET49730443192.168.2.4104.26.13.205
                                                      Jan 8, 2025 16:37:00.870491028 CET44349730104.26.13.205192.168.2.4
                                                      Jan 8, 2025 16:37:00.870764017 CET44349730104.26.13.205192.168.2.4
                                                      Jan 8, 2025 16:37:00.917164087 CET49730443192.168.2.4104.26.13.205
                                                      Jan 8, 2025 16:37:00.983583927 CET49730443192.168.2.4104.26.13.205
                                                      Jan 8, 2025 16:37:01.027333975 CET44349730104.26.13.205192.168.2.4
                                                      Jan 8, 2025 16:37:01.099045038 CET44349730104.26.13.205192.168.2.4
                                                      Jan 8, 2025 16:37:01.099108934 CET44349730104.26.13.205192.168.2.4
                                                      Jan 8, 2025 16:37:01.099159956 CET49730443192.168.2.4104.26.13.205
                                                      Jan 8, 2025 16:37:01.143083096 CET49730443192.168.2.4104.26.13.205
                                                      Jan 8, 2025 16:37:02.711651087 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:02.716536045 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:02.716624975 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:03.363831043 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:03.364027023 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:03.368793011 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:03.514540911 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:03.514746904 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:03.519566059 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:03.666666031 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:03.667224884 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:03.672055006 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:03.831824064 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:03.831845999 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:03.831860065 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:03.831902981 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:03.885971069 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:03.914549112 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:03.919397116 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:04.065007925 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:04.067900896 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:04.072702885 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:04.218131065 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:04.222225904 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:04.227062941 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:04.372905016 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:04.373277903 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:04.378098965 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:06.576829910 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:06.577102900 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:06.581948996 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:06.727201939 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:06.728935957 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:06.729007959 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:06.733516932 CET49731587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:06.738370895 CET58749731192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:06.777684927 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:06.782511950 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:06.782581091 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:07.392574072 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:07.395384073 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:07.401002884 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:07.542598963 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:07.545576096 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:07.551397085 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:07.703351021 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:07.739356995 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:07.744297028 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:07.900821924 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:07.900842905 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:07.900856972 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:07.901011944 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:07.905560017 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:07.910393000 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:08.051642895 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:08.078547955 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:08.083436012 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:08.224447012 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:08.225568056 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:08.230462074 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:12.371932983 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:12.372370005 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:12.377211094 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:14.543102980 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:14.543493986 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:14.548306942 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:14.694758892 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:14.695527077 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:14.696358919 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:14.696420908 CET49732587192.168.2.4192.254.186.165
                                                      Jan 8, 2025 16:37:14.701364994 CET58749732192.254.186.165192.168.2.4
                                                      Jan 8, 2025 16:37:17.803956985 CET4987953192.168.2.41.1.1.1
                                                      Jan 8, 2025 16:37:17.809061050 CET53498791.1.1.1192.168.2.4
                                                      Jan 8, 2025 16:37:17.809725046 CET4987953192.168.2.41.1.1.1
                                                      Jan 8, 2025 16:37:17.814594030 CET53498791.1.1.1192.168.2.4
                                                      Jan 8, 2025 16:37:18.255143881 CET4987953192.168.2.41.1.1.1
                                                      Jan 8, 2025 16:37:18.260096073 CET53498791.1.1.1192.168.2.4
                                                      Jan 8, 2025 16:37:18.261032104 CET4987953192.168.2.41.1.1.1
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 8, 2025 16:37:00.277663946 CET4987853192.168.2.41.1.1.1
                                                      Jan 8, 2025 16:37:00.285754919 CET53498781.1.1.1192.168.2.4
                                                      Jan 8, 2025 16:37:02.271116018 CET5273153192.168.2.41.1.1.1
                                                      Jan 8, 2025 16:37:02.707775116 CET53527311.1.1.1192.168.2.4
                                                      Jan 8, 2025 16:37:17.799465895 CET53649591.1.1.1192.168.2.4
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jan 8, 2025 16:37:00.277663946 CET192.168.2.41.1.1.10x6cb7Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                      Jan 8, 2025 16:37:02.271116018 CET192.168.2.41.1.1.10x7588Standard query (0)mail.alltoursegypt.comA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jan 8, 2025 16:37:00.285754919 CET1.1.1.1192.168.2.40x6cb7No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                      Jan 8, 2025 16:37:00.285754919 CET1.1.1.1192.168.2.40x6cb7No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                      Jan 8, 2025 16:37:00.285754919 CET1.1.1.1192.168.2.40x6cb7No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                      Jan 8, 2025 16:37:02.707775116 CET1.1.1.1192.168.2.40x7588No error (0)mail.alltoursegypt.comalltoursegypt.comCNAME (Canonical name)IN (0x0001)false
                                                      Jan 8, 2025 16:37:02.707775116 CET1.1.1.1192.168.2.40x7588No error (0)alltoursegypt.com192.254.186.165A (IP address)IN (0x0001)false
                                                      • api.ipify.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.449730104.26.13.2054437460C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-08 15:37:00 UTC155OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                      Host: api.ipify.org
                                                      Connection: Keep-Alive
                                                      2025-01-08 15:37:01 UTC424INHTTP/1.1 200 OK
                                                      Date: Wed, 08 Jan 2025 15:37:01 GMT
                                                      Content-Type: text/plain
                                                      Content-Length: 12
                                                      Connection: close
                                                      Vary: Origin
                                                      CF-Cache-Status: DYNAMIC
                                                      Server: cloudflare
                                                      CF-RAY: 8fed4435790518cc-EWR
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1493&min_rtt=1491&rtt_var=563&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1936339&cwnd=252&unsent_bytes=0&cid=4214123b7e247fd7&ts=249&x=0"
                                                      2025-01-08 15:37:01 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                                      Data Ascii: 8.46.123.189


                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                      Jan 8, 2025 16:37:03.363831043 CET58749731192.254.186.165192.168.2.4220-gator3170.hostgator.com ESMTP Exim 4.96.2 #2 Wed, 08 Jan 2025 09:37:03 -0600
                                                      220-We do not authorize the use of this system to transport unsolicited,
                                                      220 and/or bulk e-mail.
                                                      Jan 8, 2025 16:37:03.364027023 CET49731587192.168.2.4192.254.186.165EHLO 494126
                                                      Jan 8, 2025 16:37:03.514540911 CET58749731192.254.186.165192.168.2.4250-gator3170.hostgator.com Hello 494126 [8.46.123.189]
                                                      250-SIZE 52428800
                                                      250-8BITMIME
                                                      250-PIPELINING
                                                      250-PIPECONNECT
                                                      250-AUTH PLAIN LOGIN
                                                      250-STARTTLS
                                                      250 HELP
                                                      Jan 8, 2025 16:37:03.514746904 CET49731587192.168.2.4192.254.186.165STARTTLS
                                                      Jan 8, 2025 16:37:03.666666031 CET58749731192.254.186.165192.168.2.4220 TLS go ahead
                                                      Jan 8, 2025 16:37:07.392574072 CET58749732192.254.186.165192.168.2.4220-gator3170.hostgator.com ESMTP Exim 4.96.2 #2 Wed, 08 Jan 2025 09:37:07 -0600
                                                      220-We do not authorize the use of this system to transport unsolicited,
                                                      220 and/or bulk e-mail.
                                                      Jan 8, 2025 16:37:07.395384073 CET49732587192.168.2.4192.254.186.165EHLO 494126
                                                      Jan 8, 2025 16:37:07.542598963 CET58749732192.254.186.165192.168.2.4250-gator3170.hostgator.com Hello 494126 [8.46.123.189]
                                                      250-SIZE 52428800
                                                      250-8BITMIME
                                                      250-PIPELINING
                                                      250-PIPECONNECT
                                                      250-AUTH PLAIN LOGIN
                                                      250-STARTTLS
                                                      250 HELP
                                                      Jan 8, 2025 16:37:07.545576096 CET49732587192.168.2.4192.254.186.165STARTTLS
                                                      Jan 8, 2025 16:37:07.703351021 CET58749732192.254.186.165192.168.2.4220 TLS go ahead

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:10:36:56
                                                      Start date:08/01/2025
                                                      Path:C:\Users\user\Desktop\EZZGTmJj4O.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\EZZGTmJj4O.exe"
                                                      Imagebase:0x4a0000
                                                      File size:1'143'808 bytes
                                                      MD5 hash:BBBA8CF191E975CDD0F0659A1594A13D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1689953773.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:10:36:57
                                                      Start date:08/01/2025
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\EZZGTmJj4O.exe"
                                                      Imagebase:0x9f0000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4123121358.0000000002C9C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4123121358.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4123121358.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4122385964.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.4122385964.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:3.3%
                                                        Dynamic/Decrypted Code Coverage:0.9%
                                                        Signature Coverage:4.8%
                                                        Total number of Nodes:1990
                                                        Total number of Limit Nodes:57
                                                        execution_graph 94500 4a1cad SystemParametersInfoW 94501 4a2de3 94502 4a2df0 __wsopen_s 94501->94502 94503 4a2e09 94502->94503 94504 4e2c2b ___scrt_fastfail 94502->94504 94517 4a3aa2 94503->94517 94506 4e2c47 GetOpenFileNameW 94504->94506 94508 4e2c96 94506->94508 94575 4a6b57 94508->94575 94512 4e2cab 94512->94512 94514 4a2e27 94545 4a44a8 94514->94545 94587 4e1f50 94517->94587 94520 4a3ae9 94593 4aa6c3 94520->94593 94521 4a3ace 94523 4a6b57 22 API calls 94521->94523 94524 4a3ada 94523->94524 94589 4a37a0 94524->94589 94527 4a2da5 94528 4e1f50 __wsopen_s 94527->94528 94529 4a2db2 GetLongPathNameW 94528->94529 94530 4a6b57 22 API calls 94529->94530 94531 4a2dda 94530->94531 94532 4a3598 94531->94532 94644 4aa961 94532->94644 94535 4a3aa2 23 API calls 94536 4a35b5 94535->94536 94537 4a35c0 94536->94537 94540 4e32eb 94536->94540 94649 4a515f 94537->94649 94542 4e330d 94540->94542 94661 4bce60 41 API calls 94540->94661 94544 4a35df 94544->94514 94662 4a4ecb 94545->94662 94548 4e3833 94684 512cf9 94548->94684 94549 4a4ecb 94 API calls 94552 4a44e1 94549->94552 94551 4e3848 94553 4e384c 94551->94553 94554 4e3869 94551->94554 94552->94548 94555 4a44e9 94552->94555 94725 4a4f39 94553->94725 94557 4bfe0b 22 API calls 94554->94557 94558 4e3854 94555->94558 94559 4a44f5 94555->94559 94574 4e38ae 94557->94574 94731 50da5a 82 API calls 94558->94731 94724 4a940c 136 API calls 2 library calls 94559->94724 94562 4e3862 94562->94554 94563 4a2e31 94564 4e3a5f 94569 4e3a67 94564->94569 94565 4a4f39 68 API calls 94565->94569 94569->94565 94735 50989b 82 API calls __wsopen_s 94569->94735 94571 4a9cb3 22 API calls 94571->94574 94574->94564 94574->94569 94574->94571 94710 4aa4a1 94574->94710 94718 4a3ff7 94574->94718 94732 50967e 22 API calls __fread_nolock 94574->94732 94733 5095ad 42 API calls _wcslen 94574->94733 94734 510b5a 22 API calls 94574->94734 94576 4a6b67 _wcslen 94575->94576 94577 4e4ba1 94575->94577 94580 4a6b7d 94576->94580 94581 4a6ba2 94576->94581 94578 4a93b2 22 API calls 94577->94578 94579 4e4baa 94578->94579 94579->94579 95367 4a6f34 22 API calls 94580->95367 94583 4bfddb 22 API calls 94581->94583 94585 4a6bae 94583->94585 94584 4a6b85 __fread_nolock 94584->94512 94586 4bfe0b 22 API calls 94585->94586 94586->94584 94588 4a3aaf GetFullPathNameW 94587->94588 94588->94520 94588->94521 94590 4a37ae 94589->94590 94599 4a93b2 94590->94599 94592 4a2e12 94592->94527 94594 4aa6dd 94593->94594 94595 4aa6d0 94593->94595 94596 4bfddb 22 API calls 94594->94596 94595->94524 94597 4aa6e7 94596->94597 94598 4bfe0b 22 API calls 94597->94598 94598->94595 94600 4a93c9 __fread_nolock 94599->94600 94601 4a93c0 94599->94601 94600->94592 94601->94600 94603 4aaec9 94601->94603 94604 4aaedc 94603->94604 94608 4aaed9 __fread_nolock 94603->94608 94609 4bfddb 94604->94609 94606 4aaee7 94619 4bfe0b 94606->94619 94608->94600 94612 4bfde0 94609->94612 94611 4bfdfa 94611->94606 94612->94611 94615 4bfdfc 94612->94615 94629 4cea0c 94612->94629 94636 4c4ead 7 API calls 2 library calls 94612->94636 94614 4c066d 94638 4c32a4 RaiseException 94614->94638 94615->94614 94637 4c32a4 RaiseException 94615->94637 94618 4c068a 94618->94606 94622 4bfddb 94619->94622 94620 4cea0c ___std_exception_copy 21 API calls 94620->94622 94621 4bfdfa 94621->94608 94622->94620 94622->94621 94625 4bfdfc 94622->94625 94641 4c4ead 7 API calls 2 library calls 94622->94641 94624 4c066d 94643 4c32a4 RaiseException 94624->94643 94625->94624 94642 4c32a4 RaiseException 94625->94642 94628 4c068a 94628->94608 94634 4d3820 CallUnexpected 94629->94634 94630 4d385e 94640 4cf2d9 20 API calls _free 94630->94640 94632 4d3849 RtlAllocateHeap 94633 4d385c 94632->94633 94632->94634 94633->94612 94634->94630 94634->94632 94639 4c4ead 7 API calls 2 library calls 94634->94639 94636->94612 94637->94614 94638->94618 94639->94634 94640->94633 94641->94622 94642->94624 94643->94628 94645 4bfe0b 22 API calls 94644->94645 94646 4aa976 94645->94646 94647 4bfddb 22 API calls 94646->94647 94648 4a35aa 94647->94648 94648->94535 94650 4a516e 94649->94650 94654 4a518f __fread_nolock 94649->94654 94652 4bfe0b 22 API calls 94650->94652 94651 4bfddb 22 API calls 94653 4a35cc 94651->94653 94652->94654 94655 4a35f3 94653->94655 94654->94651 94656 4a3605 94655->94656 94660 4a3624 __fread_nolock 94655->94660 94659 4bfe0b 22 API calls 94656->94659 94657 4bfddb 22 API calls 94658 4a363b 94657->94658 94658->94544 94659->94660 94660->94657 94661->94540 94736 4a4e90 LoadLibraryA 94662->94736 94667 4e3ccf 94670 4a4f39 68 API calls 94667->94670 94668 4a4ef6 LoadLibraryExW 94744 4a4e59 LoadLibraryA 94668->94744 94671 4e3cd6 94670->94671 94673 4a4e59 3 API calls 94671->94673 94675 4e3cde 94673->94675 94766 4a50f5 94675->94766 94676 4a4f20 94676->94675 94677 4a4f2c 94676->94677 94679 4a4f39 68 API calls 94677->94679 94681 4a44cd 94679->94681 94681->94548 94681->94549 94683 4e3d05 94685 512d15 94684->94685 94686 4a511f 64 API calls 94685->94686 94687 512d29 94686->94687 95037 512e66 94687->95037 94690 512d3f 94690->94551 94691 4a50f5 40 API calls 94692 512d56 94691->94692 94693 4a50f5 40 API calls 94692->94693 94694 512d66 94693->94694 94695 4a50f5 40 API calls 94694->94695 94696 512d81 94695->94696 94697 4a50f5 40 API calls 94696->94697 94698 512d9c 94697->94698 94699 4a511f 64 API calls 94698->94699 94700 512db3 94699->94700 94701 4cea0c ___std_exception_copy 21 API calls 94700->94701 94702 512dba 94701->94702 94703 4cea0c ___std_exception_copy 21 API calls 94702->94703 94704 512dc4 94703->94704 94705 4a50f5 40 API calls 94704->94705 94706 512dd8 94705->94706 94707 5128fe 27 API calls 94706->94707 94708 512dee 94707->94708 94708->94690 95043 5122ce 94708->95043 94711 4aa52b 94710->94711 94712 4aa4b1 __fread_nolock 94710->94712 94715 4bfe0b 22 API calls 94711->94715 94713 4bfddb 22 API calls 94712->94713 94714 4aa4b8 94713->94714 94716 4bfddb 22 API calls 94714->94716 94717 4aa4d6 94714->94717 94715->94712 94716->94717 94717->94574 94719 4a400a 94718->94719 94721 4a40ae 94718->94721 94720 4bfe0b 22 API calls 94719->94720 94723 4a403c 94719->94723 94720->94723 94721->94574 94722 4bfddb 22 API calls 94722->94723 94723->94721 94723->94722 94724->94563 94726 4a4f4a 94725->94726 94727 4a4f43 94725->94727 94729 4a4f6a FreeLibrary 94726->94729 94730 4a4f59 94726->94730 94728 4ce678 67 API calls 94727->94728 94728->94726 94729->94730 94730->94558 94731->94562 94732->94574 94733->94574 94734->94574 94735->94569 94737 4a4ea8 GetProcAddress 94736->94737 94738 4a4ec6 94736->94738 94739 4a4eb8 94737->94739 94741 4ce5eb 94738->94741 94739->94738 94740 4a4ebf FreeLibrary 94739->94740 94740->94738 94774 4ce52a 94741->94774 94743 4a4eea 94743->94667 94743->94668 94745 4a4e6e GetProcAddress 94744->94745 94746 4a4e8d 94744->94746 94747 4a4e7e 94745->94747 94749 4a4f80 94746->94749 94747->94746 94748 4a4e86 FreeLibrary 94747->94748 94748->94746 94750 4bfe0b 22 API calls 94749->94750 94751 4a4f95 94750->94751 94842 4a5722 94751->94842 94753 4a4fa1 __fread_nolock 94754 4e3d1d 94753->94754 94755 4a50a5 94753->94755 94765 4a4fdc 94753->94765 94856 51304d 74 API calls 94754->94856 94845 4a42a2 CreateStreamOnHGlobal 94755->94845 94758 4e3d22 94760 4a511f 64 API calls 94758->94760 94759 4a50f5 40 API calls 94759->94765 94761 4e3d45 94760->94761 94762 4a50f5 40 API calls 94761->94762 94764 4a506e messages 94762->94764 94764->94676 94765->94758 94765->94759 94765->94764 94851 4a511f 94765->94851 94767 4a5107 94766->94767 94768 4e3d70 94766->94768 94878 4ce8c4 94767->94878 94771 5128fe 95020 51274e 94771->95020 94773 512919 94773->94683 94777 4ce536 ___DestructExceptionObject 94774->94777 94775 4ce544 94799 4cf2d9 20 API calls _free 94775->94799 94777->94775 94779 4ce574 94777->94779 94778 4ce549 94800 4d27ec 26 API calls _abort 94778->94800 94781 4ce579 94779->94781 94782 4ce586 94779->94782 94801 4cf2d9 20 API calls _free 94781->94801 94791 4d8061 94782->94791 94785 4ce58f 94786 4ce595 94785->94786 94787 4ce5a2 94785->94787 94802 4cf2d9 20 API calls _free 94786->94802 94803 4ce5d4 LeaveCriticalSection __fread_nolock 94787->94803 94788 4ce554 __fread_nolock 94788->94743 94792 4d806d ___DestructExceptionObject 94791->94792 94804 4d2f5e EnterCriticalSection 94792->94804 94794 4d807b 94805 4d80fb 94794->94805 94798 4d80ac __fread_nolock 94798->94785 94799->94778 94800->94788 94801->94788 94802->94788 94803->94788 94804->94794 94812 4d811e 94805->94812 94806 4d8177 94823 4d4c7d 94806->94823 94811 4d8189 94817 4d8088 94811->94817 94836 4d3405 11 API calls 2 library calls 94811->94836 94812->94806 94812->94812 94812->94817 94821 4c918d EnterCriticalSection 94812->94821 94822 4c91a1 LeaveCriticalSection 94812->94822 94814 4d81a8 94837 4c918d EnterCriticalSection 94814->94837 94818 4d80b7 94817->94818 94841 4d2fa6 LeaveCriticalSection 94818->94841 94820 4d80be 94820->94798 94821->94812 94822->94812 94828 4d4c8a CallUnexpected 94823->94828 94824 4d4cca 94839 4cf2d9 20 API calls _free 94824->94839 94825 4d4cb5 RtlAllocateHeap 94826 4d4cc8 94825->94826 94825->94828 94830 4d29c8 94826->94830 94828->94824 94828->94825 94838 4c4ead 7 API calls 2 library calls 94828->94838 94831 4d29d3 RtlFreeHeap 94830->94831 94835 4d29fc _free 94830->94835 94832 4d29e8 94831->94832 94831->94835 94840 4cf2d9 20 API calls _free 94832->94840 94834 4d29ee GetLastError 94834->94835 94835->94811 94836->94814 94837->94817 94838->94828 94839->94826 94840->94834 94841->94820 94843 4bfddb 22 API calls 94842->94843 94844 4a5734 94843->94844 94844->94753 94846 4a42d9 94845->94846 94847 4a42bc FindResourceExW 94845->94847 94846->94765 94847->94846 94848 4e35ba LoadResource 94847->94848 94848->94846 94849 4e35cf SizeofResource 94848->94849 94849->94846 94850 4e35e3 LockResource 94849->94850 94850->94846 94852 4a512e 94851->94852 94853 4e3d90 94851->94853 94857 4cece3 94852->94857 94856->94758 94860 4ceaaa 94857->94860 94859 4a513c 94859->94765 94863 4ceab6 ___DestructExceptionObject 94860->94863 94861 4ceac2 94873 4cf2d9 20 API calls _free 94861->94873 94863->94861 94864 4ceae8 94863->94864 94875 4c918d EnterCriticalSection 94864->94875 94865 4ceac7 94874 4d27ec 26 API calls _abort 94865->94874 94868 4ceaf4 94876 4cec0a 62 API calls 2 library calls 94868->94876 94870 4ceb08 94877 4ceb27 LeaveCriticalSection __fread_nolock 94870->94877 94872 4cead2 __fread_nolock 94872->94859 94873->94865 94874->94872 94875->94868 94876->94870 94877->94872 94881 4ce8e1 94878->94881 94880 4a5118 94880->94771 94882 4ce8ed ___DestructExceptionObject 94881->94882 94883 4ce92d 94882->94883 94884 4ce900 ___scrt_fastfail 94882->94884 94885 4ce925 __fread_nolock 94882->94885 94894 4c918d EnterCriticalSection 94883->94894 94908 4cf2d9 20 API calls _free 94884->94908 94885->94880 94888 4ce937 94895 4ce6f8 94888->94895 94890 4ce91a 94909 4d27ec 26 API calls _abort 94890->94909 94894->94888 94896 4ce727 94895->94896 94899 4ce70a ___scrt_fastfail 94895->94899 94910 4ce96c LeaveCriticalSection __fread_nolock 94896->94910 94897 4ce717 94983 4cf2d9 20 API calls _free 94897->94983 94899->94896 94899->94897 94901 4ce76a __fread_nolock 94899->94901 94901->94896 94904 4ce886 ___scrt_fastfail 94901->94904 94911 4cd955 94901->94911 94918 4d8d45 94901->94918 94985 4ccf78 26 API calls 4 library calls 94901->94985 94986 4cf2d9 20 API calls _free 94904->94986 94906 4ce71c 94984 4d27ec 26 API calls _abort 94906->94984 94908->94890 94909->94885 94910->94885 94912 4cd976 94911->94912 94913 4cd961 94911->94913 94912->94901 94987 4cf2d9 20 API calls _free 94913->94987 94915 4cd966 94988 4d27ec 26 API calls _abort 94915->94988 94917 4cd971 94917->94901 94919 4d8d6f 94918->94919 94920 4d8d57 94918->94920 94922 4d90d9 94919->94922 94927 4d8db4 94919->94927 94998 4cf2c6 20 API calls _free 94920->94998 95014 4cf2c6 20 API calls _free 94922->95014 94923 4d8d5c 94999 4cf2d9 20 API calls _free 94923->94999 94926 4d90de 95015 4cf2d9 20 API calls _free 94926->95015 94929 4d8dbf 94927->94929 94932 4d8d64 94927->94932 94934 4d8def 94927->94934 95000 4cf2c6 20 API calls _free 94929->95000 94930 4d8dcc 95016 4d27ec 26 API calls _abort 94930->95016 94932->94901 94933 4d8dc4 95001 4cf2d9 20 API calls _free 94933->95001 94937 4d8e08 94934->94937 94938 4d8e2e 94934->94938 94939 4d8e4a 94934->94939 94937->94938 94943 4d8e15 94937->94943 95002 4cf2c6 20 API calls _free 94938->95002 95005 4d3820 21 API calls 2 library calls 94939->95005 94942 4d8e33 95003 4cf2d9 20 API calls _free 94942->95003 94989 4df89b 94943->94989 94944 4d8e61 94947 4d29c8 _free 20 API calls 94944->94947 94950 4d8e6a 94947->94950 94948 4d8e3a 95004 4d27ec 26 API calls _abort 94948->95004 94949 4d8fb3 94952 4d9029 94949->94952 94955 4d8fcc GetConsoleMode 94949->94955 94953 4d29c8 _free 20 API calls 94950->94953 94954 4d902d ReadFile 94952->94954 94956 4d8e71 94953->94956 94957 4d9047 94954->94957 94958 4d90a1 GetLastError 94954->94958 94955->94952 94959 4d8fdd 94955->94959 94960 4d8e7b 94956->94960 94961 4d8e96 94956->94961 94957->94958 94964 4d901e 94957->94964 94962 4d90ae 94958->94962 94963 4d9005 94958->94963 94959->94954 94965 4d8fe3 ReadConsoleW 94959->94965 95006 4cf2d9 20 API calls _free 94960->95006 95008 4d9424 28 API calls __fread_nolock 94961->95008 95012 4cf2d9 20 API calls _free 94962->95012 94980 4d8e45 __fread_nolock 94963->94980 95009 4cf2a3 20 API calls 2 library calls 94963->95009 94976 4d906c 94964->94976 94977 4d9083 94964->94977 94964->94980 94965->94964 94970 4d8fff GetLastError 94965->94970 94966 4d29c8 _free 20 API calls 94966->94932 94970->94963 94972 4d8e80 95007 4cf2c6 20 API calls _free 94972->95007 94973 4d90b3 95013 4cf2c6 20 API calls _free 94973->95013 95010 4d8a61 31 API calls 3 library calls 94976->95010 94978 4d909a 94977->94978 94977->94980 95011 4d88a1 29 API calls __fread_nolock 94978->95011 94980->94966 94982 4d909f 94982->94980 94983->94906 94984->94896 94985->94901 94986->94906 94987->94915 94988->94917 94990 4df8a8 94989->94990 94992 4df8b5 94989->94992 95017 4cf2d9 20 API calls _free 94990->95017 94995 4df8c1 94992->94995 95018 4cf2d9 20 API calls _free 94992->95018 94994 4df8ad 94994->94949 94995->94949 94996 4df8e2 95019 4d27ec 26 API calls _abort 94996->95019 94998->94923 94999->94932 95000->94933 95001->94930 95002->94942 95003->94948 95004->94980 95005->94944 95006->94972 95007->94980 95008->94943 95009->94980 95010->94980 95011->94982 95012->94973 95013->94980 95014->94926 95015->94930 95016->94932 95017->94994 95018->94996 95019->94994 95023 4ce4e8 95020->95023 95022 51275d 95022->94773 95026 4ce469 95023->95026 95025 4ce505 95025->95022 95027 4ce48c 95026->95027 95028 4ce478 95026->95028 95033 4ce488 __alldvrm 95027->95033 95036 4d333f 11 API calls 2 library calls 95027->95036 95034 4cf2d9 20 API calls _free 95028->95034 95030 4ce47d 95035 4d27ec 26 API calls _abort 95030->95035 95033->95025 95034->95030 95035->95033 95036->95033 95042 512e7a 95037->95042 95038 4a50f5 40 API calls 95038->95042 95039 512d3b 95039->94690 95039->94691 95040 5128fe 27 API calls 95040->95042 95041 4a511f 64 API calls 95041->95042 95042->95038 95042->95039 95042->95040 95042->95041 95044 5122d9 95043->95044 95045 5122e7 95043->95045 95046 4ce5eb 29 API calls 95044->95046 95047 51232c 95045->95047 95048 4ce5eb 29 API calls 95045->95048 95071 5122f0 95045->95071 95046->95045 95072 512557 95047->95072 95049 512311 95048->95049 95049->95047 95051 51231a 95049->95051 95056 4ce678 67 API calls 95051->95056 95051->95071 95052 512370 95053 512395 95052->95053 95054 512374 95052->95054 95076 512171 95053->95076 95055 512381 95054->95055 95058 4ce678 67 API calls 95054->95058 95060 4ce678 67 API calls 95055->95060 95055->95071 95056->95071 95058->95055 95059 51239d 95061 5123c3 95059->95061 95062 5123a3 95059->95062 95060->95071 95083 5123f3 95061->95083 95064 5123b0 95062->95064 95065 4ce678 67 API calls 95062->95065 95066 4ce678 67 API calls 95064->95066 95064->95071 95065->95064 95066->95071 95067 5123ca 95068 5123de 95067->95068 95091 4ce678 95067->95091 95070 4ce678 67 API calls 95068->95070 95068->95071 95070->95071 95071->94690 95073 51257c 95072->95073 95075 512565 __fread_nolock 95072->95075 95074 4ce8c4 __fread_nolock 40 API calls 95073->95074 95074->95075 95075->95052 95077 4cea0c ___std_exception_copy 21 API calls 95076->95077 95078 51217f 95077->95078 95079 4cea0c ___std_exception_copy 21 API calls 95078->95079 95080 512190 95079->95080 95081 4cea0c ___std_exception_copy 21 API calls 95080->95081 95082 51219c 95081->95082 95082->95059 95090 512408 95083->95090 95084 5124c0 95108 512724 95084->95108 95085 5121cc 40 API calls 95085->95090 95087 5124c7 95087->95067 95090->95084 95090->95085 95090->95087 95104 512606 95090->95104 95112 512269 40 API calls 95090->95112 95092 4ce684 ___DestructExceptionObject 95091->95092 95093 4ce6aa 95092->95093 95094 4ce695 95092->95094 95103 4ce6a5 __fread_nolock 95093->95103 95148 4c918d EnterCriticalSection 95093->95148 95165 4cf2d9 20 API calls _free 95094->95165 95096 4ce69a 95166 4d27ec 26 API calls _abort 95096->95166 95099 4ce6c6 95149 4ce602 95099->95149 95101 4ce6d1 95167 4ce6ee LeaveCriticalSection __fread_nolock 95101->95167 95103->95068 95105 512617 95104->95105 95106 51261d 95104->95106 95105->95106 95113 5126d7 95105->95113 95106->95090 95109 512731 95108->95109 95110 512742 95108->95110 95111 4cdbb3 65 API calls 95109->95111 95110->95087 95111->95110 95112->95090 95114 512703 95113->95114 95115 512714 95113->95115 95117 4cdbb3 95114->95117 95115->95105 95118 4cdbdd 95117->95118 95119 4cdbc1 95117->95119 95118->95115 95119->95118 95120 4cdbcd 95119->95120 95121 4cdbe3 95119->95121 95129 4cf2d9 20 API calls _free 95120->95129 95126 4cd9cc 95121->95126 95124 4cdbd2 95130 4d27ec 26 API calls _abort 95124->95130 95131 4cd97b 95126->95131 95128 4cd9f0 95128->95118 95129->95124 95130->95118 95132 4cd987 ___DestructExceptionObject 95131->95132 95139 4c918d EnterCriticalSection 95132->95139 95134 4cd995 95140 4cd9f4 95134->95140 95138 4cd9b3 __fread_nolock 95138->95128 95139->95134 95141 4d49a1 27 API calls 95140->95141 95142 4cda09 95141->95142 95143 4cda3a 62 API calls 95142->95143 95144 4cda24 95143->95144 95145 4d4a56 62 API calls 95144->95145 95146 4cd9a2 95145->95146 95147 4cd9c0 LeaveCriticalSection __fread_nolock 95146->95147 95147->95138 95148->95099 95150 4ce60f 95149->95150 95151 4ce624 95149->95151 95193 4cf2d9 20 API calls _free 95150->95193 95163 4ce61f 95151->95163 95168 4cdc0b 95151->95168 95154 4ce614 95194 4d27ec 26 API calls _abort 95154->95194 95159 4cd955 __fread_nolock 26 API calls 95160 4ce646 95159->95160 95178 4d862f 95160->95178 95163->95101 95164 4d29c8 _free 20 API calls 95164->95163 95165->95096 95166->95103 95167->95103 95169 4cdc1f 95168->95169 95170 4cdc23 95168->95170 95174 4d4d7a 95169->95174 95170->95169 95171 4cd955 __fread_nolock 26 API calls 95170->95171 95172 4cdc43 95171->95172 95195 4d59be 95172->95195 95175 4ce640 95174->95175 95176 4d4d90 95174->95176 95175->95159 95176->95175 95177 4d29c8 _free 20 API calls 95176->95177 95177->95175 95179 4d863e 95178->95179 95180 4d8653 95178->95180 95318 4cf2c6 20 API calls _free 95179->95318 95182 4d868e 95180->95182 95187 4d867a 95180->95187 95320 4cf2c6 20 API calls _free 95182->95320 95184 4d8643 95319 4cf2d9 20 API calls _free 95184->95319 95185 4d8693 95321 4cf2d9 20 API calls _free 95185->95321 95315 4d8607 95187->95315 95190 4ce64c 95190->95163 95190->95164 95191 4d869b 95322 4d27ec 26 API calls _abort 95191->95322 95193->95154 95194->95163 95196 4d59ca ___DestructExceptionObject 95195->95196 95197 4d59d2 95196->95197 95202 4d59ea 95196->95202 95274 4cf2c6 20 API calls _free 95197->95274 95199 4d5a88 95279 4cf2c6 20 API calls _free 95199->95279 95200 4d59d7 95275 4cf2d9 20 API calls _free 95200->95275 95202->95199 95205 4d5a1f 95202->95205 95204 4d5a8d 95280 4cf2d9 20 API calls _free 95204->95280 95220 4d5147 EnterCriticalSection 95205->95220 95208 4d5a95 95281 4d27ec 26 API calls _abort 95208->95281 95209 4d5a25 95211 4d5a56 95209->95211 95212 4d5a41 95209->95212 95221 4d5aa9 95211->95221 95276 4cf2d9 20 API calls _free 95212->95276 95214 4d59df __fread_nolock 95214->95169 95216 4d5a46 95277 4cf2c6 20 API calls _free 95216->95277 95217 4d5a51 95278 4d5a80 LeaveCriticalSection __wsopen_s 95217->95278 95220->95209 95222 4d5ad7 95221->95222 95260 4d5ad0 95221->95260 95223 4d5adb 95222->95223 95224 4d5afa 95222->95224 95289 4cf2c6 20 API calls _free 95223->95289 95228 4d5b4b 95224->95228 95229 4d5b2e 95224->95229 95227 4d5ae0 95290 4cf2d9 20 API calls _free 95227->95290 95238 4d5b61 95228->95238 95295 4d9424 28 API calls __fread_nolock 95228->95295 95292 4cf2c6 20 API calls _free 95229->95292 95230 4d5cb1 95230->95217 95233 4d5ae7 95291 4d27ec 26 API calls _abort 95233->95291 95236 4d5b33 95293 4cf2d9 20 API calls _free 95236->95293 95282 4d564e 95238->95282 95241 4d5b6f 95246 4d5b95 95241->95246 95247 4d5b73 95241->95247 95242 4d5ba8 95244 4d5bbc 95242->95244 95245 4d5c02 WriteFile 95242->95245 95243 4d5b3b 95294 4d27ec 26 API calls _abort 95243->95294 95249 4d5bc4 95244->95249 95250 4d5bf2 95244->95250 95252 4d5c25 GetLastError 95245->95252 95254 4d5b8b 95245->95254 95297 4d542e 45 API calls 3 library calls 95246->95297 95251 4d5c69 95247->95251 95296 4d55e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 95247->95296 95255 4d5bc9 95249->95255 95256 4d5be2 95249->95256 95300 4d56c4 7 API calls 2 library calls 95250->95300 95251->95260 95304 4cf2d9 20 API calls _free 95251->95304 95252->95254 95254->95251 95254->95260 95265 4d5c45 95254->95265 95255->95251 95261 4d5bd2 95255->95261 95299 4d5891 8 API calls 2 library calls 95256->95299 95306 4c0a8c 95260->95306 95298 4d57a3 7 API calls 2 library calls 95261->95298 95263 4d5be0 95263->95254 95264 4d5c8e 95305 4cf2c6 20 API calls _free 95264->95305 95268 4d5c4c 95265->95268 95269 4d5c60 95265->95269 95301 4cf2d9 20 API calls _free 95268->95301 95303 4cf2a3 20 API calls 2 library calls 95269->95303 95272 4d5c51 95302 4cf2c6 20 API calls _free 95272->95302 95274->95200 95275->95214 95276->95216 95277->95217 95278->95214 95279->95204 95280->95208 95281->95214 95283 4df89b __fread_nolock 26 API calls 95282->95283 95284 4d565e 95283->95284 95285 4d5663 95284->95285 95313 4d2d74 38 API calls 3 library calls 95284->95313 95285->95241 95285->95242 95287 4d5686 95287->95285 95288 4d56a4 GetConsoleMode 95287->95288 95288->95285 95289->95227 95290->95233 95291->95260 95292->95236 95293->95243 95294->95260 95295->95238 95296->95254 95297->95254 95298->95263 95299->95263 95300->95263 95301->95272 95302->95260 95303->95260 95304->95264 95305->95260 95307 4c0a95 95306->95307 95308 4c0a97 IsProcessorFeaturePresent 95306->95308 95307->95230 95310 4c0c5d 95308->95310 95314 4c0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 95310->95314 95312 4c0d40 95312->95230 95313->95287 95314->95312 95323 4d8585 95315->95323 95317 4d862b 95317->95190 95318->95184 95319->95190 95320->95185 95321->95191 95322->95190 95324 4d8591 ___DestructExceptionObject 95323->95324 95334 4d5147 EnterCriticalSection 95324->95334 95326 4d859f 95327 4d85c6 95326->95327 95328 4d85d1 95326->95328 95335 4d86ae 95327->95335 95350 4cf2d9 20 API calls _free 95328->95350 95331 4d85cc 95351 4d85fb LeaveCriticalSection __wsopen_s 95331->95351 95333 4d85ee __fread_nolock 95333->95317 95334->95326 95352 4d53c4 95335->95352 95337 4d86c4 95365 4d5333 21 API calls 3 library calls 95337->95365 95339 4d86be 95339->95337 95340 4d86f6 95339->95340 95342 4d53c4 __wsopen_s 26 API calls 95339->95342 95340->95337 95343 4d53c4 __wsopen_s 26 API calls 95340->95343 95341 4d871c 95345 4d873e 95341->95345 95366 4cf2a3 20 API calls 2 library calls 95341->95366 95346 4d86ed 95342->95346 95344 4d8702 CloseHandle 95343->95344 95344->95337 95347 4d870e GetLastError 95344->95347 95345->95331 95349 4d53c4 __wsopen_s 26 API calls 95346->95349 95347->95337 95349->95340 95350->95331 95351->95333 95353 4d53e6 95352->95353 95354 4d53d1 95352->95354 95356 4cf2c6 __dosmaperr 20 API calls 95353->95356 95358 4d540b 95353->95358 95355 4cf2c6 __dosmaperr 20 API calls 95354->95355 95357 4d53d6 95355->95357 95359 4d5416 95356->95359 95360 4cf2d9 _free 20 API calls 95357->95360 95358->95339 95361 4cf2d9 _free 20 API calls 95359->95361 95362 4d53de 95360->95362 95363 4d541e 95361->95363 95362->95339 95364 4d27ec _abort 26 API calls 95363->95364 95364->95362 95365->95341 95366->95345 95367->94584 95368 4e2ba5 95369 4e2baf 95368->95369 95370 4a2b25 95368->95370 95411 4a3a5a 95369->95411 95396 4a2b83 7 API calls 95370->95396 95374 4e2bb8 95418 4a9cb3 95374->95418 95377 4a2b2f 95385 4a2b44 95377->95385 95400 4a3837 95377->95400 95378 4e2bc6 95379 4e2bce 95378->95379 95380 4e2bf5 95378->95380 95424 4a33c6 95379->95424 95381 4a33c6 22 API calls 95380->95381 95394 4e2bf1 GetForegroundWindow ShellExecuteW 95381->95394 95386 4a2b5f 95385->95386 95410 4a30f2 Shell_NotifyIconW ___scrt_fastfail 95385->95410 95392 4a2b66 SetCurrentDirectoryW 95386->95392 95391 4a33c6 22 API calls 95391->95394 95395 4a2b7a 95392->95395 95393 4e2c26 95393->95386 95394->95393 95442 4a2cd4 7 API calls 95396->95442 95398 4a2b2a 95399 4a2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95398->95399 95399->95377 95401 4a3862 ___scrt_fastfail 95400->95401 95443 4a4212 95401->95443 95404 4a38e8 95406 4e3386 Shell_NotifyIconW 95404->95406 95407 4a3906 Shell_NotifyIconW 95404->95407 95447 4a3923 95407->95447 95409 4a391c 95409->95385 95410->95386 95412 4e1f50 __wsopen_s 95411->95412 95413 4a3a67 GetModuleFileNameW 95412->95413 95414 4a9cb3 22 API calls 95413->95414 95415 4a3a8d 95414->95415 95416 4a3aa2 23 API calls 95415->95416 95417 4a3a97 95416->95417 95417->95374 95419 4a9cc2 _wcslen 95418->95419 95420 4bfe0b 22 API calls 95419->95420 95421 4a9cea __fread_nolock 95420->95421 95422 4bfddb 22 API calls 95421->95422 95423 4a9d00 95422->95423 95423->95378 95425 4e30bb 95424->95425 95426 4a33dd 95424->95426 95427 4bfddb 22 API calls 95425->95427 95479 4a33ee 95426->95479 95430 4e30c5 _wcslen 95427->95430 95429 4a33e8 95433 4a6350 95429->95433 95431 4bfe0b 22 API calls 95430->95431 95432 4e30fe __fread_nolock 95431->95432 95434 4a6362 95433->95434 95435 4e4a51 95433->95435 95494 4a6373 95434->95494 95504 4a4a88 22 API calls __fread_nolock 95435->95504 95438 4a636e 95438->95391 95439 4e4a5b 95440 4e4a67 95439->95440 95441 4aa8c7 22 API calls 95439->95441 95441->95440 95442->95398 95444 4e35a4 95443->95444 95445 4a38b7 95443->95445 95444->95445 95446 4e35ad DestroyIcon 95444->95446 95445->95404 95469 50c874 42 API calls _strftime 95445->95469 95446->95445 95448 4a393f 95447->95448 95449 4a3a13 95447->95449 95470 4a6270 95448->95470 95449->95409 95452 4a395a 95454 4a6b57 22 API calls 95452->95454 95453 4e3393 LoadStringW 95455 4e33ad 95453->95455 95456 4a396f 95454->95456 95463 4a3994 ___scrt_fastfail 95455->95463 95475 4aa8c7 95455->95475 95457 4a397c 95456->95457 95458 4e33c9 95456->95458 95457->95455 95460 4a3986 95457->95460 95461 4a6350 22 API calls 95458->95461 95462 4a6350 22 API calls 95460->95462 95464 4e33d7 95461->95464 95462->95463 95466 4a39f9 Shell_NotifyIconW 95463->95466 95464->95463 95465 4a33c6 22 API calls 95464->95465 95467 4e33f9 95465->95467 95466->95449 95468 4a33c6 22 API calls 95467->95468 95468->95463 95469->95404 95471 4bfe0b 22 API calls 95470->95471 95472 4a6295 95471->95472 95473 4bfddb 22 API calls 95472->95473 95474 4a394d 95473->95474 95474->95452 95474->95453 95476 4aa8ea __fread_nolock 95475->95476 95477 4aa8db 95475->95477 95476->95463 95477->95476 95478 4bfe0b 22 API calls 95477->95478 95478->95476 95480 4a33fe _wcslen 95479->95480 95481 4e311d 95480->95481 95482 4a3411 95480->95482 95484 4bfddb 22 API calls 95481->95484 95489 4aa587 95482->95489 95486 4e3127 95484->95486 95485 4a341e __fread_nolock 95485->95429 95487 4bfe0b 22 API calls 95486->95487 95488 4e3157 __fread_nolock 95487->95488 95490 4aa59d 95489->95490 95493 4aa598 __fread_nolock 95489->95493 95491 4bfe0b 22 API calls 95490->95491 95492 4ef80f 95490->95492 95491->95493 95492->95492 95493->95485 95495 4a6382 95494->95495 95500 4a63b6 __fread_nolock 95494->95500 95496 4e4a82 95495->95496 95497 4a63a9 95495->95497 95495->95500 95499 4bfddb 22 API calls 95496->95499 95498 4aa587 22 API calls 95497->95498 95498->95500 95501 4e4a91 95499->95501 95500->95438 95502 4bfe0b 22 API calls 95501->95502 95503 4e4ac5 __fread_nolock 95502->95503 95504->95439 95505 4a1044 95510 4a10f3 95505->95510 95507 4a104a 95546 4c00a3 29 API calls __onexit 95507->95546 95509 4a1054 95547 4a1398 95510->95547 95514 4a116a 95515 4aa961 22 API calls 95514->95515 95516 4a1174 95515->95516 95517 4aa961 22 API calls 95516->95517 95518 4a117e 95517->95518 95519 4aa961 22 API calls 95518->95519 95520 4a1188 95519->95520 95521 4aa961 22 API calls 95520->95521 95522 4a11c6 95521->95522 95523 4aa961 22 API calls 95522->95523 95524 4a1292 95523->95524 95557 4a171c 95524->95557 95528 4a12c4 95529 4aa961 22 API calls 95528->95529 95530 4a12ce 95529->95530 95578 4b1940 95530->95578 95532 4a12f9 95588 4a1aab 95532->95588 95534 4a1315 95535 4a1325 GetStdHandle 95534->95535 95536 4a137a 95535->95536 95537 4e2485 95535->95537 95540 4a1387 OleInitialize 95536->95540 95537->95536 95538 4e248e 95537->95538 95539 4bfddb 22 API calls 95538->95539 95541 4e2495 95539->95541 95540->95507 95595 51011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95541->95595 95543 4e249e 95596 510944 CreateThread 95543->95596 95545 4e24aa CloseHandle 95545->95536 95546->95509 95597 4a13f1 95547->95597 95550 4a13f1 22 API calls 95551 4a13d0 95550->95551 95552 4aa961 22 API calls 95551->95552 95553 4a13dc 95552->95553 95554 4a6b57 22 API calls 95553->95554 95555 4a1129 95554->95555 95556 4a1bc3 6 API calls 95555->95556 95556->95514 95558 4aa961 22 API calls 95557->95558 95559 4a172c 95558->95559 95560 4aa961 22 API calls 95559->95560 95561 4a1734 95560->95561 95562 4aa961 22 API calls 95561->95562 95563 4a174f 95562->95563 95564 4bfddb 22 API calls 95563->95564 95565 4a129c 95564->95565 95566 4a1b4a 95565->95566 95567 4a1b58 95566->95567 95568 4aa961 22 API calls 95567->95568 95569 4a1b63 95568->95569 95570 4aa961 22 API calls 95569->95570 95571 4a1b6e 95570->95571 95572 4aa961 22 API calls 95571->95572 95573 4a1b79 95572->95573 95574 4aa961 22 API calls 95573->95574 95575 4a1b84 95574->95575 95576 4bfddb 22 API calls 95575->95576 95577 4a1b96 RegisterWindowMessageW 95576->95577 95577->95528 95579 4b1981 95578->95579 95583 4b195d 95578->95583 95604 4c0242 5 API calls __Init_thread_wait 95579->95604 95582 4b198b 95582->95583 95605 4c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95582->95605 95587 4b196e 95583->95587 95606 4c0242 5 API calls __Init_thread_wait 95583->95606 95584 4b8727 95584->95587 95607 4c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95584->95607 95587->95532 95589 4a1abb 95588->95589 95590 4e272d 95588->95590 95591 4bfddb 22 API calls 95589->95591 95608 513209 23 API calls 95590->95608 95593 4a1ac3 95591->95593 95593->95534 95594 4e2738 95595->95543 95596->95545 95609 51092a 28 API calls 95596->95609 95598 4aa961 22 API calls 95597->95598 95599 4a13fc 95598->95599 95600 4aa961 22 API calls 95599->95600 95601 4a1404 95600->95601 95602 4aa961 22 API calls 95601->95602 95603 4a13c6 95602->95603 95603->95550 95604->95582 95605->95583 95606->95584 95607->95587 95608->95594 95610 4f3a41 95614 5110c0 95610->95614 95612 4f3a4c 95613 5110c0 53 API calls 95612->95613 95613->95612 95615 5110fa 95614->95615 95620 5110cd 95614->95620 95615->95612 95616 5110fc 95649 4bfa11 53 API calls 95616->95649 95618 511101 95625 4a7510 95618->95625 95620->95615 95620->95616 95620->95618 95623 5110f4 95620->95623 95622 4a6350 22 API calls 95622->95615 95648 4ab270 39 API calls 95623->95648 95626 4a7522 95625->95626 95627 4a7525 95625->95627 95626->95622 95628 4a755b 95627->95628 95629 4a752d 95627->95629 95631 4e50f6 95628->95631 95634 4a756d 95628->95634 95640 4e500f 95628->95640 95650 4c51c6 26 API calls 95629->95650 95653 4c5183 26 API calls 95631->95653 95632 4a753d 95638 4bfddb 22 API calls 95632->95638 95651 4bfb21 51 API calls 95634->95651 95635 4e510e 95635->95635 95639 4a7547 95638->95639 95641 4a9cb3 22 API calls 95639->95641 95642 4bfe0b 22 API calls 95640->95642 95647 4e5088 95640->95647 95641->95626 95643 4e5058 95642->95643 95644 4bfddb 22 API calls 95643->95644 95645 4e507f 95644->95645 95646 4a9cb3 22 API calls 95645->95646 95646->95647 95652 4bfb21 51 API calls 95647->95652 95648->95615 95649->95618 95650->95632 95651->95632 95652->95631 95653->95635 95654 4d8402 95659 4d81be 95654->95659 95657 4d842a 95663 4d81ef try_get_first_available_module 95659->95663 95661 4d83ee 95678 4d27ec 26 API calls _abort 95661->95678 95670 4d8338 95663->95670 95674 4c8e0b 40 API calls 2 library calls 95663->95674 95664 4d8343 95664->95657 95671 4e0984 95664->95671 95666 4d838c 95666->95670 95675 4c8e0b 40 API calls 2 library calls 95666->95675 95668 4d83ab 95668->95670 95676 4c8e0b 40 API calls 2 library calls 95668->95676 95670->95664 95677 4cf2d9 20 API calls _free 95670->95677 95679 4e0081 95671->95679 95673 4e099f 95673->95657 95674->95666 95675->95668 95676->95670 95677->95661 95678->95664 95680 4e008d ___DestructExceptionObject 95679->95680 95681 4e009b 95680->95681 95684 4e00d4 95680->95684 95736 4cf2d9 20 API calls _free 95681->95736 95683 4e00a0 95737 4d27ec 26 API calls _abort 95683->95737 95690 4e065b 95684->95690 95689 4e00aa __fread_nolock 95689->95673 95691 4e0678 95690->95691 95692 4e068d 95691->95692 95693 4e06a6 95691->95693 95753 4cf2c6 20 API calls _free 95692->95753 95739 4d5221 95693->95739 95696 4e06ab 95697 4e06cb 95696->95697 95698 4e06b4 95696->95698 95752 4e039a CreateFileW 95697->95752 95755 4cf2c6 20 API calls _free 95698->95755 95702 4e06b9 95756 4cf2d9 20 API calls _free 95702->95756 95703 4e0781 GetFileType 95707 4e078c GetLastError 95703->95707 95708 4e07d3 95703->95708 95705 4e0756 GetLastError 95758 4cf2a3 20 API calls 2 library calls 95705->95758 95706 4e0704 95706->95703 95706->95705 95757 4e039a CreateFileW 95706->95757 95759 4cf2a3 20 API calls 2 library calls 95707->95759 95761 4d516a 21 API calls 3 library calls 95708->95761 95709 4e0692 95754 4cf2d9 20 API calls _free 95709->95754 95713 4e079a CloseHandle 95713->95709 95716 4e07c3 95713->95716 95715 4e0749 95715->95703 95715->95705 95760 4cf2d9 20 API calls _free 95716->95760 95717 4e07f4 95719 4e0840 95717->95719 95762 4e05ab 72 API calls 4 library calls 95717->95762 95724 4e086d 95719->95724 95763 4e014d 72 API calls 4 library calls 95719->95763 95720 4e07c8 95720->95709 95723 4e0866 95723->95724 95725 4e087e 95723->95725 95726 4d86ae __wsopen_s 29 API calls 95724->95726 95727 4e00f8 95725->95727 95728 4e08fc CloseHandle 95725->95728 95726->95727 95738 4e0121 LeaveCriticalSection __wsopen_s 95727->95738 95764 4e039a CreateFileW 95728->95764 95730 4e0927 95731 4e095d 95730->95731 95732 4e0931 GetLastError 95730->95732 95731->95727 95765 4cf2a3 20 API calls 2 library calls 95732->95765 95734 4e093d 95766 4d5333 21 API calls 3 library calls 95734->95766 95736->95683 95737->95689 95738->95689 95740 4d522d ___DestructExceptionObject 95739->95740 95767 4d2f5e EnterCriticalSection 95740->95767 95742 4d5259 95771 4d5000 95742->95771 95745 4d52a4 __fread_nolock 95745->95696 95746 4d5234 95746->95742 95748 4d52c7 EnterCriticalSection 95746->95748 95749 4d527b 95746->95749 95748->95749 95750 4d52d4 LeaveCriticalSection 95748->95750 95768 4d532a 95749->95768 95750->95746 95752->95706 95753->95709 95754->95727 95755->95702 95756->95709 95757->95715 95758->95709 95759->95713 95760->95720 95761->95717 95762->95719 95763->95723 95764->95730 95765->95734 95766->95731 95767->95746 95779 4d2fa6 LeaveCriticalSection 95768->95779 95770 4d5331 95770->95745 95772 4d4c7d CallUnexpected 20 API calls 95771->95772 95774 4d5012 95772->95774 95773 4d501f 95775 4d29c8 _free 20 API calls 95773->95775 95774->95773 95780 4d3405 11 API calls 2 library calls 95774->95780 95777 4d5071 95775->95777 95777->95749 95778 4d5147 EnterCriticalSection 95777->95778 95778->95749 95779->95770 95780->95774 95781 4f2a00 95796 4ad7b0 messages 95781->95796 95782 4adb11 PeekMessageW 95782->95796 95783 4ad807 GetInputState 95783->95782 95783->95796 95785 4f1cbe TranslateAcceleratorW 95785->95796 95786 4adb8f PeekMessageW 95786->95796 95787 4ada04 timeGetTime 95787->95796 95788 4adb73 TranslateMessage DispatchMessageW 95788->95786 95789 4adbaf Sleep 95807 4adbc0 95789->95807 95790 4f2b74 Sleep 95790->95807 95791 4be551 timeGetTime 95791->95807 95792 4f1dda timeGetTime 95957 4be300 23 API calls 95792->95957 95795 4f2c0b GetExitCodeProcess 95799 4f2c37 CloseHandle 95795->95799 95800 4f2c21 WaitForSingleObject 95795->95800 95796->95782 95796->95783 95796->95785 95796->95786 95796->95787 95796->95788 95796->95789 95796->95790 95796->95792 95802 4ad9d5 95796->95802 95813 4adfd0 95796->95813 95836 4b1310 95796->95836 95893 4bedf6 95796->95893 95898 4add50 235 API calls 95796->95898 95899 4abf40 95796->95899 95958 513a2a 23 API calls 95796->95958 95959 4aec40 95796->95959 95983 51359c 82 API calls __wsopen_s 95796->95983 95797 5329bf GetForegroundWindow 95797->95807 95799->95807 95800->95796 95800->95799 95801 4f2a31 95801->95802 95803 4f2ca9 Sleep 95803->95796 95807->95791 95807->95795 95807->95796 95807->95797 95807->95801 95807->95802 95807->95803 95984 525658 23 API calls 95807->95984 95985 50e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95807->95985 95986 50d4dc 47 API calls 95807->95986 95814 4ae010 95813->95814 95829 4ae0dc messages 95814->95829 95989 4c0242 5 API calls __Init_thread_wait 95814->95989 95817 4f2fca 95819 4aa961 22 API calls 95817->95819 95817->95829 95818 4aa961 22 API calls 95818->95829 95820 4f2fe4 95819->95820 95990 4c00a3 29 API calls __onexit 95820->95990 95824 4f2fee 95991 4c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95824->95991 95828 4aa8c7 22 API calls 95828->95829 95829->95818 95829->95828 95830 51359c 82 API calls 95829->95830 95831 4aec40 235 API calls 95829->95831 95832 4ae3e1 95829->95832 95833 4b04f0 22 API calls 95829->95833 95987 4aa81b 41 API calls 95829->95987 95988 4ba308 235 API calls 95829->95988 95992 4c0242 5 API calls __Init_thread_wait 95829->95992 95993 4c00a3 29 API calls __onexit 95829->95993 95994 4c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95829->95994 95995 5247d4 235 API calls 95829->95995 95996 5268c1 235 API calls 95829->95996 95830->95829 95831->95829 95832->95796 95833->95829 95837 4b17b0 95836->95837 95838 4b1376 95836->95838 96096 4c0242 5 API calls __Init_thread_wait 95837->96096 95840 4b1390 95838->95840 95841 4f6331 95838->95841 95844 4b1940 9 API calls 95840->95844 96110 52709c 235 API calls 95841->96110 95843 4b17ba 95846 4b17fb 95843->95846 95849 4a9cb3 22 API calls 95843->95849 95847 4b13a0 95844->95847 95845 4f633d 95845->95796 95851 4f6346 95846->95851 95853 4b182c 95846->95853 95848 4b1940 9 API calls 95847->95848 95850 4b13b6 95848->95850 95857 4b17d4 95849->95857 95850->95846 95852 4b13ec 95850->95852 96111 51359c 82 API calls __wsopen_s 95851->96111 95852->95851 95876 4b1408 __fread_nolock 95852->95876 96098 4aaceb 95853->96098 95856 4b1839 96108 4bd217 235 API calls 95856->96108 96097 4c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95857->96097 95860 4f636e 96112 51359c 82 API calls __wsopen_s 95860->96112 95861 4b152f 95863 4b153c 95861->95863 95864 4f63d1 95861->95864 95866 4b1940 9 API calls 95863->95866 96114 525745 54 API calls _wcslen 95864->96114 95867 4b1549 95866->95867 95870 4f64fa 95867->95870 95872 4b1940 9 API calls 95867->95872 95868 4bfddb 22 API calls 95868->95876 95869 4bfe0b 22 API calls 95869->95876 95880 4f6369 95870->95880 96115 51359c 82 API calls __wsopen_s 95870->96115 95871 4b1872 96109 4bfaeb 23 API calls 95871->96109 95878 4b1563 95872->95878 95875 4aec40 235 API calls 95875->95876 95876->95856 95876->95860 95876->95861 95876->95868 95876->95869 95876->95875 95877 4f63b2 95876->95877 95876->95880 96113 51359c 82 API calls __wsopen_s 95877->96113 95878->95870 95881 4aa8c7 22 API calls 95878->95881 95883 4b15c7 messages 95878->95883 95880->95796 95881->95883 95882 4b1940 9 API calls 95882->95883 95883->95870 95883->95871 95883->95880 95883->95882 95885 4b167b messages 95883->95885 95888 4a4f39 68 API calls 95883->95888 95997 516ef1 95883->95997 96077 52958b 95883->96077 96080 52959f 95883->96080 96083 51f0ec 95883->96083 96092 50d4ce 95883->96092 95884 4b171d 95884->95796 95885->95884 96095 4bce17 22 API calls messages 95885->96095 95888->95883 95894 4bee09 95893->95894 95895 4bee12 95893->95895 95894->95796 95895->95894 95896 4bee36 IsDialogMessageW 95895->95896 95897 4fefaf GetClassLongW 95895->95897 95896->95894 95896->95895 95897->95895 95897->95896 95898->95796 96429 4aadf0 95899->96429 95901 4abf9d 95902 4abfa9 95901->95902 95903 4f04b6 95901->95903 95905 4f04c6 95902->95905 95906 4ac01e 95902->95906 96457 51359c 82 API calls __wsopen_s 95903->96457 96458 51359c 82 API calls __wsopen_s 95905->96458 96434 4aac91 95906->96434 95909 4ac603 95909->95796 95910 4ac7da 95915 4bfe0b 22 API calls 95910->95915 95912 507120 22 API calls 95926 4ac039 __fread_nolock messages 95912->95926 95920 4ac808 __fread_nolock 95915->95920 95917 4f04f5 95921 4f055a 95917->95921 96459 4bd217 235 API calls 95917->96459 95923 4bfe0b 22 API calls 95920->95923 95921->95909 96460 51359c 82 API calls __wsopen_s 95921->96460 95922 4aec40 235 API calls 95922->95926 95929 4ac350 __fread_nolock messages 95923->95929 95924 4aaf8a 22 API calls 95924->95926 95925 4f091a 96469 513209 23 API calls 95925->96469 95926->95909 95926->95910 95926->95912 95926->95917 95926->95920 95926->95921 95926->95922 95926->95924 95926->95925 95930 4f08a5 95926->95930 95932 4ac237 95926->95932 95935 4f0591 95926->95935 95939 4f08f6 95926->95939 95942 4aaceb 23 API calls 95926->95942 95946 4bfddb 22 API calls 95926->95946 95951 4f09bf 95926->95951 95954 4abbe0 40 API calls 95926->95954 95956 4bfe0b 22 API calls 95926->95956 96438 4aad81 95926->96438 96462 507099 22 API calls __fread_nolock 95926->96462 96463 525745 54 API calls _wcslen 95926->96463 96464 4baa42 22 API calls messages 95926->96464 96465 50f05c 40 API calls 95926->96465 96466 4aa993 41 API calls 95926->96466 95941 4ac3ac 95929->95941 96456 4bce17 22 API calls messages 95929->96456 95931 4aec40 235 API calls 95930->95931 95933 4f08cf 95931->95933 95943 4ac253 95932->95943 95945 4aa8c7 22 API calls 95932->95945 95933->95909 96467 4aa81b 41 API calls 95933->96467 96461 51359c 82 API calls __wsopen_s 95935->96461 96468 51359c 82 API calls __wsopen_s 95939->96468 95941->95796 95942->95926 95944 4f0976 95943->95944 95949 4ac297 messages 95943->95949 95948 4aaceb 23 API calls 95944->95948 95945->95943 95946->95926 95948->95951 95950 4aaceb 23 API calls 95949->95950 95949->95951 95952 4ac335 95950->95952 95951->95909 96470 51359c 82 API calls __wsopen_s 95951->96470 95952->95951 95953 4ac342 95952->95953 96445 4aa704 95953->96445 95954->95926 95956->95926 95957->95796 95958->95796 95977 4aec76 messages 95959->95977 95960 4bfddb 22 API calls 95960->95977 95961 4c00a3 29 API calls pre_c_initialization 95961->95977 95963 4afef7 95968 4aa8c7 22 API calls 95963->95968 95976 4aed9d messages 95963->95976 95965 4f4600 95971 4aa8c7 22 API calls 95965->95971 95965->95976 95966 4f4b0b 96496 51359c 82 API calls __wsopen_s 95966->96496 95967 4aa8c7 22 API calls 95967->95977 95968->95976 95971->95976 95973 4c0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95973->95977 95974 4afbe3 95974->95976 95978 4f4bdc 95974->95978 95982 4af3ae messages 95974->95982 95975 4aa961 22 API calls 95975->95977 95976->95796 95977->95960 95977->95961 95977->95963 95977->95965 95977->95966 95977->95967 95977->95973 95977->95974 95977->95975 95977->95976 95980 4f4beb 95977->95980 95981 4c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95977->95981 95977->95982 96493 4b01e0 235 API calls 2 library calls 95977->96493 96494 4b06a0 41 API calls messages 95977->96494 96497 51359c 82 API calls __wsopen_s 95978->96497 96498 51359c 82 API calls __wsopen_s 95980->96498 95981->95977 95982->95976 96495 51359c 82 API calls __wsopen_s 95982->96495 95983->95796 95984->95807 95985->95807 95986->95807 95987->95829 95988->95829 95989->95817 95990->95824 95991->95829 95992->95829 95993->95829 95994->95829 95995->95829 95996->95829 95998 4aa961 22 API calls 95997->95998 95999 516f1d 95998->95999 96000 4aa961 22 API calls 95999->96000 96001 516f26 96000->96001 96002 516f3a 96001->96002 96270 4ab567 39 API calls 96001->96270 96004 4a7510 53 API calls 96002->96004 96010 516f57 _wcslen 96004->96010 96005 516fbc 96008 4a7510 53 API calls 96005->96008 96006 5170bf 96007 4a4ecb 94 API calls 96006->96007 96009 5170d0 96007->96009 96011 516fc8 96008->96011 96012 4a4ecb 94 API calls 96009->96012 96015 5170e5 96009->96015 96010->96005 96010->96006 96076 5170e9 96010->96076 96014 4aa8c7 22 API calls 96011->96014 96018 516fdb 96011->96018 96012->96015 96013 4aa961 22 API calls 96016 51711a 96013->96016 96014->96018 96015->96013 96015->96076 96019 4aa961 22 API calls 96016->96019 96017 517027 96022 4a7510 53 API calls 96017->96022 96018->96017 96021 517005 96018->96021 96024 4aa8c7 22 API calls 96018->96024 96020 517126 96019->96020 96023 4aa961 22 API calls 96020->96023 96025 4a33c6 22 API calls 96021->96025 96026 517034 96022->96026 96027 51712f 96023->96027 96024->96021 96028 51700f 96025->96028 96029 517047 96026->96029 96030 51703d 96026->96030 96033 4aa961 22 API calls 96027->96033 96034 4a7510 53 API calls 96028->96034 96271 50e199 GetFileAttributesW 96029->96271 96031 4aa8c7 22 API calls 96030->96031 96031->96029 96036 517138 96033->96036 96037 51701b 96034->96037 96035 517050 96038 517063 96035->96038 96041 4a4c6d 22 API calls 96035->96041 96039 4a7510 53 API calls 96036->96039 96040 4a6350 22 API calls 96037->96040 96043 4a7510 53 API calls 96038->96043 96049 517069 96038->96049 96042 517145 96039->96042 96040->96017 96041->96038 96116 4a525f 96042->96116 96045 5170a0 96043->96045 96272 50d076 57 API calls 96045->96272 96046 517166 96158 4a4c6d 96046->96158 96049->96076 96051 5171a9 96052 4aa8c7 22 API calls 96051->96052 96054 5171ba 96052->96054 96053 4a4c6d 22 API calls 96055 517186 96053->96055 96056 4a6350 22 API calls 96054->96056 96055->96051 96058 4a6b57 22 API calls 96055->96058 96057 5171c8 96056->96057 96060 4a6350 22 API calls 96057->96060 96059 51719b 96058->96059 96061 4a6b57 22 API calls 96059->96061 96062 5171d6 96060->96062 96061->96051 96063 4a6350 22 API calls 96062->96063 96064 5171e4 96063->96064 96065 4a7510 53 API calls 96064->96065 96066 5171f0 96065->96066 96161 50d7bc 96066->96161 96068 517201 96069 50d4ce 4 API calls 96068->96069 96070 51720b 96069->96070 96071 4a7510 53 API calls 96070->96071 96075 517239 96070->96075 96072 517229 96071->96072 96215 512947 96072->96215 96074 4a4f39 68 API calls 96074->96076 96075->96074 96076->95883 96296 527f59 96077->96296 96079 52959b 96079->95883 96081 527f59 120 API calls 96080->96081 96082 5295af 96081->96082 96082->95883 96084 4a7510 53 API calls 96083->96084 96085 51f126 96084->96085 96387 4a9e90 96085->96387 96087 51f136 96088 51f15b 96087->96088 96089 4aec40 235 API calls 96087->96089 96091 51f15f 96088->96091 96415 4a9c6e 22 API calls 96088->96415 96089->96088 96091->95883 96423 50dbbe lstrlenW 96092->96423 96095->95885 96096->95843 96097->95846 96099 4aacf9 96098->96099 96107 4aad2a messages 96098->96107 96100 4aad55 96099->96100 96102 4aad01 messages 96099->96102 96101 4aa8c7 22 API calls 96100->96101 96100->96107 96101->96107 96103 4efa48 96102->96103 96104 4aad21 96102->96104 96102->96107 96103->96107 96428 4bce17 22 API calls messages 96103->96428 96105 4efa3a VariantClear 96104->96105 96104->96107 96105->96107 96107->95856 96108->95871 96109->95871 96110->95845 96111->95880 96112->95880 96113->95880 96114->95878 96115->95880 96117 4aa961 22 API calls 96116->96117 96118 4a5275 96117->96118 96119 4aa961 22 API calls 96118->96119 96120 4a527d 96119->96120 96121 4aa961 22 API calls 96120->96121 96122 4a5285 96121->96122 96123 4aa961 22 API calls 96122->96123 96124 4a528d 96123->96124 96125 4e3df5 96124->96125 96126 4a52c1 96124->96126 96127 4aa8c7 22 API calls 96125->96127 96128 4a6d25 22 API calls 96126->96128 96129 4e3dfe 96127->96129 96130 4a52cf 96128->96130 96131 4aa6c3 22 API calls 96129->96131 96132 4a93b2 22 API calls 96130->96132 96135 4a5304 96131->96135 96133 4a52d9 96132->96133 96133->96135 96136 4a6d25 22 API calls 96133->96136 96134 4a5349 96273 4a6d25 96134->96273 96135->96134 96137 4a5325 96135->96137 96143 4e3e20 96135->96143 96139 4a52fa 96136->96139 96137->96134 96142 4a4c6d 22 API calls 96137->96142 96141 4a93b2 22 API calls 96139->96141 96140 4a535a 96144 4a5370 96140->96144 96148 4aa8c7 22 API calls 96140->96148 96141->96135 96146 4a5332 96142->96146 96147 4a6b57 22 API calls 96143->96147 96145 4a5384 96144->96145 96149 4aa8c7 22 API calls 96144->96149 96151 4aa8c7 22 API calls 96145->96151 96152 4a538f 96145->96152 96146->96134 96150 4a6d25 22 API calls 96146->96150 96155 4e3ee0 96147->96155 96148->96144 96149->96145 96150->96134 96151->96152 96153 4aa8c7 22 API calls 96152->96153 96157 4a539a 96152->96157 96153->96157 96154 4a4c6d 22 API calls 96154->96155 96155->96134 96155->96154 96286 4a49bd 22 API calls __fread_nolock 96155->96286 96157->96046 96159 4aaec9 22 API calls 96158->96159 96160 4a4c78 96159->96160 96160->96051 96160->96053 96162 50d7d8 96161->96162 96163 50d7f3 96162->96163 96164 50d7dd 96162->96164 96165 4aa961 22 API calls 96163->96165 96166 4aa8c7 22 API calls 96164->96166 96214 50d7ee 96164->96214 96167 50d7fb 96165->96167 96166->96214 96168 4aa961 22 API calls 96167->96168 96169 50d803 96168->96169 96170 4aa961 22 API calls 96169->96170 96171 50d80e 96170->96171 96172 4aa961 22 API calls 96171->96172 96173 50d816 96172->96173 96174 4aa961 22 API calls 96173->96174 96175 50d81e 96174->96175 96176 4aa961 22 API calls 96175->96176 96177 50d826 96176->96177 96178 4aa961 22 API calls 96177->96178 96179 50d82e 96178->96179 96180 4aa961 22 API calls 96179->96180 96181 50d836 96180->96181 96182 4a525f 22 API calls 96181->96182 96183 50d84d 96182->96183 96184 4a525f 22 API calls 96183->96184 96185 50d866 96184->96185 96186 4a4c6d 22 API calls 96185->96186 96187 50d872 96186->96187 96188 50d885 96187->96188 96189 4a93b2 22 API calls 96187->96189 96190 4a4c6d 22 API calls 96188->96190 96189->96188 96191 50d88e 96190->96191 96192 50d89e 96191->96192 96193 4a93b2 22 API calls 96191->96193 96194 50d8b0 96192->96194 96195 4aa8c7 22 API calls 96192->96195 96193->96192 96196 4a6350 22 API calls 96194->96196 96195->96194 96197 50d8bb 96196->96197 96288 50d978 22 API calls 96197->96288 96199 50d8ca 96289 50d978 22 API calls 96199->96289 96201 50d8dd 96202 4a4c6d 22 API calls 96201->96202 96203 50d8e7 96202->96203 96204 50d8ec 96203->96204 96205 50d8fe 96203->96205 96206 4a33c6 22 API calls 96204->96206 96207 4a4c6d 22 API calls 96205->96207 96208 50d8f9 96206->96208 96209 50d907 96207->96209 96211 4a6350 22 API calls 96208->96211 96210 50d925 96209->96210 96213 4a33c6 22 API calls 96209->96213 96212 4a6350 22 API calls 96210->96212 96211->96210 96212->96214 96213->96208 96214->96068 96216 512954 __wsopen_s 96215->96216 96217 4bfe0b 22 API calls 96216->96217 96218 512971 96217->96218 96219 4a5722 22 API calls 96218->96219 96220 51297b 96219->96220 96221 51274e 27 API calls 96220->96221 96222 512986 96221->96222 96223 4a511f 64 API calls 96222->96223 96224 51299b 96223->96224 96225 512a6c 96224->96225 96226 5129bf 96224->96226 96227 512e66 75 API calls 96225->96227 96228 512e66 75 API calls 96226->96228 96243 512a38 96227->96243 96229 5129c4 96228->96229 96233 512a75 messages 96229->96233 96294 4cd583 26 API calls 96229->96294 96231 4a50f5 40 API calls 96232 512a91 96231->96232 96234 4a50f5 40 API calls 96232->96234 96233->96075 96236 512aa1 96234->96236 96235 5129ed 96295 4cd583 26 API calls 96235->96295 96237 4a50f5 40 API calls 96236->96237 96239 512abc 96237->96239 96240 4a50f5 40 API calls 96239->96240 96241 512acc 96240->96241 96242 4a50f5 40 API calls 96241->96242 96244 512ae7 96242->96244 96243->96231 96243->96233 96245 4a50f5 40 API calls 96244->96245 96246 512af7 96245->96246 96247 4a50f5 40 API calls 96246->96247 96248 512b07 96247->96248 96249 4a50f5 40 API calls 96248->96249 96250 512b17 96249->96250 96290 513017 GetTempPathW GetTempFileNameW 96250->96290 96252 512b22 96253 4ce5eb 29 API calls 96252->96253 96264 512b33 96253->96264 96254 512bed 96255 4ce678 67 API calls 96254->96255 96256 512bf8 96255->96256 96258 512c12 96256->96258 96259 512bfe DeleteFileW 96256->96259 96257 4a50f5 40 API calls 96257->96264 96260 512c91 CopyFileW 96258->96260 96266 512c18 96258->96266 96259->96233 96261 512ca7 DeleteFileW 96260->96261 96262 512cb9 DeleteFileW 96260->96262 96261->96233 96291 512fd8 CreateFileW 96262->96291 96264->96233 96264->96254 96264->96257 96265 4cdbb3 65 API calls 96264->96265 96265->96264 96267 5122ce 79 API calls 96266->96267 96268 512c7c 96267->96268 96268->96262 96269 512c80 DeleteFileW 96268->96269 96269->96233 96270->96002 96271->96035 96272->96049 96274 4a6d91 96273->96274 96275 4a6d34 96273->96275 96276 4a93b2 22 API calls 96274->96276 96275->96274 96277 4a6d3f 96275->96277 96282 4a6d62 __fread_nolock 96276->96282 96278 4a6d5a 96277->96278 96279 4e4c9d 96277->96279 96287 4a6f34 22 API calls 96278->96287 96281 4bfddb 22 API calls 96279->96281 96283 4e4ca7 96281->96283 96282->96140 96284 4bfe0b 22 API calls 96283->96284 96285 4e4cda 96284->96285 96286->96155 96287->96282 96288->96199 96289->96201 96290->96252 96292 513013 96291->96292 96293 512fff SetFileTime CloseHandle 96291->96293 96292->96233 96293->96292 96294->96235 96295->96243 96297 4a7510 53 API calls 96296->96297 96298 527f90 96297->96298 96323 527fd5 messages 96298->96323 96334 528cd3 96298->96334 96300 528281 96301 52844f 96300->96301 96305 52828f 96300->96305 96374 528ee4 60 API calls 96301->96374 96304 52845e 96304->96305 96306 52846a 96304->96306 96347 527e86 96305->96347 96306->96323 96307 4a7510 53 API calls 96325 528049 96307->96325 96312 5282c8 96362 4bfc70 96312->96362 96315 528302 96369 4a63eb 22 API calls 96315->96369 96316 5282e8 96368 51359c 82 API calls __wsopen_s 96316->96368 96319 5282f3 GetCurrentProcess TerminateProcess 96319->96315 96320 528311 96370 4a6a50 22 API calls 96320->96370 96322 52832a 96333 528352 96322->96333 96371 4b04f0 22 API calls 96322->96371 96323->96079 96325->96300 96325->96307 96325->96323 96366 50417d 22 API calls __fread_nolock 96325->96366 96367 52851d 42 API calls _strftime 96325->96367 96326 5284c5 96326->96323 96328 5284d9 FreeLibrary 96326->96328 96327 528341 96372 528b7b 75 API calls 96327->96372 96328->96323 96332 4aaceb 23 API calls 96332->96333 96333->96326 96333->96332 96373 4b04f0 22 API calls 96333->96373 96375 528b7b 75 API calls 96333->96375 96335 4aaec9 22 API calls 96334->96335 96336 528cee CharLowerBuffW 96335->96336 96376 508e54 96336->96376 96340 4aa961 22 API calls 96341 528d2a 96340->96341 96342 4a6d25 22 API calls 96341->96342 96343 528d3e 96342->96343 96344 4a93b2 22 API calls 96343->96344 96346 528d48 _wcslen 96344->96346 96345 528e5e _wcslen 96345->96325 96346->96345 96383 52851d 42 API calls _strftime 96346->96383 96348 527ea1 96347->96348 96349 527eec 96347->96349 96350 4bfe0b 22 API calls 96348->96350 96353 529096 96349->96353 96351 527ec3 96350->96351 96351->96349 96352 4bfddb 22 API calls 96351->96352 96352->96351 96354 5292ab messages 96353->96354 96358 5290ba _strcat _wcslen 96353->96358 96354->96312 96355 4ab6b5 39 API calls 96355->96358 96356 4ab567 39 API calls 96356->96358 96357 4ab38f 39 API calls 96357->96358 96358->96354 96358->96355 96358->96356 96358->96357 96359 4cea0c 21 API calls ___std_exception_copy 96358->96359 96360 4a7510 53 API calls 96358->96360 96386 50efae 24 API calls _wcslen 96358->96386 96359->96358 96360->96358 96363 4bfc85 96362->96363 96364 4bfd1d VirtualProtect 96363->96364 96365 4bfceb 96363->96365 96364->96365 96365->96315 96365->96316 96366->96325 96367->96325 96368->96319 96369->96320 96370->96322 96371->96327 96372->96333 96373->96333 96374->96304 96375->96333 96378 508e74 _wcslen 96376->96378 96377 508f63 96377->96340 96377->96346 96378->96377 96379 508ea9 96378->96379 96381 508f68 96378->96381 96379->96377 96384 4bce60 41 API calls 96379->96384 96381->96377 96385 4bce60 41 API calls 96381->96385 96383->96345 96384->96379 96385->96381 96386->96358 96388 4a6270 22 API calls 96387->96388 96414 4a9eb5 96388->96414 96389 4a9fd2 96390 4aa4a1 22 API calls 96389->96390 96391 4a9fec 96390->96391 96391->96087 96394 4aa6c3 22 API calls 96394->96414 96395 4ef7c4 96421 5096e2 84 API calls __wsopen_s 96395->96421 96396 4ef699 96401 4bfddb 22 API calls 96396->96401 96398 4aa405 96398->96391 96422 5096e2 84 API calls __wsopen_s 96398->96422 96403 4ef754 96401->96403 96402 4ef7d2 96404 4aa4a1 22 API calls 96402->96404 96406 4bfe0b 22 API calls 96403->96406 96405 4ef7e8 96404->96405 96405->96391 96408 4aa12c __fread_nolock 96406->96408 96408->96395 96408->96398 96409 4aa587 22 API calls 96409->96414 96410 4aa4a1 22 API calls 96410->96414 96411 4aaec9 22 API calls 96412 4aa0db CharUpperBuffW 96411->96412 96417 4aa673 22 API calls 96412->96417 96414->96389 96414->96394 96414->96395 96414->96396 96414->96398 96414->96408 96414->96409 96414->96410 96414->96411 96416 4a4573 41 API calls _wcslen 96414->96416 96418 4a48c8 23 API calls 96414->96418 96419 4a49bd 22 API calls __fread_nolock 96414->96419 96420 4aa673 22 API calls 96414->96420 96415->96091 96416->96414 96417->96414 96418->96414 96419->96414 96420->96414 96421->96402 96422->96391 96424 50d4d5 96423->96424 96425 50dbdc GetFileAttributesW 96423->96425 96424->95883 96425->96424 96426 50dbe8 FindFirstFileW 96425->96426 96426->96424 96427 50dbf9 FindClose 96426->96427 96427->96424 96428->96107 96430 4aae01 96429->96430 96433 4aae1c messages 96429->96433 96431 4aaec9 22 API calls 96430->96431 96432 4aae09 CharUpperBuffW 96431->96432 96432->96433 96433->95901 96435 4aacae 96434->96435 96436 4aacd1 96435->96436 96471 51359c 82 API calls __wsopen_s 96435->96471 96436->95926 96439 4efadb 96438->96439 96440 4aad92 96438->96440 96441 4bfddb 22 API calls 96440->96441 96442 4aad99 96441->96442 96472 4aadcd 96442->96472 96446 4ef86f 96445->96446 96449 4aa718 96445->96449 96447 4ef87f 96446->96447 96491 504d4a 22 API calls messages 96446->96491 96450 4aa746 96449->96450 96455 4aa763 messages 96449->96455 96479 4aaf8a 96449->96479 96452 4aa74c 96450->96452 96453 4aaf8a 22 API calls 96450->96453 96452->96455 96487 4ab090 96452->96487 96453->96452 96455->95929 96456->95929 96457->95905 96458->95909 96459->95921 96460->95909 96461->95909 96462->95926 96463->95926 96464->95926 96465->95926 96466->95926 96467->95939 96468->95909 96469->95932 96470->95909 96471->96436 96475 4aaddd 96472->96475 96473 4aadb6 96473->95926 96474 4bfddb 22 API calls 96474->96475 96475->96473 96475->96474 96476 4aa961 22 API calls 96475->96476 96477 4aa8c7 22 API calls 96475->96477 96478 4aadcd 22 API calls 96475->96478 96476->96475 96477->96475 96478->96475 96480 4aaf98 96479->96480 96486 4aafc0 messages 96479->96486 96481 4aafa6 96480->96481 96482 4aaf8a 22 API calls 96480->96482 96483 4aafac 96481->96483 96484 4aaf8a 22 API calls 96481->96484 96482->96481 96485 4ab090 22 API calls 96483->96485 96483->96486 96484->96483 96485->96486 96486->96450 96488 4ab09b messages 96487->96488 96490 4ab0d6 messages 96488->96490 96492 4bce17 22 API calls messages 96488->96492 96490->96455 96491->96447 96492->96490 96493->95977 96494->95977 96495->95976 96496->95976 96497->95980 96498->95976 96499 4a105b 96504 4a344d 96499->96504 96501 4a106a 96535 4c00a3 29 API calls __onexit 96501->96535 96503 4a1074 96505 4a345d __wsopen_s 96504->96505 96506 4aa961 22 API calls 96505->96506 96507 4a3513 96506->96507 96508 4a3a5a 24 API calls 96507->96508 96509 4a351c 96508->96509 96536 4a3357 96509->96536 96512 4a33c6 22 API calls 96513 4a3535 96512->96513 96514 4a515f 22 API calls 96513->96514 96515 4a3544 96514->96515 96516 4aa961 22 API calls 96515->96516 96517 4a354d 96516->96517 96518 4aa6c3 22 API calls 96517->96518 96519 4a3556 RegOpenKeyExW 96518->96519 96520 4e3176 RegQueryValueExW 96519->96520 96524 4a3578 96519->96524 96521 4e320c RegCloseKey 96520->96521 96522 4e3193 96520->96522 96521->96524 96532 4e321e _wcslen 96521->96532 96523 4bfe0b 22 API calls 96522->96523 96525 4e31ac 96523->96525 96524->96501 96527 4a5722 22 API calls 96525->96527 96526 4a4c6d 22 API calls 96526->96532 96528 4e31b7 RegQueryValueExW 96527->96528 96529 4e31d4 96528->96529 96531 4e31ee messages 96528->96531 96530 4a6b57 22 API calls 96529->96530 96530->96531 96531->96521 96532->96524 96532->96526 96533 4a9cb3 22 API calls 96532->96533 96534 4a515f 22 API calls 96532->96534 96533->96532 96534->96532 96535->96503 96537 4e1f50 __wsopen_s 96536->96537 96538 4a3364 GetFullPathNameW 96537->96538 96539 4a3386 96538->96539 96540 4a6b57 22 API calls 96539->96540 96541 4a33a4 96540->96541 96541->96512 96542 151cae0 96556 151a730 96542->96556 96544 151cba2 96559 151c9d0 96544->96559 96546 151cbcb CreateFileW 96548 151cc1a 96546->96548 96549 151cc1f 96546->96549 96549->96548 96550 151cc36 VirtualAlloc 96549->96550 96550->96548 96551 151cc54 ReadFile 96550->96551 96551->96548 96552 151cc6f 96551->96552 96553 151b9d0 13 API calls 96552->96553 96554 151cca2 96553->96554 96555 151ccc5 ExitProcess 96554->96555 96555->96548 96562 151dbd0 GetPEB 96556->96562 96558 151adbb 96558->96544 96560 151c9d9 Sleep 96559->96560 96561 151c9e7 96560->96561 96563 151dbfa 96562->96563 96563->96558 96564 4a1098 96569 4a42de 96564->96569 96568 4a10a7 96570 4aa961 22 API calls 96569->96570 96571 4a42f5 GetVersionExW 96570->96571 96572 4a6b57 22 API calls 96571->96572 96573 4a4342 96572->96573 96574 4a93b2 22 API calls 96573->96574 96578 4a4378 96573->96578 96575 4a436c 96574->96575 96577 4a37a0 22 API calls 96575->96577 96576 4a441b GetCurrentProcess IsWow64Process 96579 4a4437 96576->96579 96577->96578 96578->96576 96585 4e37df 96578->96585 96580 4a444f LoadLibraryA 96579->96580 96581 4e3824 GetSystemInfo 96579->96581 96582 4a449c GetSystemInfo 96580->96582 96583 4a4460 GetProcAddress 96580->96583 96584 4a4476 96582->96584 96583->96582 96586 4a4470 GetNativeSystemInfo 96583->96586 96587 4a447a FreeLibrary 96584->96587 96588 4a109d 96584->96588 96586->96584 96587->96588 96589 4c00a3 29 API calls __onexit 96588->96589 96589->96568 96590 4af7bf 96591 4af7d3 96590->96591 96592 4afcb6 96590->96592 96594 4afcc2 96591->96594 96595 4bfddb 22 API calls 96591->96595 96593 4aaceb 23 API calls 96592->96593 96593->96594 96596 4aaceb 23 API calls 96594->96596 96597 4af7e5 96595->96597 96598 4afd3d 96596->96598 96597->96594 96597->96598 96599 4af83e 96597->96599 96627 511155 22 API calls 96598->96627 96601 4b1310 235 API calls 96599->96601 96617 4aed9d messages 96599->96617 96607 4aec76 messages 96601->96607 96602 4f4beb 96631 51359c 82 API calls __wsopen_s 96602->96631 96603 4bfddb 22 API calls 96603->96607 96605 4afef7 96610 4aa8c7 22 API calls 96605->96610 96605->96617 96607->96602 96607->96603 96607->96605 96608 4f4600 96607->96608 96609 4f4b0b 96607->96609 96615 4aa8c7 22 API calls 96607->96615 96616 4c0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96607->96616 96607->96617 96618 4afbe3 96607->96618 96619 4aa961 22 API calls 96607->96619 96620 4c00a3 29 API calls pre_c_initialization 96607->96620 96623 4c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96607->96623 96624 4af3ae messages 96607->96624 96625 4b01e0 235 API calls 2 library calls 96607->96625 96626 4b06a0 41 API calls messages 96607->96626 96613 4aa8c7 22 API calls 96608->96613 96608->96617 96629 51359c 82 API calls __wsopen_s 96609->96629 96610->96617 96613->96617 96615->96607 96616->96607 96618->96617 96621 4f4bdc 96618->96621 96618->96624 96619->96607 96620->96607 96630 51359c 82 API calls __wsopen_s 96621->96630 96623->96607 96624->96617 96628 51359c 82 API calls __wsopen_s 96624->96628 96625->96607 96626->96607 96627->96617 96628->96617 96629->96617 96630->96602 96631->96617 96632 4d90fa 96633 4d9107 96632->96633 96637 4d911f 96632->96637 96682 4cf2d9 20 API calls _free 96633->96682 96635 4d910c 96683 4d27ec 26 API calls _abort 96635->96683 96638 4d917a 96637->96638 96646 4d9117 96637->96646 96684 4dfdc4 21 API calls 2 library calls 96637->96684 96640 4cd955 __fread_nolock 26 API calls 96638->96640 96641 4d9192 96640->96641 96652 4d8c32 96641->96652 96643 4d9199 96644 4cd955 __fread_nolock 26 API calls 96643->96644 96643->96646 96645 4d91c5 96644->96645 96645->96646 96647 4cd955 __fread_nolock 26 API calls 96645->96647 96648 4d91d3 96647->96648 96648->96646 96649 4cd955 __fread_nolock 26 API calls 96648->96649 96650 4d91e3 96649->96650 96651 4cd955 __fread_nolock 26 API calls 96650->96651 96651->96646 96653 4d8c3e ___DestructExceptionObject 96652->96653 96654 4d8c5e 96653->96654 96655 4d8c46 96653->96655 96656 4d8d24 96654->96656 96660 4d8c97 96654->96660 96686 4cf2c6 20 API calls _free 96655->96686 96693 4cf2c6 20 API calls _free 96656->96693 96659 4d8c4b 96687 4cf2d9 20 API calls _free 96659->96687 96663 4d8cbb 96660->96663 96664 4d8ca6 96660->96664 96661 4d8d29 96694 4cf2d9 20 API calls _free 96661->96694 96685 4d5147 EnterCriticalSection 96663->96685 96688 4cf2c6 20 API calls _free 96664->96688 96666 4d8c53 __fread_nolock 96666->96643 96669 4d8cab 96689 4cf2d9 20 API calls _free 96669->96689 96670 4d8cc1 96672 4d8cdd 96670->96672 96673 4d8cf2 96670->96673 96690 4cf2d9 20 API calls _free 96672->96690 96675 4d8d45 __fread_nolock 38 API calls 96673->96675 96678 4d8ced 96675->96678 96676 4d8cb3 96695 4d27ec 26 API calls _abort 96676->96695 96692 4d8d1c LeaveCriticalSection __wsopen_s 96678->96692 96679 4d8ce2 96691 4cf2c6 20 API calls _free 96679->96691 96682->96635 96683->96646 96684->96638 96685->96670 96686->96659 96687->96666 96688->96669 96689->96676 96690->96679 96691->96678 96692->96666 96693->96661 96694->96676 96695->96666 96696 4c03fb 96697 4c0407 ___DestructExceptionObject 96696->96697 96725 4bfeb1 96697->96725 96699 4c040e 96700 4c0561 96699->96700 96703 4c0438 96699->96703 96752 4c083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96700->96752 96702 4c0568 96753 4c4e52 28 API calls _abort 96702->96753 96711 4c0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96703->96711 96736 4d247d 96703->96736 96705 4c056e 96754 4c4e04 28 API calls _abort 96705->96754 96708 4c0576 96710 4c0457 96713 4c04d8 96711->96713 96748 4c4e1a 38 API calls 3 library calls 96711->96748 96744 4c0959 96713->96744 96716 4c04de 96717 4c04f3 96716->96717 96749 4c0992 GetModuleHandleW 96717->96749 96719 4c04fa 96719->96702 96720 4c04fe 96719->96720 96721 4c0507 96720->96721 96750 4c4df5 28 API calls _abort 96720->96750 96751 4c0040 13 API calls 2 library calls 96721->96751 96724 4c050f 96724->96710 96726 4bfeba 96725->96726 96755 4c0698 IsProcessorFeaturePresent 96726->96755 96728 4bfec6 96756 4c2c94 10 API calls 3 library calls 96728->96756 96730 4bfecb 96731 4bfecf 96730->96731 96757 4d2317 96730->96757 96731->96699 96734 4bfee6 96734->96699 96739 4d2494 96736->96739 96737 4c0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96738 4c0451 96737->96738 96738->96710 96740 4d2421 96738->96740 96739->96737 96742 4d2450 96740->96742 96741 4c0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96743 4d2479 96741->96743 96742->96741 96743->96711 96800 4c2340 96744->96800 96747 4c097f 96747->96716 96748->96713 96749->96719 96750->96721 96751->96724 96752->96702 96753->96705 96754->96708 96755->96728 96756->96730 96761 4dd1f6 96757->96761 96760 4c2cbd 8 API calls 3 library calls 96760->96731 96762 4dd213 96761->96762 96765 4dd20f 96761->96765 96762->96765 96767 4d4bfb 96762->96767 96763 4c0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96764 4bfed8 96763->96764 96764->96734 96764->96760 96765->96763 96768 4d4c07 ___DestructExceptionObject 96767->96768 96779 4d2f5e EnterCriticalSection 96768->96779 96770 4d4c0e 96780 4d50af 96770->96780 96772 4d4c1d 96777 4d4c2c 96772->96777 96793 4d4a8f 29 API calls 96772->96793 96775 4d4c27 96794 4d4b45 GetStdHandle GetFileType 96775->96794 96795 4d4c48 LeaveCriticalSection _abort 96777->96795 96778 4d4c3d __fread_nolock 96778->96762 96779->96770 96781 4d50bb ___DestructExceptionObject 96780->96781 96782 4d50df 96781->96782 96783 4d50c8 96781->96783 96796 4d2f5e EnterCriticalSection 96782->96796 96797 4cf2d9 20 API calls _free 96783->96797 96786 4d50cd 96798 4d27ec 26 API calls _abort 96786->96798 96788 4d50d7 __fread_nolock 96788->96772 96789 4d5117 96799 4d513e LeaveCriticalSection _abort 96789->96799 96791 4d5000 __wsopen_s 21 API calls 96792 4d50eb 96791->96792 96792->96789 96792->96791 96793->96775 96794->96777 96795->96778 96796->96792 96797->96786 96798->96788 96799->96788 96801 4c096c GetStartupInfoW 96800->96801 96801->96747 96802 4a1033 96807 4a4c91 96802->96807 96806 4a1042 96808 4aa961 22 API calls 96807->96808 96809 4a4cff 96808->96809 96815 4a3af0 96809->96815 96812 4a4d9c 96813 4a1038 96812->96813 96818 4a51f7 22 API calls __fread_nolock 96812->96818 96814 4c00a3 29 API calls __onexit 96813->96814 96814->96806 96819 4a3b1c 96815->96819 96818->96812 96820 4a3b29 96819->96820 96822 4a3b0f 96819->96822 96821 4a3b30 RegOpenKeyExW 96820->96821 96820->96822 96821->96822 96823 4a3b4a RegQueryValueExW 96821->96823 96822->96812 96824 4a3b6b 96823->96824 96825 4a3b80 RegCloseKey 96823->96825 96824->96825 96825->96822 96826 4f3f75 96837 4bceb1 96826->96837 96828 4f3f8b 96829 4f4006 96828->96829 96846 4be300 23 API calls 96828->96846 96832 4abf40 235 API calls 96829->96832 96831 4f3fe6 96834 4f4052 96831->96834 96847 511abf 22 API calls 96831->96847 96832->96834 96836 4f4a88 96834->96836 96848 51359c 82 API calls __wsopen_s 96834->96848 96838 4bcebf 96837->96838 96839 4bced2 96837->96839 96840 4aaceb 23 API calls 96838->96840 96841 4bced7 96839->96841 96842 4bcf05 96839->96842 96845 4bcec9 96840->96845 96844 4bfddb 22 API calls 96841->96844 96843 4aaceb 23 API calls 96842->96843 96843->96845 96844->96845 96845->96828 96846->96831 96847->96829 96848->96836 96849 4a3156 96852 4a3170 96849->96852 96853 4a3187 96852->96853 96854 4a31eb 96853->96854 96855 4a318c 96853->96855 96856 4a31e9 96853->96856 96860 4e2dfb 96854->96860 96861 4a31f1 96854->96861 96857 4a3199 96855->96857 96858 4a3265 PostQuitMessage 96855->96858 96859 4a31d0 DefWindowProcW 96856->96859 96863 4e2e7c 96857->96863 96864 4a31a4 96857->96864 96865 4a316a 96858->96865 96859->96865 96908 4a18e2 10 API calls 96860->96908 96866 4a31f8 96861->96866 96867 4a321d SetTimer RegisterWindowMessageW 96861->96867 96912 50bf30 34 API calls ___scrt_fastfail 96863->96912 96869 4a31ae 96864->96869 96870 4e2e68 96864->96870 96873 4e2d9c 96866->96873 96874 4a3201 KillTimer 96866->96874 96867->96865 96871 4a3246 CreatePopupMenu 96867->96871 96868 4e2e1c 96909 4be499 42 API calls 96868->96909 96877 4e2e4d 96869->96877 96878 4a31b9 96869->96878 96897 50c161 96870->96897 96871->96865 96880 4e2dd7 MoveWindow 96873->96880 96881 4e2da1 96873->96881 96904 4a30f2 Shell_NotifyIconW ___scrt_fastfail 96874->96904 96877->96859 96911 500ad7 22 API calls 96877->96911 96884 4a31c4 96878->96884 96885 4a3253 96878->96885 96879 4e2e8e 96879->96859 96879->96865 96880->96865 96886 4e2dc6 SetFocus 96881->96886 96887 4e2da7 96881->96887 96883 4a3214 96905 4a3c50 DeleteObject DestroyWindow 96883->96905 96884->96859 96910 4a30f2 Shell_NotifyIconW ___scrt_fastfail 96884->96910 96906 4a326f 44 API calls ___scrt_fastfail 96885->96906 96886->96865 96887->96884 96890 4e2db0 96887->96890 96907 4a18e2 10 API calls 96890->96907 96892 4a3263 96892->96865 96895 4e2e41 96896 4a3837 49 API calls 96895->96896 96896->96856 96898 50c276 96897->96898 96899 50c179 ___scrt_fastfail 96897->96899 96898->96865 96900 4a3923 24 API calls 96899->96900 96902 50c1a0 96900->96902 96901 50c25f KillTimer SetTimer 96901->96898 96902->96901 96903 50c251 Shell_NotifyIconW 96902->96903 96903->96901 96904->96883 96905->96865 96906->96892 96907->96865 96908->96868 96909->96884 96910->96895 96911->96856 96912->96879 96913 4a2e37 96914 4aa961 22 API calls 96913->96914 96915 4a2e4d 96914->96915 96992 4a4ae3 96915->96992 96917 4a2e6b 96918 4a3a5a 24 API calls 96917->96918 96919 4a2e7f 96918->96919 96920 4a9cb3 22 API calls 96919->96920 96921 4a2e8c 96920->96921 96922 4a4ecb 94 API calls 96921->96922 96923 4a2ea5 96922->96923 96924 4a2ead 96923->96924 96925 4e2cb0 96923->96925 96928 4aa8c7 22 API calls 96924->96928 96926 512cf9 80 API calls 96925->96926 96927 4e2cc3 96926->96927 96929 4e2ccf 96927->96929 96931 4a4f39 68 API calls 96927->96931 96930 4a2ec3 96928->96930 96933 4a4f39 68 API calls 96929->96933 97006 4a6f88 22 API calls 96930->97006 96931->96929 96935 4e2ce5 96933->96935 96934 4a2ecf 96936 4a9cb3 22 API calls 96934->96936 97022 4a3084 22 API calls 96935->97022 96937 4a2edc 96936->96937 97007 4aa81b 41 API calls 96937->97007 96940 4a2eec 96942 4a9cb3 22 API calls 96940->96942 96941 4e2d02 97023 4a3084 22 API calls 96941->97023 96943 4a2f12 96942->96943 97008 4aa81b 41 API calls 96943->97008 96946 4e2d1e 96947 4a3a5a 24 API calls 96946->96947 96949 4e2d44 96947->96949 96948 4a2f21 96952 4aa961 22 API calls 96948->96952 97024 4a3084 22 API calls 96949->97024 96951 4e2d50 96953 4aa8c7 22 API calls 96951->96953 96954 4a2f3f 96952->96954 96955 4e2d5e 96953->96955 97009 4a3084 22 API calls 96954->97009 97025 4a3084 22 API calls 96955->97025 96958 4a2f4b 97010 4c4a28 40 API calls 3 library calls 96958->97010 96959 4e2d6d 96963 4aa8c7 22 API calls 96959->96963 96961 4a2f59 96961->96935 96962 4a2f63 96961->96962 97011 4c4a28 40 API calls 3 library calls 96962->97011 96966 4e2d83 96963->96966 96965 4a2f6e 96965->96941 96967 4a2f78 96965->96967 97026 4a3084 22 API calls 96966->97026 97012 4c4a28 40 API calls 3 library calls 96967->97012 96970 4e2d90 96971 4a2f83 96971->96946 96972 4a2f8d 96971->96972 97013 4c4a28 40 API calls 3 library calls 96972->97013 96974 4a2f98 96975 4a2fdc 96974->96975 97014 4a3084 22 API calls 96974->97014 96975->96959 96976 4a2fe8 96975->96976 96976->96970 97016 4a63eb 22 API calls 96976->97016 96979 4a2fbf 96981 4aa8c7 22 API calls 96979->96981 96980 4a2ff8 97017 4a6a50 22 API calls 96980->97017 96983 4a2fcd 96981->96983 97015 4a3084 22 API calls 96983->97015 96984 4a3006 97018 4a70b0 23 API calls 96984->97018 96989 4a3021 96990 4a3065 96989->96990 97019 4a6f88 22 API calls 96989->97019 97020 4a70b0 23 API calls 96989->97020 97021 4a3084 22 API calls 96989->97021 96993 4a4af0 __wsopen_s 96992->96993 96994 4a6b57 22 API calls 96993->96994 96995 4a4b22 96993->96995 96994->96995 96996 4a4c6d 22 API calls 96995->96996 97005 4a4b58 96995->97005 96996->96995 96997 4a9cb3 22 API calls 96999 4a4c52 96997->96999 96998 4a9cb3 22 API calls 96998->97005 97000 4a515f 22 API calls 96999->97000 97003 4a4c5e 97000->97003 97001 4a4c6d 22 API calls 97001->97005 97002 4a515f 22 API calls 97002->97005 97003->96917 97004 4a4c29 97004->96997 97004->97003 97005->96998 97005->97001 97005->97002 97005->97004 97006->96934 97007->96940 97008->96948 97009->96958 97010->96961 97011->96965 97012->96971 97013->96974 97014->96979 97015->96975 97016->96980 97017->96984 97018->96989 97019->96989 97020->96989 97021->96989 97022->96941 97023->96946 97024->96951 97025->96959 97026->96970

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 234 4a42de-4a434d call 4aa961 GetVersionExW call 4a6b57 239 4e3617-4e362a 234->239 240 4a4353 234->240 241 4e362b-4e362f 239->241 242 4a4355-4a4357 240->242 243 4e3632-4e363e 241->243 244 4e3631 241->244 245 4a435d-4a43bc call 4a93b2 call 4a37a0 242->245 246 4e3656 242->246 243->241 248 4e3640-4e3642 243->248 244->243 262 4e37df-4e37e6 245->262 263 4a43c2-4a43c4 245->263 251 4e365d-4e3660 246->251 248->242 250 4e3648-4e364f 248->250 250->239 255 4e3651 250->255 252 4a441b-4a4435 GetCurrentProcess IsWow64Process 251->252 253 4e3666-4e36a8 251->253 258 4a4437 252->258 259 4a4494-4a449a 252->259 253->252 256 4e36ae-4e36b1 253->256 255->246 260 4e36db-4e36e5 256->260 261 4e36b3-4e36bd 256->261 264 4a443d-4a4449 258->264 259->264 268 4e36f8-4e3702 260->268 269 4e36e7-4e36f3 260->269 265 4e36bf-4e36c5 261->265 266 4e36ca-4e36d6 261->266 270 4e37e8 262->270 271 4e3806-4e3809 262->271 263->251 267 4a43ca-4a43dd 263->267 272 4a444f-4a445e LoadLibraryA 264->272 273 4e3824-4e3828 GetSystemInfo 264->273 265->252 266->252 274 4e3726-4e372f 267->274 275 4a43e3-4a43e5 267->275 277 4e3704-4e3710 268->277 278 4e3715-4e3721 268->278 269->252 276 4e37ee 270->276 279 4e380b-4e381a 271->279 280 4e37f4-4e37fc 271->280 281 4a449c-4a44a6 GetSystemInfo 272->281 282 4a4460-4a446e GetProcAddress 272->282 286 4e373c-4e3748 274->286 287 4e3731-4e3737 274->287 284 4a43eb-4a43ee 275->284 285 4e374d-4e3762 275->285 276->280 277->252 278->252 279->276 288 4e381c-4e3822 279->288 280->271 283 4a4476-4a4478 281->283 282->281 289 4a4470-4a4474 GetNativeSystemInfo 282->289 290 4a447a-4a447b FreeLibrary 283->290 291 4a4481-4a4493 283->291 292 4a43f4-4a440f 284->292 293 4e3791-4e3794 284->293 294 4e376f-4e377b 285->294 295 4e3764-4e376a 285->295 286->252 287->252 288->280 289->283 290->291 297 4e3780-4e378c 292->297 298 4a4415 292->298 293->252 296 4e379a-4e37c1 293->296 294->252 295->252 299 4e37ce-4e37da 296->299 300 4e37c3-4e37c9 296->300 297->252 298->252 299->252 300->252
                                                        APIs
                                                        • GetVersionExW.KERNEL32(?), ref: 004A430D
                                                          • Part of subcall function 004A6B57: _wcslen.LIBCMT ref: 004A6B6A
                                                        • GetCurrentProcess.KERNEL32(?,0053CB64,00000000,?,?), ref: 004A4422
                                                        • IsWow64Process.KERNEL32(00000000,?,?), ref: 004A4429
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 004A4454
                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 004A4466
                                                        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 004A4474
                                                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 004A447B
                                                        • GetSystemInfo.KERNEL32(?,?,?), ref: 004A44A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                        • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                        • API String ID: 3290436268-3101561225
                                                        • Opcode ID: 9ba754613ef61da48530283de08c7b1ab1ea68cf9dc65d72ca84ad6c2af4620a
                                                        • Instruction ID: f1b17dc3ac0bd3101752a8e6de6e7e17edc01f46627b67af4cbbbb61e3f23cc8
                                                        • Opcode Fuzzy Hash: 9ba754613ef61da48530283de08c7b1ab1ea68cf9dc65d72ca84ad6c2af4620a
                                                        • Instruction Fuzzy Hash: 0BA1F46190AAD0CFC722CF7D7C441993FA46BB6342B144C9AE08C97B61D268458DFB2E

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1171 4a42a2-4a42ba CreateStreamOnHGlobal 1172 4a42da-4a42dd 1171->1172 1173 4a42bc-4a42d3 FindResourceExW 1171->1173 1174 4a42d9 1173->1174 1175 4e35ba-4e35c9 LoadResource 1173->1175 1174->1172 1175->1174 1176 4e35cf-4e35dd SizeofResource 1175->1176 1176->1174 1177 4e35e3-4e35ee LockResource 1176->1177 1177->1174 1178 4e35f4-4e3612 1177->1178 1178->1174
                                                        APIs
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,004A50AA,?,?,00000000,00000000), ref: 004A42B2
                                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,004A50AA,?,?,00000000,00000000), ref: 004A42C9
                                                        • LoadResource.KERNEL32(?,00000000,?,?,004A50AA,?,?,00000000,00000000,?,?,?,?,?,?,004A4F20), ref: 004E35BE
                                                        • SizeofResource.KERNEL32(?,00000000,?,?,004A50AA,?,?,00000000,00000000,?,?,?,?,?,?,004A4F20), ref: 004E35D3
                                                        • LockResource.KERNEL32(004A50AA,?,?,004A50AA,?,?,00000000,00000000,?,?,?,?,?,?,004A4F20,?), ref: 004E35E6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                        • String ID: SCRIPT
                                                        • API String ID: 3051347437-3967369404
                                                        • Opcode ID: 8db060ede86dbac02a3aaa05d412330d1d606582ea438ec744ed5dca66e96ed2
                                                        • Instruction ID: 831b7e1b2b45b1998f080b0eba292b158958855ba80c1b1727f0ccbe82c5549d
                                                        • Opcode Fuzzy Hash: 8db060ede86dbac02a3aaa05d412330d1d606582ea438ec744ed5dca66e96ed2
                                                        • Instruction Fuzzy Hash: 48117C76240700BFD7218BA5DC48F2B7FB9EBD6B91F1081AAF402E6290DBB1D8049720

                                                        Control-flow Graph

                                                        APIs
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 004A2B6B
                                                          • Part of subcall function 004A3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00571418,?,004A2E7F,?,?,?,00000000), ref: 004A3A78
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                        • GetForegroundWindow.USER32(runas,?,?,?,?,?,00562224), ref: 004E2C10
                                                        • ShellExecuteW.SHELL32(00000000,?,?,00562224), ref: 004E2C17
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                        • String ID: runas
                                                        • API String ID: 448630720-4000483414
                                                        • Opcode ID: 1a36e3a6db1ab5288f0adfd09933ae52b1f458e7fea287c8ea5a9a01875f6066
                                                        • Instruction ID: 7af89389b7ee9ffa576f76cf187c017bbe8ce45e525500de7e7217099fe69dd1
                                                        • Opcode Fuzzy Hash: 1a36e3a6db1ab5288f0adfd09933ae52b1f458e7fea287c8ea5a9a01875f6066
                                                        • Instruction Fuzzy Hash: 5E1124311083415BCB04FF2AE8519BE7BA4ABB7349F04442FF046131A2DF6C9A0EE71A
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,004E5222), ref: 0050DBCE
                                                        • GetFileAttributesW.KERNELBASE(?), ref: 0050DBDD
                                                        • FindFirstFileW.KERNELBASE(?,?), ref: 0050DBEE
                                                        • FindClose.KERNEL32(00000000), ref: 0050DBFA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirstlstrlen
                                                        • String ID:
                                                        • API String ID: 2695905019-0
                                                        • Opcode ID: f45303fbec2bd5dabcfee42c0239059dc0d3577df619a0f10c4c23d9060e87af
                                                        • Instruction ID: f90c8514a5d436b908a2d7a6a62028dac96a96f475aea42fb41ec6634af4dee4
                                                        • Opcode Fuzzy Hash: f45303fbec2bd5dabcfee42c0239059dc0d3577df619a0f10c4c23d9060e87af
                                                        • Instruction Fuzzy Hash: 2CF0A03181092057D2206BB8AC0D8AF3F7CBF41334B104702F876D22E0EBB05D58DAA5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: p#W
                                                        • API String ID: 3964851224-3759538804
                                                        • Opcode ID: 272f011f961575a6ca386c6b4ffac8ad0bc7d448123a3e131ff56c79faa65e7b
                                                        • Instruction ID: 43fb46618f4edbe08fab0eb3bdbee3cefbe2fe302ae40b9580a94f2f521e56be
                                                        • Opcode Fuzzy Hash: 272f011f961575a6ca386c6b4ffac8ad0bc7d448123a3e131ff56c79faa65e7b
                                                        • Instruction Fuzzy Hash: 85A26C70A083019FD750DF14C480B6BBBE1BF9A304F14896EE99A8B352D779EC45CB96
                                                        APIs
                                                        • GetInputState.USER32 ref: 004AD807
                                                        • timeGetTime.WINMM ref: 004ADA07
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004ADB28
                                                        • TranslateMessage.USER32(?), ref: 004ADB7B
                                                        • DispatchMessageW.USER32(?), ref: 004ADB89
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004ADB9F
                                                        • Sleep.KERNEL32(0000000A), ref: 004ADBB1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                        • String ID:
                                                        • API String ID: 2189390790-0
                                                        • Opcode ID: 55b127a2bb2581b32afc6031c86da72b6bfdb948bfc5519e513da5a63f750c67
                                                        • Instruction ID: 0558248c1314f5f21dbe213e45e17cd89fcdda0b51efa97fa43a82ef23f00507
                                                        • Opcode Fuzzy Hash: 55b127a2bb2581b32afc6031c86da72b6bfdb948bfc5519e513da5a63f750c67
                                                        • Instruction Fuzzy Hash: 99421170A04245DFD728CF24C844BBBBBA4BF66304F04451FE556877A1D7B8E884DB9A

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 004A2D07
                                                        • RegisterClassExW.USER32(00000030), ref: 004A2D31
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004A2D42
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 004A2D5F
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004A2D6F
                                                        • LoadIconW.USER32(000000A9), ref: 004A2D85
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 004A2D94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: cac9fdc5912f7a31f36abffce4b19c1ed5461000d88661d2621066e12faec3f9
                                                        • Instruction ID: a835218b24c6b3e72c69c7daf50eaf12af8193bca4031c379a9487ea86d89e11
                                                        • Opcode Fuzzy Hash: cac9fdc5912f7a31f36abffce4b19c1ed5461000d88661d2621066e12faec3f9
                                                        • Instruction Fuzzy Hash: 8521E4B5911208AFDB00DFA8E849BDDBFB4FB18700F00411AFA15B63A0D7B54588AFA4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 302 4d8d45-4d8d55 303 4d8d6f-4d8d71 302->303 304 4d8d57-4d8d6a call 4cf2c6 call 4cf2d9 302->304 306 4d90d9-4d90e6 call 4cf2c6 call 4cf2d9 303->306 307 4d8d77-4d8d7d 303->307 318 4d90f1 304->318 325 4d90ec call 4d27ec 306->325 307->306 310 4d8d83-4d8dae 307->310 310->306 313 4d8db4-4d8dbd 310->313 316 4d8dbf-4d8dd2 call 4cf2c6 call 4cf2d9 313->316 317 4d8dd7-4d8dd9 313->317 316->325 321 4d8ddf-4d8de3 317->321 322 4d90d5-4d90d7 317->322 324 4d90f4-4d90f9 318->324 321->322 323 4d8de9-4d8ded 321->323 322->324 323->316 327 4d8def-4d8e06 323->327 325->318 330 4d8e08-4d8e0b 327->330 331 4d8e23-4d8e2c 327->331 333 4d8e0d-4d8e13 330->333 334 4d8e15-4d8e1e 330->334 335 4d8e2e-4d8e45 call 4cf2c6 call 4cf2d9 call 4d27ec 331->335 336 4d8e4a-4d8e54 331->336 333->334 333->335 337 4d8ebf-4d8ed9 334->337 367 4d900c 335->367 339 4d8e5b-4d8e79 call 4d3820 call 4d29c8 * 2 336->339 340 4d8e56-4d8e58 336->340 343 4d8fad-4d8fb6 call 4df89b 337->343 344 4d8edf-4d8eef 337->344 371 4d8e7b-4d8e91 call 4cf2d9 call 4cf2c6 339->371 372 4d8e96-4d8ebc call 4d9424 339->372 340->339 356 4d9029 343->356 357 4d8fb8-4d8fca 343->357 344->343 345 4d8ef5-4d8ef7 344->345 345->343 349 4d8efd-4d8f23 345->349 349->343 353 4d8f29-4d8f3c 349->353 353->343 358 4d8f3e-4d8f40 353->358 360 4d902d-4d9045 ReadFile 356->360 357->356 362 4d8fcc-4d8fdb GetConsoleMode 357->362 358->343 363 4d8f42-4d8f6d 358->363 365 4d9047-4d904d 360->365 366 4d90a1-4d90ac GetLastError 360->366 362->356 368 4d8fdd-4d8fe1 362->368 363->343 370 4d8f6f-4d8f82 363->370 365->366 375 4d904f 365->375 373 4d90ae-4d90c0 call 4cf2d9 call 4cf2c6 366->373 374 4d90c5-4d90c8 366->374 369 4d900f-4d9019 call 4d29c8 367->369 368->360 376 4d8fe3-4d8ffd ReadConsoleW 368->376 369->324 370->343 380 4d8f84-4d8f86 370->380 371->367 372->337 373->367 377 4d90ce-4d90d0 374->377 378 4d9005-4d900b call 4cf2a3 374->378 384 4d9052-4d9064 375->384 385 4d8fff GetLastError 376->385 386 4d901e-4d9027 376->386 377->369 378->367 380->343 389 4d8f88-4d8fa8 380->389 384->369 393 4d9066-4d906a 384->393 385->378 386->384 389->343 397 4d906c-4d907c call 4d8a61 393->397 398 4d9083-4d908e 393->398 407 4d907f-4d9081 397->407 399 4d909a-4d909f call 4d88a1 398->399 400 4d9090 call 4d8bb1 398->400 408 4d9095-4d9098 399->408 400->408 407->369 408->407
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .L
                                                        • API String ID: 0-3603714933
                                                        • Opcode ID: 160a82fc00ce5b267af3187d4b20314e4be468c282cdd48c4527d91b73ac8263
                                                        • Instruction ID: 5d495f89181475c81ce67810e2fef424694c7fba3e6c44943544d006de5f128b
                                                        • Opcode Fuzzy Hash: 160a82fc00ce5b267af3187d4b20314e4be468c282cdd48c4527d91b73ac8263
                                                        • Instruction Fuzzy Hash: E6C11674A04249AFDB12DFA9D861BAEBBB1AF19310F04409FF414E7392C7389D41DB69

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 410 4e065b-4e068b call 4e042f 413 4e068d-4e0698 call 4cf2c6 410->413 414 4e06a6-4e06b2 call 4d5221 410->414 419 4e069a-4e06a1 call 4cf2d9 413->419 420 4e06cb-4e0714 call 4e039a 414->420 421 4e06b4-4e06c9 call 4cf2c6 call 4cf2d9 414->421 430 4e097d-4e0983 419->430 428 4e0716-4e071f 420->428 429 4e0781-4e078a GetFileType 420->429 421->419 432 4e0756-4e077c GetLastError call 4cf2a3 428->432 433 4e0721-4e0725 428->433 434 4e078c-4e07bd GetLastError call 4cf2a3 CloseHandle 429->434 435 4e07d3-4e07d6 429->435 432->419 433->432 439 4e0727-4e0754 call 4e039a 433->439 434->419 449 4e07c3-4e07ce call 4cf2d9 434->449 437 4e07df-4e07e5 435->437 438 4e07d8-4e07dd 435->438 442 4e07e9-4e0837 call 4d516a 437->442 443 4e07e7 437->443 438->442 439->429 439->432 452 4e0839-4e0845 call 4e05ab 442->452 453 4e0847-4e086b call 4e014d 442->453 443->442 449->419 452->453 459 4e086f-4e0879 call 4d86ae 452->459 460 4e087e-4e08c1 453->460 461 4e086d 453->461 459->430 462 4e08e2-4e08f0 460->462 463 4e08c3-4e08c7 460->463 461->459 466 4e097b 462->466 467 4e08f6-4e08fa 462->467 463->462 465 4e08c9-4e08dd 463->465 465->462 466->430 467->466 469 4e08fc-4e092f CloseHandle call 4e039a 467->469 472 4e0963-4e0977 469->472 473 4e0931-4e095d GetLastError call 4cf2a3 call 4d5333 469->473 472->466 473->472
                                                        APIs
                                                          • Part of subcall function 004E039A: CreateFileW.KERNELBASE(00000000,00000000,?,004E0704,?,?,00000000,?,004E0704,00000000,0000000C), ref: 004E03B7
                                                        • GetLastError.KERNEL32 ref: 004E076F
                                                        • __dosmaperr.LIBCMT ref: 004E0776
                                                        • GetFileType.KERNELBASE(00000000), ref: 004E0782
                                                        • GetLastError.KERNEL32 ref: 004E078C
                                                        • __dosmaperr.LIBCMT ref: 004E0795
                                                        • CloseHandle.KERNEL32(00000000), ref: 004E07B5
                                                        • CloseHandle.KERNEL32(?), ref: 004E08FF
                                                        • GetLastError.KERNEL32 ref: 004E0931
                                                        • __dosmaperr.LIBCMT ref: 004E0938
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                        • String ID: H
                                                        • API String ID: 4237864984-2852464175
                                                        • Opcode ID: 82c6a48274c6b9ee2508bad9fb0db37b0d15d30e26a4579cd1ca6999da1a2535
                                                        • Instruction ID: f7b98b426be347f4dba6d4b4f514fd2923b13efd0c994d739c449a00dedc7ad3
                                                        • Opcode Fuzzy Hash: 82c6a48274c6b9ee2508bad9fb0db37b0d15d30e26a4579cd1ca6999da1a2535
                                                        • Instruction Fuzzy Hash: 23A15632A001848FDF19AF79D851BAE3BA0AB06325F14015EF825AB3D1C7798C97DB95

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 004A3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00571418,?,004A2E7F,?,?,?,00000000), ref: 004A3A78
                                                          • Part of subcall function 004A3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 004A3379
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 004A356A
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 004E318D
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 004E31CE
                                                        • RegCloseKey.ADVAPI32(?), ref: 004E3210
                                                        • _wcslen.LIBCMT ref: 004E3277
                                                        • _wcslen.LIBCMT ref: 004E3286
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                        • API String ID: 98802146-2727554177
                                                        • Opcode ID: 67338488fd5b2c98c0c7fd2100afeda5259b808f4241f8d024f657f0a19d57e1
                                                        • Instruction ID: 61f0a42a2ecadfb36d5e137890b359fc9f8554e7ec3d13b963c0275f0f7a2f75
                                                        • Opcode Fuzzy Hash: 67338488fd5b2c98c0c7fd2100afeda5259b808f4241f8d024f657f0a19d57e1
                                                        • Instruction Fuzzy Hash: EB7195714043009EC314DF66EC4595BBBE8FFA5744F40482FF589971A0EB789A88EB55

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 004A2B8E
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 004A2B9D
                                                        • LoadIconW.USER32(00000063), ref: 004A2BB3
                                                        • LoadIconW.USER32(000000A4), ref: 004A2BC5
                                                        • LoadIconW.USER32(000000A2), ref: 004A2BD7
                                                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 004A2BEF
                                                        • RegisterClassExW.USER32(?), ref: 004A2C40
                                                          • Part of subcall function 004A2CD4: GetSysColorBrush.USER32(0000000F), ref: 004A2D07
                                                          • Part of subcall function 004A2CD4: RegisterClassExW.USER32(00000030), ref: 004A2D31
                                                          • Part of subcall function 004A2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004A2D42
                                                          • Part of subcall function 004A2CD4: InitCommonControlsEx.COMCTL32(?), ref: 004A2D5F
                                                          • Part of subcall function 004A2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004A2D6F
                                                          • Part of subcall function 004A2CD4: LoadIconW.USER32(000000A9), ref: 004A2D85
                                                          • Part of subcall function 004A2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 004A2D94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                        • String ID: #$0$AutoIt v3
                                                        • API String ID: 423443420-4155596026
                                                        • Opcode ID: 1215aacba122c11196d7048110f5dd137ff4eef113c8fc169c7dc0a44f324c34
                                                        • Instruction ID: 694cf8a6f11969d23634c0cb5bcf9832a9f478df385b978f93f0eeff35f044c5
                                                        • Opcode Fuzzy Hash: 1215aacba122c11196d7048110f5dd137ff4eef113c8fc169c7dc0a44f324c34
                                                        • Instruction Fuzzy Hash: A2213A71E00714ABDB109FAAFC45A997FB4FB18B50F00441AE508A67A0D3B50588FF98

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 551 4a3170-4a3185 552 4a3187-4a318a 551->552 553 4a31e5-4a31e7 551->553 554 4a31eb 552->554 555 4a318c-4a3193 552->555 553->552 556 4a31e9 553->556 560 4e2dfb-4e2e23 call 4a18e2 call 4be499 554->560 561 4a31f1-4a31f6 554->561 557 4a3199-4a319e 555->557 558 4a3265-4a326d PostQuitMessage 555->558 559 4a31d0-4a31d8 DefWindowProcW 556->559 563 4e2e7c-4e2e90 call 50bf30 557->563 564 4a31a4-4a31a8 557->564 566 4a3219-4a321b 558->566 565 4a31de-4a31e4 559->565 595 4e2e28-4e2e2f 560->595 567 4a31f8-4a31fb 561->567 568 4a321d-4a3244 SetTimer RegisterWindowMessageW 561->568 563->566 589 4e2e96 563->589 570 4a31ae-4a31b3 564->570 571 4e2e68-4e2e72 call 50c161 564->571 566->565 574 4e2d9c-4e2d9f 567->574 575 4a3201-4a3214 KillTimer call 4a30f2 call 4a3c50 567->575 568->566 572 4a3246-4a3251 CreatePopupMenu 568->572 578 4e2e4d-4e2e54 570->578 579 4a31b9-4a31be 570->579 585 4e2e77 571->585 572->566 581 4e2dd7-4e2df6 MoveWindow 574->581 582 4e2da1-4e2da5 574->582 575->566 578->559 592 4e2e5a-4e2e63 call 500ad7 578->592 587 4a3253-4a3263 call 4a326f 579->587 588 4a31c4-4a31ca 579->588 581->566 590 4e2dc6-4e2dd2 SetFocus 582->590 591 4e2da7-4e2daa 582->591 585->566 587->566 588->559 588->595 589->559 590->566 591->588 596 4e2db0-4e2dc1 call 4a18e2 591->596 592->559 595->559 600 4e2e35-4e2e48 call 4a30f2 call 4a3837 595->600 596->566 600->559
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,004A316A,?,?), ref: 004A31D8
                                                        • KillTimer.USER32(?,00000001,?,?,?,?,?,004A316A,?,?), ref: 004A3204
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004A3227
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,004A316A,?,?), ref: 004A3232
                                                        • CreatePopupMenu.USER32 ref: 004A3246
                                                        • PostQuitMessage.USER32(00000000), ref: 004A3267
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                        • String ID: TaskbarCreated
                                                        • API String ID: 129472671-2362178303
                                                        • Opcode ID: 5b2699c5e7a074419c156614b3c5c2479053b035ad744d144e8fd0077b2ab728
                                                        • Instruction ID: 6e1780f8d0e0829c55480b77f2ebfe38a00c4cba537e983dd9ca569ce7b42e6c
                                                        • Opcode Fuzzy Hash: 5b2699c5e7a074419c156614b3c5c2479053b035ad744d144e8fd0077b2ab728
                                                        • Instruction Fuzzy Hash: 4B414A32240200A7DB141F7CAD0EB7A3E59E777346F04411BF906953A1EB6C9E45B76E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: D%W$D%W$D%W$D%W$D%WD%W$Variable must be of type 'Object'.
                                                        • API String ID: 0-3942511599
                                                        • Opcode ID: ae492b6d94c7bce9d71aacd1540b16432f222aa28d659b0ec589ba5f28315e16
                                                        • Instruction ID: c7b5e2dcf6ec035f1db12ff0ac7e7271e03560e1588087b03664c37f8cc1396c
                                                        • Opcode Fuzzy Hash: ae492b6d94c7bce9d71aacd1540b16432f222aa28d659b0ec589ba5f28315e16
                                                        • Instruction Fuzzy Hash: 0EC2B071A00215CFCB14CF5AC880AAEB7F1FF6A304F24856AE925AB351D339ED41CB59

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1117 151cd20-151cdce call 151a730 1120 151cdd5-151cdfb call 151dc30 CreateFileW 1117->1120 1123 151ce02-151ce12 1120->1123 1124 151cdfd 1120->1124 1129 151ce14 1123->1129 1130 151ce19-151ce33 VirtualAlloc 1123->1130 1125 151cf4d-151cf51 1124->1125 1126 151cf93-151cf96 1125->1126 1127 151cf53-151cf57 1125->1127 1131 151cf99-151cfa0 1126->1131 1132 151cf63-151cf67 1127->1132 1133 151cf59-151cf5c 1127->1133 1129->1125 1134 151ce35 1130->1134 1135 151ce3a-151ce51 ReadFile 1130->1135 1136 151cfa2-151cfad 1131->1136 1137 151cff5-151d00a 1131->1137 1138 151cf77-151cf7b 1132->1138 1139 151cf69-151cf73 1132->1139 1133->1132 1134->1125 1142 151ce53 1135->1142 1143 151ce58-151ce98 VirtualAlloc 1135->1143 1144 151cfb1-151cfbd 1136->1144 1145 151cfaf 1136->1145 1146 151d01a-151d022 1137->1146 1147 151d00c-151d017 VirtualFree 1137->1147 1140 151cf8b 1138->1140 1141 151cf7d-151cf87 1138->1141 1139->1138 1140->1126 1141->1140 1142->1125 1148 151ce9a 1143->1148 1149 151ce9f-151ceba call 151de80 1143->1149 1150 151cfd1-151cfdd 1144->1150 1151 151cfbf-151cfcf 1144->1151 1145->1137 1147->1146 1148->1125 1157 151cec5-151cecf 1149->1157 1154 151cfea-151cff0 1150->1154 1155 151cfdf-151cfe8 1150->1155 1153 151cff3 1151->1153 1153->1131 1154->1153 1155->1153 1158 151ced1-151cf00 call 151de80 1157->1158 1159 151cf02-151cf16 call 151dc90 1157->1159 1158->1157 1164 151cf18 1159->1164 1165 151cf1a-151cf1e 1159->1165 1164->1125 1167 151cf20-151cf24 CloseHandle 1165->1167 1168 151cf2a-151cf2e 1165->1168 1167->1168 1169 151cf30-151cf3b VirtualFree 1168->1169 1170 151cf3e-151cf47 1168->1170 1169->1170 1170->1120 1170->1125
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0151CDF1
                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0151D017
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1689522511.000000000151A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CreateFileFreeVirtual
                                                        • String ID:
                                                        • API String ID: 204039940-0
                                                        • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                        • Instruction ID: 8e1e3bf63b8bb74376720e26feb2875bee0358b4dd0284378fa9715d3ff478ac
                                                        • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                        • Instruction Fuzzy Hash: B4A12A74E40209EBEB15CFA8C894BEEBBB5FF48304F108599E111BB284D7759A41CF94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1181 4a2c63-4a2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 004A2C91
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 004A2CB2
                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,004A1CAD,?), ref: 004A2CC6
                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,004A1CAD,?), ref: 004A2CCF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$edit
                                                        • API String ID: 1584632944-3779509399
                                                        • Opcode ID: 7e2de529a3abca172343c465645e4ba84eb7b121c42b6c0b38cb08e635e3e59a
                                                        • Instruction ID: 3e93cea0217940c2ea01dd6d146e5bb0ca8f9fc350affbf2a8c3a9bd133817b2
                                                        • Opcode Fuzzy Hash: 7e2de529a3abca172343c465645e4ba84eb7b121c42b6c0b38cb08e635e3e59a
                                                        • Instruction Fuzzy Hash: CEF030765403907AE730072B7C09E773EBDD7D6F50F01045DF908A2260C6611888FA74

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1296 151cae0-151cc18 call 151a730 call 151c9d0 CreateFileW 1303 151cc1a 1296->1303 1304 151cc1f-151cc2f 1296->1304 1305 151cccf-151ccd4 1303->1305 1307 151cc31 1304->1307 1308 151cc36-151cc50 VirtualAlloc 1304->1308 1307->1305 1309 151cc52 1308->1309 1310 151cc54-151cc6b ReadFile 1308->1310 1309->1305 1311 151cc6d 1310->1311 1312 151cc6f-151cca9 call 151ca10 call 151b9d0 1310->1312 1311->1305 1317 151ccc5-151cccd ExitProcess 1312->1317 1318 151ccab-151ccc0 call 151ca60 1312->1318 1317->1305 1318->1317
                                                        APIs
                                                          • Part of subcall function 0151C9D0: Sleep.KERNELBASE(000001F4), ref: 0151C9E1
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0151CC0E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1689522511.000000000151A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CreateFileSleep
                                                        • String ID: XO6DP7FYY1KF7ZTZROST4PZQ1J
                                                        • API String ID: 2694422964-2255081239
                                                        • Opcode ID: 14dd366683d9ae0ae79279f0b0f068c51c83fcebbf014efebb8a5723986de524
                                                        • Instruction ID: 0317204b850005b32d1082bf5162b242c97d248c6146f2072c506c8bb9e13d06
                                                        • Opcode Fuzzy Hash: 14dd366683d9ae0ae79279f0b0f068c51c83fcebbf014efebb8a5723986de524
                                                        • Instruction Fuzzy Hash: 8A519331D04289DAEF12DBA4C858BEFBBB4AF55304F004599D2597B2C1C7BA0B49CB66

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1320 512947-5129b9 call 4e1f50 call 5125d6 call 4bfe0b call 4a5722 call 51274e call 4a511f call 4c5232 1335 512a6c-512a73 call 512e66 1320->1335 1336 5129bf-5129c6 call 512e66 1320->1336 1341 512a75-512a77 1335->1341 1342 512a7c 1335->1342 1336->1341 1343 5129cc-512a6a call 4cd583 call 4c4983 call 4c9038 call 4cd583 call 4c9038 * 2 1336->1343 1344 512cb6-512cb7 1341->1344 1346 512a7f-512b3a call 4a50f5 * 8 call 513017 call 4ce5eb 1342->1346 1343->1346 1348 512cd5-512cdb 1344->1348 1385 512b43-512b5e call 512792 1346->1385 1386 512b3c-512b3e 1346->1386 1352 512cf0-512cf6 1348->1352 1353 512cdd-512ce8 call 4bfdcd call 4bfe14 1348->1353 1363 512ced 1353->1363 1363->1352 1389 512bf0-512bfc call 4ce678 1385->1389 1390 512b64-512b6c 1385->1390 1386->1344 1397 512c12-512c16 1389->1397 1398 512bfe-512c0d DeleteFileW 1389->1398 1391 512b74 1390->1391 1392 512b6e-512b72 1390->1392 1394 512b79-512b97 call 4a50f5 1391->1394 1392->1394 1404 512bc1-512bd7 call 51211d call 4cdbb3 1394->1404 1405 512b99-512b9e 1394->1405 1400 512c91-512ca5 CopyFileW 1397->1400 1401 512c18-512c7e call 5125d6 call 4cd2eb * 2 call 5122ce 1397->1401 1398->1344 1402 512ca7-512cb4 DeleteFileW 1400->1402 1403 512cb9-512ccf DeleteFileW call 512fd8 1400->1403 1401->1403 1425 512c80-512c8f DeleteFileW 1401->1425 1402->1344 1414 512cd4 1403->1414 1420 512bdc-512be7 1404->1420 1410 512ba1-512bb4 call 5128d2 1405->1410 1418 512bb6-512bbf 1410->1418 1414->1348 1418->1404 1420->1390 1422 512bed 1420->1422 1422->1389 1425->1344
                                                        APIs
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00512C05
                                                        • DeleteFileW.KERNEL32(?), ref: 00512C87
                                                        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00512C9D
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00512CAE
                                                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00512CC0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: File$Delete$Copy
                                                        • String ID:
                                                        • API String ID: 3226157194-0
                                                        • Opcode ID: 85a30b3e8996da0a773a927bb8f6ec6ccc2963cdd7238b42320cc8c9d9303acc
                                                        • Instruction ID: 05a7d326caea089a1087901ec25236d256186eedfd49c8efecfbf53d38b2a259
                                                        • Opcode Fuzzy Hash: 85a30b3e8996da0a773a927bb8f6ec6ccc2963cdd7238b42320cc8c9d9303acc
                                                        • Instruction Fuzzy Hash: 20B18E71D00119ABDF10DBA5CD89EDEBBBDFF59344F0040AAF609E6141EA349E948FA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1426 4d5aa9-4d5ace 1427 4d5ad7-4d5ad9 1426->1427 1428 4d5ad0-4d5ad2 1426->1428 1430 4d5adb-4d5af5 call 4cf2c6 call 4cf2d9 call 4d27ec 1427->1430 1431 4d5afa-4d5b1f 1427->1431 1429 4d5ca5-4d5cb4 call 4c0a8c 1428->1429 1430->1429 1433 4d5b26-4d5b2c 1431->1433 1434 4d5b21-4d5b24 1431->1434 1438 4d5b2e-4d5b46 call 4cf2c6 call 4cf2d9 call 4d27ec 1433->1438 1439 4d5b4b 1433->1439 1434->1433 1437 4d5b4e-4d5b53 1434->1437 1442 4d5b55-4d5b61 call 4d9424 1437->1442 1443 4d5b64-4d5b6d call 4d564e 1437->1443 1471 4d5c9c-4d5c9f 1438->1471 1439->1437 1442->1443 1454 4d5b6f-4d5b71 1443->1454 1455 4d5ba8-4d5bba 1443->1455 1459 4d5b95-4d5b9e call 4d542e 1454->1459 1460 4d5b73-4d5b78 1454->1460 1457 4d5bbc-4d5bc2 1455->1457 1458 4d5c02-4d5c23 WriteFile 1455->1458 1462 4d5bc4-4d5bc7 1457->1462 1463 4d5bf2-4d5c00 call 4d56c4 1457->1463 1466 4d5c2e 1458->1466 1467 4d5c25-4d5c2b GetLastError 1458->1467 1470 4d5ba3-4d5ba6 1459->1470 1464 4d5c6c-4d5c7e 1460->1464 1465 4d5b7e-4d5b8b call 4d55e1 1460->1465 1473 4d5bc9-4d5bcc 1462->1473 1474 4d5be2-4d5bf0 call 4d5891 1462->1474 1463->1470 1477 4d5c89-4d5c99 call 4cf2d9 call 4cf2c6 1464->1477 1478 4d5c80-4d5c83 1464->1478 1479 4d5b8e-4d5b90 1465->1479 1472 4d5c31-4d5c3c 1466->1472 1467->1466 1470->1479 1484 4d5ca4 1471->1484 1481 4d5c3e-4d5c43 1472->1481 1482 4d5ca1 1472->1482 1473->1464 1483 4d5bd2-4d5be0 call 4d57a3 1473->1483 1474->1470 1477->1471 1478->1477 1488 4d5c85-4d5c87 1478->1488 1479->1472 1490 4d5c69 1481->1490 1491 4d5c45-4d5c4a 1481->1491 1482->1484 1483->1470 1484->1429 1488->1484 1490->1464 1495 4d5c4c-4d5c5e call 4cf2d9 call 4cf2c6 1491->1495 1496 4d5c60-4d5c67 call 4cf2a3 1491->1496 1495->1471 1496->1471
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: JOJ
                                                        • API String ID: 0-1671703104
                                                        • Opcode ID: 10cb7a235458f99482229239ad99107f1e03f4c13942c2a951c27e57e54a586a
                                                        • Instruction ID: 0851f5559cae9c59621fcd6269306dd900ee53fe625c7c230792fba1db333b9d
                                                        • Opcode Fuzzy Hash: 10cb7a235458f99482229239ad99107f1e03f4c13942c2a951c27e57e54a586a
                                                        • Instruction Fuzzy Hash: F1510E75D10609AFCB209FA9C865FAFBBB8AF05314F10005FF404A7391DA7D9902DB6A
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,004A3B0F,SwapMouseButtons,00000004,?), ref: 004A3B40
                                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,004A3B0F,SwapMouseButtons,00000004,?), ref: 004A3B61
                                                        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,004A3B0F,SwapMouseButtons,00000004,?), ref: 004A3B83
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID: Control Panel\Mouse
                                                        • API String ID: 3677997916-824357125
                                                        • Opcode ID: e7360d752c37c4dad5da263c24d5bc080f294d1e10b126dc827ef11abd4f6b45
                                                        • Instruction ID: 04ab529446f7a4bc03a1ff28e248d95522200585f980fe20f3e325eb143b2015
                                                        • Opcode Fuzzy Hash: e7360d752c37c4dad5da263c24d5bc080f294d1e10b126dc827ef11abd4f6b45
                                                        • Instruction Fuzzy Hash: D0115AB5510208FFDB208FA4DC88AAFBBB9EF11745B10445AB801E7211E335AE44A764
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 0151C1FD
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0151C221
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0151C243
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1689522511.000000000151A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                                                        • Instruction ID: 64e6d035bb599a5a7c6f9bd247edab4c3509c79c7feb18338cb01ca632b3226c
                                                        • Opcode Fuzzy Hash: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                                                        • Instruction Fuzzy Hash: 4F620B30A54258DBEB25CFA4C840BDEB772FF58300F1091A9D20DEB294E7769E81CB59
                                                        APIs
                                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 004E33A2
                                                          • Part of subcall function 004A6B57: _wcslen.LIBCMT ref: 004A6B6A
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 004A3A04
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String_wcslen
                                                        • String ID: Line:
                                                        • API String ID: 2289894680-1585850449
                                                        • Opcode ID: f1f264c117dc3157b9b2d915608a3b9f53d8876aa31df3a2a0abaa55e3817a2c
                                                        • Instruction ID: 57edb716533d742a638eb1c239f53e2f8d71beff18852dbe0918b8276fe81c8d
                                                        • Opcode Fuzzy Hash: f1f264c117dc3157b9b2d915608a3b9f53d8876aa31df3a2a0abaa55e3817a2c
                                                        • Instruction Fuzzy Hash: 0C310471408300AAC721EF25EC46FDBB7DCAB61719F00491FF49983191EB789A49D7CA
                                                        APIs
                                                        • GetOpenFileNameW.COMDLG32(?), ref: 004E2C8C
                                                          • Part of subcall function 004A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004A3A97,?,?,004A2E7F,?,?,?,00000000), ref: 004A3AC2
                                                          • Part of subcall function 004A2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 004A2DC4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Name$Path$FileFullLongOpen
                                                        • String ID: X$`eV
                                                        • API String ID: 779396738-860154749
                                                        • Opcode ID: 5457fb08aa746dbd412acfb91caee80dd887562b0e36bc32b5ecd2c7211746ba
                                                        • Instruction ID: d9c6b706b71d21f80ec4d50a7aea002f1b706d541f2aa87f3f81e691345dd361
                                                        • Opcode Fuzzy Hash: 5457fb08aa746dbd412acfb91caee80dd887562b0e36bc32b5ecd2c7211746ba
                                                        • Instruction Fuzzy Hash: BB21C371A00298AFDB01DF99C945BEE7BFCAF59309F00405EE405A7241DBF85A898BA5
                                                        APIs
                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 004C0668
                                                          • Part of subcall function 004C32A4: RaiseException.KERNEL32(?,?,?,004C068A,?,00571444,?,?,?,?,?,?,004C068A,004A1129,00568738,004A1129), ref: 004C3304
                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 004C0685
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$ExceptionRaise
                                                        • String ID: Unknown exception
                                                        • API String ID: 3476068407-410509341
                                                        • Opcode ID: 7c6bde5e481aa92eb84282aa7240a9c42c38dce5c9c46bf3cb266d4c22e0501b
                                                        • Instruction ID: f6d34fdcb0f845833c6914bf59496475b96254eb388743b23fa724c3986b5e41
                                                        • Opcode Fuzzy Hash: 7c6bde5e481aa92eb84282aa7240a9c42c38dce5c9c46bf3cb266d4c22e0501b
                                                        • Instruction Fuzzy Hash: 5EF0283890020CB78F40BA65DC46E9E7B6C6E00304B60453FB818C2591EF79DA1AC698
                                                        APIs
                                                        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0051302F
                                                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00513044
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Temp$FileNamePath
                                                        • String ID: aut
                                                        • API String ID: 3285503233-3010740371
                                                        • Opcode ID: 695369698881ee7ebfed104cf866033a8ee3894335b33bb91e5098420e9fca2d
                                                        • Instruction ID: 6d0475aaa81822c6108d0e5f5560412c7521e1853b75b4eedb95e13d31cbce47
                                                        • Opcode Fuzzy Hash: 695369698881ee7ebfed104cf866033a8ee3894335b33bb91e5098420e9fca2d
                                                        • Instruction Fuzzy Hash: C3D05E76500328A7DA60A7A4AC0EFCB3E6CDB04750F0002A1BA95E2191DAB09988CBD0
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 005282F5
                                                        • TerminateProcess.KERNEL32(00000000), ref: 005282FC
                                                        • FreeLibrary.KERNEL32(?,?,?,?), ref: 005284DD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentFreeLibraryTerminate
                                                        • String ID:
                                                        • API String ID: 146820519-0
                                                        • Opcode ID: ade83c29a283f88e8bf6f0434a6e2efe4d547627e64b96a7136001005f1a7f66
                                                        • Instruction ID: 2ea813970ea7ebbfb476a70fd4f58a9a21fa1d0d7c07fd79060686f926ee51fe
                                                        • Opcode Fuzzy Hash: ade83c29a283f88e8bf6f0434a6e2efe4d547627e64b96a7136001005f1a7f66
                                                        • Instruction Fuzzy Hash: DD128D719083119FC714DF28C484B2ABBE5BF89318F04895DE8898B392CB34ED45CF92
                                                        APIs
                                                          • Part of subcall function 004A1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 004A1BF4
                                                          • Part of subcall function 004A1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 004A1BFC
                                                          • Part of subcall function 004A1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 004A1C07
                                                          • Part of subcall function 004A1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 004A1C12
                                                          • Part of subcall function 004A1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 004A1C1A
                                                          • Part of subcall function 004A1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 004A1C22
                                                          • Part of subcall function 004A1B4A: RegisterWindowMessageW.USER32(00000004,?,004A12C4), ref: 004A1BA2
                                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 004A136A
                                                        • OleInitialize.OLE32 ref: 004A1388
                                                        • CloseHandle.KERNEL32(00000000,00000000), ref: 004E24AB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                        • String ID:
                                                        • API String ID: 1986988660-0
                                                        • Opcode ID: 25e2696f228e48b9114fb4612ddeabc0d7369a668a33aac12ee6feb16eaae84b
                                                        • Instruction ID: 271beffa5c520da87f5378b12f43b8d0ab1ba5aa9cca02147c6ee6bab6d8c716
                                                        • Opcode Fuzzy Hash: 25e2696f228e48b9114fb4612ddeabc0d7369a668a33aac12ee6feb16eaae84b
                                                        • Instruction Fuzzy Hash: B871CBB5921A008EC788EF7EB9466553FE5FBA9344B04822ED00ED7261EB344488FF4D
                                                        APIs
                                                          • Part of subcall function 004A3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 004A3A04
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0050C259
                                                        • KillTimer.USER32(?,00000001,?,?), ref: 0050C261
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0050C270
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_Timer$Kill
                                                        • String ID:
                                                        • API String ID: 3500052701-0
                                                        • Opcode ID: 38aa8d2a9b4d51881ba7dd33c5cb6ca422c22ca2cfd9361c41ac2616714db404
                                                        • Instruction ID: 4f576ac4976607fd246c38a4e5e61c52215f044e35db7d0940ab78521e26288a
                                                        • Opcode Fuzzy Hash: 38aa8d2a9b4d51881ba7dd33c5cb6ca422c22ca2cfd9361c41ac2616714db404
                                                        • Instruction Fuzzy Hash: 7B31C374904744AFEB328F648855BEBBFECAF17308F00049EE5DAA7281C7745A88DB51
                                                        APIs
                                                        • CloseHandle.KERNELBASE(00000000,00000000,?,?,004D85CC,?,00568CC8,0000000C), ref: 004D8704
                                                        • GetLastError.KERNEL32(?,004D85CC,?,00568CC8,0000000C), ref: 004D870E
                                                        • __dosmaperr.LIBCMT ref: 004D8739
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CloseErrorHandleLast__dosmaperr
                                                        • String ID:
                                                        • API String ID: 2583163307-0
                                                        • Opcode ID: da73af89a3782293d3cc3e20ea66ee12e416f3daf23ba0d3e9e6490b30891ede
                                                        • Instruction ID: 84b41a63f15bfe0d54b98ca2942fe8828722d228e47c8ab406c64b0a47cca2ad
                                                        • Opcode Fuzzy Hash: da73af89a3782293d3cc3e20ea66ee12e416f3daf23ba0d3e9e6490b30891ede
                                                        • Instruction Fuzzy Hash: 02018E3260426026D62467356C65B7F2B998B91778F39011FFC089B3D3DEACCC81925C
                                                        APIs
                                                        • TranslateMessage.USER32(?), ref: 004ADB7B
                                                        • DispatchMessageW.USER32(?), ref: 004ADB89
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004ADB9F
                                                        • Sleep.KERNEL32(0000000A), ref: 004ADBB1
                                                        • TranslateAcceleratorW.USER32(?,?,?), ref: 004F1CC9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                        • String ID:
                                                        • API String ID: 3288985973-0
                                                        • Opcode ID: ad314774ba02cab9a5ef000f014fa71796d62bff9c6758f7493058a6889b761f
                                                        • Instruction ID: f003ba0ff5d58941765942851dfea43f3e56ed7d251ed3131b016582e6f852e2
                                                        • Opcode Fuzzy Hash: ad314774ba02cab9a5ef000f014fa71796d62bff9c6758f7493058a6889b761f
                                                        • Instruction Fuzzy Hash: A2F054306043449BE730C7619C45FEB77ACEB55310F10451AE65A931D0DB38A4489B2A
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00512CD4,?,?,?,00000004,00000001), ref: 00512FF2
                                                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00512CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00513006
                                                        • CloseHandle.KERNEL32(00000000,?,00512CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0051300D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleTime
                                                        • String ID:
                                                        • API String ID: 3397143404-0
                                                        • Opcode ID: 73ee465d1f7b3a9cc6cb08f00a87c95c760099abde7830ce9cfb5f2e09e1f356
                                                        • Instruction ID: e30fc2fad09f833380acc136788ba311c6ed44d58903b252ebce93f1c1214115
                                                        • Opcode Fuzzy Hash: 73ee465d1f7b3a9cc6cb08f00a87c95c760099abde7830ce9cfb5f2e09e1f356
                                                        • Instruction Fuzzy Hash: 5DE0863228021077E2301755BC0DFCB3E5CD78AB71F104210F719751D046A05505A3A8
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 004B17F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: CALL
                                                        • API String ID: 1385522511-4196123274
                                                        • Opcode ID: 01ea922fa87baa2feb840c4e5f0cdab16947d7c249d94b68e4835454af992bbf
                                                        • Instruction ID: eb8fe0d9f2c35a534a0692c59e452f1497fd670d2d0f5a990f4e74cb1195c80c
                                                        • Opcode Fuzzy Hash: 01ea922fa87baa2feb840c4e5f0cdab16947d7c249d94b68e4835454af992bbf
                                                        • Instruction Fuzzy Hash: 3E22AD70608301DFC714DF15C4A0A6ABBF1BF85318F54891EF59A8B361D739E845CBAA
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00516F6B
                                                          • Part of subcall function 004A4ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00571418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 004A4EFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad_wcslen
                                                        • String ID: >>>AUTOIT SCRIPT<<<
                                                        • API String ID: 3312870042-2806939583
                                                        • Opcode ID: e30f7e4a635f958be2a841e8c7adf794ec58970482e835d3dd0095d22568b709
                                                        • Instruction ID: 7b83b2b2f320a8e2597a70cca3c897c4811d6ccc27b510935c8efb75e4697211
                                                        • Opcode Fuzzy Hash: e30f7e4a635f958be2a841e8c7adf794ec58970482e835d3dd0095d22568b709
                                                        • Instruction Fuzzy Hash: 3EB1B7311083019FDB14EF25C4919AEB7F5BFA9344F04881EF496872A1DB34ED89CB95
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock
                                                        • String ID: EA06
                                                        • API String ID: 2638373210-3962188686
                                                        • Opcode ID: cf3b5107923e365ab94270f3b6ee0c214f19f89cf015a72c0a482ea0a274672b
                                                        • Instruction ID: 4010b7194f4f2daa8d04fe41309a2a3a6e09a70144584faac93b8b08768d6cdc
                                                        • Opcode Fuzzy Hash: cf3b5107923e365ab94270f3b6ee0c214f19f89cf015a72c0a482ea0a274672b
                                                        • Instruction Fuzzy Hash: 9F01F572804258BEEF68C7A9C856FEEBBF89B05305F00455EE152D6181E5B8E608CB60
                                                        APIs
                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 004A3908
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_
                                                        • String ID:
                                                        • API String ID: 1144537725-0
                                                        • Opcode ID: 35b5f71ec38b42d8de3d426bb41892e8b5468f6246bca0eb9d2a85ea1e846eca
                                                        • Instruction ID: 1f4f9d9d5effe39c259cb304a2b094aa2d37f393010403403d4780a47375f1ea
                                                        • Opcode Fuzzy Hash: 35b5f71ec38b42d8de3d426bb41892e8b5468f6246bca0eb9d2a85ea1e846eca
                                                        • Instruction Fuzzy Hash: 6831D4705047008FD720EF24D885797BBE8FB59709F00092FF59983340E779AA48DB5A
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 0151C1FD
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0151C221
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0151C243
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1689522511.000000000151A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                        • Instruction ID: 3a4bbf314b0645c93225231916f98d6a421d798491806e39ed5a0b37c0ae2e2d
                                                        • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                        • Instruction Fuzzy Hash: 9312CC24E24658C6EB24DF64D8507DEB232FF68300F1094E9910DEB7A5E77A4E81CF5A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction ID: 908e72975d7f695602354de9c2234681ad4e2a5355a94261acce4155827f2cef
                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction Fuzzy Hash: 4F311B74A00109DBD718CF59D8809A9FBB5FF49300B2482A6E80ACB756D735EDC5CBE5
                                                        APIs
                                                          • Part of subcall function 004A4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,004A4EDD,?,00571418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 004A4E9C
                                                          • Part of subcall function 004A4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 004A4EAE
                                                          • Part of subcall function 004A4E90: FreeLibrary.KERNEL32(00000000,?,?,004A4EDD,?,00571418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 004A4EC0
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00571418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 004A4EFD
                                                          • Part of subcall function 004A4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,004E3CDE,?,00571418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 004A4E62
                                                          • Part of subcall function 004A4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 004A4E74
                                                          • Part of subcall function 004A4E59: FreeLibrary.KERNEL32(00000000,?,?,004E3CDE,?,00571418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 004A4E87
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Library$Load$AddressFreeProc
                                                        • String ID:
                                                        • API String ID: 2632591731-0
                                                        • Opcode ID: 4b3b6055e9fab4b5476d05d78e4582e27cdaea3f91b2ed6f12b532afd4460c78
                                                        • Instruction ID: 6d7832de1159a0837e755212f3bafcc8c1657eceb9144ec4a4aae97ed79d07cd
                                                        • Opcode Fuzzy Hash: 4b3b6055e9fab4b5476d05d78e4582e27cdaea3f91b2ed6f12b532afd4460c78
                                                        • Instruction Fuzzy Hash: 80110832600205AACB10AF62D806FEE77A4AFE5715F10441FF452A71C1DEB8AA059758
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: __wsopen_s
                                                        • String ID:
                                                        • API String ID: 3347428461-0
                                                        • Opcode ID: 46ebb538be9934823eb1574db4ddd91eb34233cfb464b8ff4534902f48b15eca
                                                        • Instruction ID: 2cef3d5bcf4a873c33c7a0dfb06f2f78bbeee64b11f49177574c0500451ccba8
                                                        • Opcode Fuzzy Hash: 46ebb538be9934823eb1574db4ddd91eb34233cfb464b8ff4534902f48b15eca
                                                        • Instruction Fuzzy Hash: 8E11487190410AAFCB05DF58E940AAF7BF4EF48304F10405AF808AB312EB30EA11CBA9
                                                        APIs
                                                          • Part of subcall function 004D4C7D: RtlAllocateHeap.NTDLL(00000008,004A1129,00000000,?,004D2E29,00000001,00000364,?,?,?,004CF2DE,004D3863,00571444,?,004BFDF5,?), ref: 004D4CBE
                                                        • _free.LIBCMT ref: 004D506C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap_free
                                                        • String ID:
                                                        • API String ID: 614378929-0
                                                        • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                        • Instruction ID: ee992159468e66cffecfe9ac9091c743e006b55794c174a981d4114e867429e5
                                                        • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                        • Instruction Fuzzy Hash: E40149B22047046BE3328F65D891A5AFBECFB89370F25051FE184933C0EA74A805C7B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                        • Instruction ID: 679d3ddea48356fc5d846a3483956e4137d8f23192bf360196fd15c4779e0aed
                                                        • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                        • Instruction Fuzzy Hash: DFF0D63A621A1096C6712A778C15F6B339C9F62338F10072FF421923D2DB7C940285AD
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000008,004A1129,00000000,?,004D2E29,00000001,00000364,?,?,?,004CF2DE,004D3863,00571444,?,004BFDF5,?), ref: 004D4CBE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: be659cd94a2725d9d2967cf5037b592711394260cf5e6d96cf1952cdcbd5853d
                                                        • Instruction ID: 9568dbe48ccbf1c5d2d70d78cea506b9a1e775403936bacac86e658f2f2bda77
                                                        • Opcode Fuzzy Hash: be659cd94a2725d9d2967cf5037b592711394260cf5e6d96cf1952cdcbd5853d
                                                        • Instruction Fuzzy Hash: 77F0BB3161212467DB215F629D15F573749AFD1B61B16412BB815A73C0CB78D8019698
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000000,?,00571444,?,004BFDF5,?,?,004AA976,00000010,00571440,004A13FC,?,004A13C6,?,004A1129), ref: 004D3852
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: b89f6d57ce44dcb73f5686904798b07bb82d05f030cf4d749e3e5767b20af041
                                                        • Instruction ID: 9ac9737d8f09660636ca5ec9ac4b0e683a3433b9c0c15f30a5ee3060709f2274
                                                        • Opcode Fuzzy Hash: b89f6d57ce44dcb73f5686904798b07bb82d05f030cf4d749e3e5767b20af041
                                                        • Instruction Fuzzy Hash: 70E0E53510022456DA213E779C24F9B3ACAAB827B2F09003BBC04967C0CB5DDD01B2EF
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,?,00571418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 004A4F6D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: 7d58fea254b310010a1e00ce72a09d92013b4c36a705d4207f32d5ddd9a63fe8
                                                        • Instruction ID: 739a743e2c4d44fdca7c8cf31559c6d4ca6f3e4ce78ecf27d5e0701333fb0755
                                                        • Opcode Fuzzy Hash: 7d58fea254b310010a1e00ce72a09d92013b4c36a705d4207f32d5ddd9a63fe8
                                                        • Instruction Fuzzy Hash: 59F0A071105341CFCB348F20D49081ABBE0AFA9319320997FF1DA82610C7B99844EF09
                                                        APIs
                                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 004A2DC4
                                                          • Part of subcall function 004A6B57: _wcslen.LIBCMT ref: 004A6B6A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: LongNamePath_wcslen
                                                        • String ID:
                                                        • API String ID: 541455249-0
                                                        • Opcode ID: 0210e1e74c09537be1e977afa640b367613136c2092213b1558013c13e1e3fed
                                                        • Instruction ID: 22cceea77d1615fd13eab62278083f4d04b84f9fdbce6240520ba176be715261
                                                        • Opcode Fuzzy Hash: 0210e1e74c09537be1e977afa640b367613136c2092213b1558013c13e1e3fed
                                                        • Instruction Fuzzy Hash: E7E0CD76A001345BC71192599C05FDA77DDDFC8794F050076FD0AE7258D974AD848694
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock
                                                        • String ID:
                                                        • API String ID: 2638373210-0
                                                        • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                        • Instruction ID: bc9bdd5b19c8de20862e289b14fd236c216672b2d61d278b33a2be7bce6781ff
                                                        • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                        • Instruction Fuzzy Hash: EAE048B46097005FDF395A28A8517F677D49F49300F10085EF59F83252E5726855865D
                                                        APIs
                                                          • Part of subcall function 004A3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 004A3908
                                                          • Part of subcall function 004AD730: GetInputState.USER32 ref: 004AD807
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 004A2B6B
                                                          • Part of subcall function 004A30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 004A314E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                        • String ID:
                                                        • API String ID: 3667716007-0
                                                        • Opcode ID: ac4ea6c72929308f71287d91766b4ce70d355a5fa49d2a2cba2e0bbb89372b7d
                                                        • Instruction ID: d9b68f80771a2899ce86725f1d64a2c4c8b988c0b3d63f4883e1e4d844ae7484
                                                        • Opcode Fuzzy Hash: ac4ea6c72929308f71287d91766b4ce70d355a5fa49d2a2cba2e0bbb89372b7d
                                                        • Instruction Fuzzy Hash: 3FE0262230420407CA08BF3AA8124BDA78A9BF335AF00543FF047432A2DE2C49495329
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,00000000,?,004E0704,?,?,00000000,?,004E0704,00000000,0000000C), ref: 004E03B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: 0435c3ad31bbcb1c3b24d7eec8b779902c4ce7cb8afeaf3acc018b4d7cf69bed
                                                        • Instruction ID: e72a7749607ed2b2b752980436996ba84b587b152b48e4d11e984cbef029ef8d
                                                        • Opcode Fuzzy Hash: 0435c3ad31bbcb1c3b24d7eec8b779902c4ce7cb8afeaf3acc018b4d7cf69bed
                                                        • Instruction Fuzzy Hash: 4AD06C3204010DBBDF028F84DD06EDA3FAAFB48714F014000BE1866120C732E821EB90
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 004A1CBC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: InfoParametersSystem
                                                        • String ID:
                                                        • API String ID: 3098949447-0
                                                        • Opcode ID: 7059e0ddfe48d5c1213138bdcff4be54a1c4b9d1a187dfaffaf4e0a75e12b5cb
                                                        • Instruction ID: ba01ca298d74cd90e0bdd423289a9654568e807a71259cd8312742421b9ef8aa
                                                        • Opcode Fuzzy Hash: 7059e0ddfe48d5c1213138bdcff4be54a1c4b9d1a187dfaffaf4e0a75e12b5cb
                                                        • Instruction Fuzzy Hash: 9AC09236280304EFF2148B94BC4EF107B64A368B01F048401F64DA96E3C3A228A8FB64
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 0151C9E1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1689522511.000000000151A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction ID: bf0de42b683c2302bc20cac4a43ac18d471d6c02201d6af239a4837a07c61e7d
                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction Fuzzy Hash: 14E0E67598010EDFDB00EFB4D54969E7FB4FF04301F104261FD01E2281DB319D508A62
                                                        APIs
                                                          • Part of subcall function 004B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 004B9BB2
                                                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0053961A
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0053965B
                                                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0053969F
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005396C9
                                                        • SendMessageW.USER32 ref: 005396F2
                                                        • GetKeyState.USER32(00000011), ref: 0053978B
                                                        • GetKeyState.USER32(00000009), ref: 00539798
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 005397AE
                                                        • GetKeyState.USER32(00000010), ref: 005397B8
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005397E9
                                                        • SendMessageW.USER32 ref: 00539810
                                                        • SendMessageW.USER32(?,00001030,?,00537E95), ref: 00539918
                                                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0053992E
                                                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00539941
                                                        • SetCapture.USER32(?), ref: 0053994A
                                                        • ClientToScreen.USER32(?,?), ref: 005399AF
                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 005399BC
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 005399D6
                                                        • ReleaseCapture.USER32 ref: 005399E1
                                                        • GetCursorPos.USER32(?), ref: 00539A19
                                                        • ScreenToClient.USER32(?,?), ref: 00539A26
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00539A80
                                                        • SendMessageW.USER32 ref: 00539AAE
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00539AEB
                                                        • SendMessageW.USER32 ref: 00539B1A
                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00539B3B
                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00539B4A
                                                        • GetCursorPos.USER32(?), ref: 00539B68
                                                        • ScreenToClient.USER32(?,?), ref: 00539B75
                                                        • GetParent.USER32(?), ref: 00539B93
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00539BFA
                                                        • SendMessageW.USER32 ref: 00539C2B
                                                        • ClientToScreen.USER32(?,?), ref: 00539C84
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00539CB4
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00539CDE
                                                        • SendMessageW.USER32 ref: 00539D01
                                                        • ClientToScreen.USER32(?,?), ref: 00539D4E
                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00539D82
                                                          • Part of subcall function 004B9944: GetWindowLongW.USER32(?,000000EB), ref: 004B9952
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00539E05
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                        • String ID: @GUI_DRAGID$F$p#W
                                                        • API String ID: 3429851547-503726554
                                                        • Opcode ID: 4936d990b89f1eed6ffef948e8871dbad10c4a851d0b238b4cca1bad09f7373d
                                                        • Instruction ID: 90016a6284dd188761dd996f5d3a316ffd3c61a52ccbde6f0c801f007f15cc6b
                                                        • Opcode Fuzzy Hash: 4936d990b89f1eed6ffef948e8871dbad10c4a851d0b238b4cca1bad09f7373d
                                                        • Instruction Fuzzy Hash: 6C42BEB5205200AFDB20CF28CC45EAABFE5FF59310F100A1DF6999B2A1D7B1E854EB51
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 005348F3
                                                        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00534908
                                                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00534927
                                                        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0053494B
                                                        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0053495C
                                                        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0053497B
                                                        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 005349AE
                                                        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 005349D4
                                                        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00534A0F
                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00534A56
                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00534A7E
                                                        • IsMenu.USER32(?), ref: 00534A97
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00534AF2
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00534B20
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00534B94
                                                        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00534BE3
                                                        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00534C82
                                                        • wsprintfW.USER32 ref: 00534CAE
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00534CC9
                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00534CF1
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00534D13
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00534D33
                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00534D5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                        • String ID: %d/%02d/%02d
                                                        • API String ID: 4054740463-328681919
                                                        • Opcode ID: de2d11467b0447bd46a75eec61bb89b327f4f5274d6ade41b9746a9bcbfe9368
                                                        • Instruction ID: efa3f32bc252282aefe94500a92c36f5032f101df9ec4fc9f3f0cd701c6cb196
                                                        • Opcode Fuzzy Hash: de2d11467b0447bd46a75eec61bb89b327f4f5274d6ade41b9746a9bcbfe9368
                                                        • Instruction Fuzzy Hash: 9B12DD71600214ABEB248F29CC4AFAE7FF8FF45314F144529F916EA2A1DB78A945CF50
                                                        APIs
                                                        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 004BF998
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004FF474
                                                        • IsIconic.USER32(00000000), ref: 004FF47D
                                                        • ShowWindow.USER32(00000000,00000009), ref: 004FF48A
                                                        • SetForegroundWindow.USER32(00000000), ref: 004FF494
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004FF4AA
                                                        • GetCurrentThreadId.KERNEL32 ref: 004FF4B1
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004FF4BD
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 004FF4CE
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 004FF4D6
                                                        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 004FF4DE
                                                        • SetForegroundWindow.USER32(00000000), ref: 004FF4E1
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004FF4F6
                                                        • keybd_event.USER32(00000012,00000000), ref: 004FF501
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004FF50B
                                                        • keybd_event.USER32(00000012,00000000), ref: 004FF510
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004FF519
                                                        • keybd_event.USER32(00000012,00000000), ref: 004FF51E
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004FF528
                                                        • keybd_event.USER32(00000012,00000000), ref: 004FF52D
                                                        • SetForegroundWindow.USER32(00000000), ref: 004FF530
                                                        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 004FF557
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 4125248594-2988720461
                                                        • Opcode ID: 4fd6302af20a17d6040a68b39361be349ab7ffb86a65543aa526ca7d32655ffb
                                                        • Instruction ID: 1f7db34b7dc6387fa68b126a2b69e510b6a3226b03b2d34981cfd6ea7bd313a9
                                                        • Opcode Fuzzy Hash: 4fd6302af20a17d6040a68b39361be349ab7ffb86a65543aa526ca7d32655ffb
                                                        • Instruction Fuzzy Hash: 3D315E71A4021CBBEB206BB55C4AFBF7E6CEF54B50F100066FA01F62D1C6B59D04ABA5
                                                        APIs
                                                          • Part of subcall function 005016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0050170D
                                                          • Part of subcall function 005016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0050173A
                                                          • Part of subcall function 005016C3: GetLastError.KERNEL32 ref: 0050174A
                                                        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00501286
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 005012A8
                                                        • CloseHandle.KERNEL32(?), ref: 005012B9
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 005012D1
                                                        • GetProcessWindowStation.USER32 ref: 005012EA
                                                        • SetProcessWindowStation.USER32(00000000), ref: 005012F4
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00501310
                                                          • Part of subcall function 005010BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,005011FC), ref: 005010D4
                                                          • Part of subcall function 005010BF: CloseHandle.KERNEL32(?,?,005011FC), ref: 005010E9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                        • String ID: $default$winsta0$ZV
                                                        • API String ID: 22674027-1908597597
                                                        • Opcode ID: 3825dc30a89d1bd5808c252d9c77c34d3ea26bc525c536ef2e7d8dcd70211cff
                                                        • Instruction ID: 51eca7b15197c7dfc3920f824bba0d60a6b73913cf8ddabf63e9e62afbfc873e
                                                        • Opcode Fuzzy Hash: 3825dc30a89d1bd5808c252d9c77c34d3ea26bc525c536ef2e7d8dcd70211cff
                                                        • Instruction Fuzzy Hash: 7F818871900609ABDF219FA8DC49FEE7FB9FF04704F144129F910B62A0D7758A58DB2A
                                                        APIs
                                                          • Part of subcall function 005010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00501114
                                                          • Part of subcall function 005010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00500B9B,?,?,?), ref: 00501120
                                                          • Part of subcall function 005010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00500B9B,?,?,?), ref: 0050112F
                                                          • Part of subcall function 005010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00500B9B,?,?,?), ref: 00501136
                                                          • Part of subcall function 005010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0050114D
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00500BCC
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00500C00
                                                        • GetLengthSid.ADVAPI32(?), ref: 00500C17
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00500C51
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00500C6D
                                                        • GetLengthSid.ADVAPI32(?), ref: 00500C84
                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00500C8C
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00500C93
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00500CB4
                                                        • CopySid.ADVAPI32(00000000), ref: 00500CBB
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00500CEA
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00500D0C
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00500D1E
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00500D45
                                                        • HeapFree.KERNEL32(00000000), ref: 00500D4C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00500D55
                                                        • HeapFree.KERNEL32(00000000), ref: 00500D5C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00500D65
                                                        • HeapFree.KERNEL32(00000000), ref: 00500D6C
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00500D78
                                                        • HeapFree.KERNEL32(00000000), ref: 00500D7F
                                                          • Part of subcall function 00501193: GetProcessHeap.KERNEL32(00000008,00500BB1,?,00000000,?,00500BB1,?), ref: 005011A1
                                                          • Part of subcall function 00501193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00500BB1,?), ref: 005011A8
                                                          • Part of subcall function 00501193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00500BB1,?), ref: 005011B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                        • String ID:
                                                        • API String ID: 4175595110-0
                                                        • Opcode ID: c50ce0bb09918ce5435f98d4be7402d1cf355476ab7e0a252e0fa754d3c2d0f0
                                                        • Instruction ID: 5e7dfcce16bae18aa8165f8396c65f9b58002619dbe794c18c34d18253c536f3
                                                        • Opcode Fuzzy Hash: c50ce0bb09918ce5435f98d4be7402d1cf355476ab7e0a252e0fa754d3c2d0f0
                                                        • Instruction Fuzzy Hash: F371477690020AABDF109FA4DC48BAEBFB8BF14310F144615E915F62D1D775AA09DBB0
                                                        APIs
                                                        • OpenClipboard.USER32(0053CC08), ref: 0051EB29
                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0051EB37
                                                        • GetClipboardData.USER32(0000000D), ref: 0051EB43
                                                        • CloseClipboard.USER32 ref: 0051EB4F
                                                        • GlobalLock.KERNEL32(00000000), ref: 0051EB87
                                                        • CloseClipboard.USER32 ref: 0051EB91
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0051EBBC
                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0051EBC9
                                                        • GetClipboardData.USER32(00000001), ref: 0051EBD1
                                                        • GlobalLock.KERNEL32(00000000), ref: 0051EBE2
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0051EC22
                                                        • IsClipboardFormatAvailable.USER32(0000000F), ref: 0051EC38
                                                        • GetClipboardData.USER32(0000000F), ref: 0051EC44
                                                        • GlobalLock.KERNEL32(00000000), ref: 0051EC55
                                                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0051EC77
                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0051EC94
                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0051ECD2
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0051ECF3
                                                        • CountClipboardFormats.USER32 ref: 0051ED14
                                                        • CloseClipboard.USER32 ref: 0051ED59
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                        • String ID:
                                                        • API String ID: 420908878-0
                                                        • Opcode ID: 7fc141a89cb5cdbec0c551c46eaffe16eff077aa3439979ab5da938a8d22c4f6
                                                        • Instruction ID: 25c14456feb5b574d86d3feef183b9851b10a9d8156b1446ee73d7ed0b27bb6d
                                                        • Opcode Fuzzy Hash: 7fc141a89cb5cdbec0c551c46eaffe16eff077aa3439979ab5da938a8d22c4f6
                                                        • Instruction Fuzzy Hash: E761E3352043019FE300EF24D88AFAA7FA4BF95714F08455DF856972A1DB31DD89DB62
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 005169BE
                                                        • FindClose.KERNEL32(00000000), ref: 00516A12
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00516A4E
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00516A75
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00516AB2
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00516ADF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                        • API String ID: 3830820486-3289030164
                                                        • Opcode ID: 0df802ca85fa2d9ddd5c9d318ce925a1220f92904e0940c20d4e111fdad3ab2e
                                                        • Instruction ID: 76810c39256175d290ac044bbae3ec6a16100af4962d8fac03d72bf6f42bee4e
                                                        • Opcode Fuzzy Hash: 0df802ca85fa2d9ddd5c9d318ce925a1220f92904e0940c20d4e111fdad3ab2e
                                                        • Instruction Fuzzy Hash: B7D14271508300AEC710EBA5CC81EABB7ECBF99708F44491EF589D7191EB78DA48C762
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00519663
                                                        • GetFileAttributesW.KERNEL32(?), ref: 005196A1
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 005196BB
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 005196D3
                                                        • FindClose.KERNEL32(00000000), ref: 005196DE
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 005196FA
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0051974A
                                                        • SetCurrentDirectoryW.KERNEL32(00566B7C), ref: 00519768
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00519772
                                                        • FindClose.KERNEL32(00000000), ref: 0051977F
                                                        • FindClose.KERNEL32(00000000), ref: 0051978F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1409584000-438819550
                                                        • Opcode ID: 75dbc26779c6b6bad636f6f515b1eea455fea530dff8283e0fb86878cc58925b
                                                        • Instruction ID: 695103a025190b3f424aaabeeac536814646afdc304dddd5a0ca1e91cfca9a33
                                                        • Opcode Fuzzy Hash: 75dbc26779c6b6bad636f6f515b1eea455fea530dff8283e0fb86878cc58925b
                                                        • Instruction Fuzzy Hash: 3A31C2365002196AEB14AFB5DC18ADE7FACFF4A320F104596F815E31E0DB34DD848B64
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 005197BE
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00519819
                                                        • FindClose.KERNEL32(00000000), ref: 00519824
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00519840
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00519890
                                                        • SetCurrentDirectoryW.KERNEL32(00566B7C), ref: 005198AE
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 005198B8
                                                        • FindClose.KERNEL32(00000000), ref: 005198C5
                                                        • FindClose.KERNEL32(00000000), ref: 005198D5
                                                          • Part of subcall function 0050DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0050DB00
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                        • String ID: *.*
                                                        • API String ID: 2640511053-438819550
                                                        • Opcode ID: 976bff3f92453a66e3524c700e0092f4aeea22b1581004ef1f5b7373702f97ab
                                                        • Instruction ID: d7da3218893f4a9f7a706d40b77801102955bd3f914d87b604bb165b27ca4f36
                                                        • Opcode Fuzzy Hash: 976bff3f92453a66e3524c700e0092f4aeea22b1581004ef1f5b7373702f97ab
                                                        • Instruction Fuzzy Hash: F231B2365002197AEB10AFA4DC58ADE7FACBF46324F1045AAF854A31A0DB30D9898B64
                                                        APIs
                                                        • GetLocalTime.KERNEL32(?), ref: 00518257
                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00518267
                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00518273
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00518310
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00518324
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00518356
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0051838C
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00518395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryTime$File$Local$System
                                                        • String ID: *.*
                                                        • API String ID: 1464919966-438819550
                                                        • Opcode ID: 99afc36fc2cc3e466a070549651c0a27aa2d763507af3b9ba4ca884e3d17a8f1
                                                        • Instruction ID: e9b91e035d87b77afc9b34c354d887aa9e9f46f4edbe65fc1a48d51bc4d09906
                                                        • Opcode Fuzzy Hash: 99afc36fc2cc3e466a070549651c0a27aa2d763507af3b9ba4ca884e3d17a8f1
                                                        • Instruction Fuzzy Hash: 1861AB76504305AFD720EF21C8809AEB7E8FF89318F048D1EF99983251DB35E949CB92
                                                        APIs
                                                          • Part of subcall function 004A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004A3A97,?,?,004A2E7F,?,?,?,00000000), ref: 004A3AC2
                                                          • Part of subcall function 0050E199: GetFileAttributesW.KERNEL32(?,0050CF95), ref: 0050E19A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0050D122
                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0050D1DD
                                                        • MoveFileW.KERNEL32(?,?), ref: 0050D1F0
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 0050D20D
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0050D237
                                                          • Part of subcall function 0050D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0050D21C,?,?), ref: 0050D2B2
                                                        • FindClose.KERNEL32(00000000,?,?,?), ref: 0050D253
                                                        • FindClose.KERNEL32(00000000), ref: 0050D264
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 1946585618-1173974218
                                                        • Opcode ID: bcebc6c9f21a9a36fa35bb95d569d7478e895416f11f5f56a7c9c43d0078073b
                                                        • Instruction ID: 6475240dc5f731d532aa4c80d28fb5a51889b279431028e5eb9b286db18b4d10
                                                        • Opcode Fuzzy Hash: bcebc6c9f21a9a36fa35bb95d569d7478e895416f11f5f56a7c9c43d0078073b
                                                        • Instruction Fuzzy Hash: CB617E35C0111EAACF05EBE1CA929EEBBB5BF65344F24406AF40277191EB346F09DB64
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                        • String ID:
                                                        • API String ID: 1737998785-0
                                                        • Opcode ID: 746ebf1e26338d08025733ed4b42b7fb1805f5b4e533c817e4eabcc171e46094
                                                        • Instruction ID: 578258706a8f3439e159d86198260ab1d5b57bf30194093fadee315a1cfd996e
                                                        • Opcode Fuzzy Hash: 746ebf1e26338d08025733ed4b42b7fb1805f5b4e533c817e4eabcc171e46094
                                                        • Instruction Fuzzy Hash: 4D41AE35204611AFE310CF29E88AB59BFE5BF54318F14C49DE8199B7A2C735EC81CB90
                                                        APIs
                                                          • Part of subcall function 005016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0050170D
                                                          • Part of subcall function 005016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0050173A
                                                          • Part of subcall function 005016C3: GetLastError.KERNEL32 ref: 0050174A
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 0050E932
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                        • String ID: $ $@$SeShutdownPrivilege
                                                        • API String ID: 2234035333-3163812486
                                                        • Opcode ID: d8f94234f2ea14d40081241c1f8e4ea98f2e1c7578b51def9fa340050ec8fdb1
                                                        • Instruction ID: ea45bc578120b4097be95690c0f6d24f16bf46183f4eca0ff3ae67cde4b87d85
                                                        • Opcode Fuzzy Hash: d8f94234f2ea14d40081241c1f8e4ea98f2e1c7578b51def9fa340050ec8fdb1
                                                        • Instruction Fuzzy Hash: 9501D673610211ABEB6466B49C8BBBF7E5CB714750F254D21FC03F22D1D5A15C449294
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00521276
                                                        • WSAGetLastError.WSOCK32 ref: 00521283
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 005212BA
                                                        • WSAGetLastError.WSOCK32 ref: 005212C5
                                                        • closesocket.WSOCK32(00000000), ref: 005212F4
                                                        • listen.WSOCK32(00000000,00000005), ref: 00521303
                                                        • WSAGetLastError.WSOCK32 ref: 0052130D
                                                        • closesocket.WSOCK32(00000000), ref: 0052133C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$closesocket$bindlistensocket
                                                        • String ID:
                                                        • API String ID: 540024437-0
                                                        • Opcode ID: da3c12af73bbf13d87c4022f83a93722132edebe0af06d2553f53372b63b3fea
                                                        • Instruction ID: d848ffab4310d5088015cac49d13f610ba70b4472d8904fab4d5f4ce64f6e56b
                                                        • Opcode Fuzzy Hash: da3c12af73bbf13d87c4022f83a93722132edebe0af06d2553f53372b63b3fea
                                                        • Instruction Fuzzy Hash: AB418D35A00510AFD710DF25D488B2ABBE6BF66318F188488E8569F3D2C771ED85CBE0
                                                        APIs
                                                          • Part of subcall function 004A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004A3A97,?,?,004A2E7F,?,?,?,00000000), ref: 004A3AC2
                                                          • Part of subcall function 0050E199: GetFileAttributesW.KERNEL32(?,0050CF95), ref: 0050E19A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0050D420
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 0050D470
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0050D481
                                                        • FindClose.KERNEL32(00000000), ref: 0050D498
                                                        • FindClose.KERNEL32(00000000), ref: 0050D4A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 2649000838-1173974218
                                                        • Opcode ID: ccc61b4c8a5be0ebad89d468aaf8bfd32f5e4ebb76cffd9342b8b1d9989d1847
                                                        • Instruction ID: b4a4223ccaf4ea58203825c484c0844e817420e42749576c89b964cd20a5c1f5
                                                        • Opcode Fuzzy Hash: ccc61b4c8a5be0ebad89d468aaf8bfd32f5e4ebb76cffd9342b8b1d9989d1847
                                                        • Instruction Fuzzy Hash: 7C3170710083419BC700EF65D8518AFBBA8BFA6344F444E1EF4D153191EB78AA0DD767
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: __floor_pentium4
                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                        • API String ID: 4168288129-2761157908
                                                        • Opcode ID: c49cb63f869c752b3098f1836461e243be96fb2904df67ead1f106f69cf1a899
                                                        • Instruction ID: cdc132c755d49c1306998caf7065d1c2d2f70f6d2cfc2a01a624daef1b612d6d
                                                        • Opcode Fuzzy Hash: c49cb63f869c752b3098f1836461e243be96fb2904df67ead1f106f69cf1a899
                                                        • Instruction Fuzzy Hash: 31C26771E086288BDB35DE299D507EAB7B5EB49304F1441EBD80EE7340E778AE858F44
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 005164DC
                                                        • CoInitialize.OLE32(00000000), ref: 00516639
                                                        • CoCreateInstance.OLE32(0053FCF8,00000000,00000001,0053FB68,?), ref: 00516650
                                                        • CoUninitialize.OLE32 ref: 005168D4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 886957087-24824748
                                                        • Opcode ID: 06b10d2af6657a15ce49ba715293889db8e1fccd44dfaca004979935b4e6f5e6
                                                        • Instruction ID: 2f1f7a9514666614156062f1645bb922239da8cdb9ff744ac5d58ece080bf01b
                                                        • Opcode Fuzzy Hash: 06b10d2af6657a15ce49ba715293889db8e1fccd44dfaca004979935b4e6f5e6
                                                        • Instruction Fuzzy Hash: F4D15A71508201AFD314EF25C881DABBBE9FFA5308F40496DF5958B291EB30ED45CB92
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,00000000), ref: 005222E8
                                                          • Part of subcall function 0051E4EC: GetWindowRect.USER32(?,?), ref: 0051E504
                                                        • GetDesktopWindow.USER32 ref: 00522312
                                                        • GetWindowRect.USER32(00000000), ref: 00522319
                                                        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00522355
                                                        • GetCursorPos.USER32(?), ref: 00522381
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 005223DF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                        • String ID:
                                                        • API String ID: 2387181109-0
                                                        • Opcode ID: e0f2fa5e5ff90e084d81886a74cbcb0aa4ffcec19a3bbacae1eff53b60d38768
                                                        • Instruction ID: bd757eab169b5dac153a992fdd3995a1f25abee6c76e9335770a894d0328ef20
                                                        • Opcode Fuzzy Hash: e0f2fa5e5ff90e084d81886a74cbcb0aa4ffcec19a3bbacae1eff53b60d38768
                                                        • Instruction Fuzzy Hash: 6031DE76504315AFDB20DF14D849B9BBBA9FF99310F000A19F985A7291DB34EA08CB92
                                                        APIs
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00519B78
                                                        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00519C8B
                                                          • Part of subcall function 00513874: GetInputState.USER32 ref: 005138CB
                                                          • Part of subcall function 00513874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00513966
                                                        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00519BA8
                                                        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00519C75
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                        • String ID: *.*
                                                        • API String ID: 1972594611-438819550
                                                        • Opcode ID: 59f444fc34d8eeb22e7c3e9749b98f18e69a6dcf3d000be2befdcd848bcc663f
                                                        • Instruction ID: a6d06a0e53d53b5bcdc91f72ac29c8d1a6c1f480621488fee5b7f410721bfeb9
                                                        • Opcode Fuzzy Hash: 59f444fc34d8eeb22e7c3e9749b98f18e69a6dcf3d000be2befdcd848bcc663f
                                                        • Instruction Fuzzy Hash: 62417F7190420A9FDF14DF64C895AEEBFB8FF15314F10405AE845A2291EB349E94CFA5
                                                        APIs
                                                          • Part of subcall function 004B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 004B9BB2
                                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 004B9A4E
                                                        • GetSysColor.USER32(0000000F), ref: 004B9B23
                                                        • SetBkColor.GDI32(?,00000000), ref: 004B9B36
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Color$LongProcWindow
                                                        • String ID:
                                                        • API String ID: 3131106179-0
                                                        • Opcode ID: 018a0f9dd5ef9714c8c2b3a68f5460c26888f8210a05cd7e57d2363abc251b67
                                                        • Instruction ID: d91b5736ca41ace9b8a38b737764e4bd77b145268dcd6cab7760bff43a74b843
                                                        • Opcode Fuzzy Hash: 018a0f9dd5ef9714c8c2b3a68f5460c26888f8210a05cd7e57d2363abc251b67
                                                        • Instruction Fuzzy Hash: 3FA11B70118448BEE724AA3D9C59DFB3A9DEB86350F14410BF302C6791CA6D9D42E27F
                                                        APIs
                                                          • Part of subcall function 0052304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0052307A
                                                          • Part of subcall function 0052304E: _wcslen.LIBCMT ref: 0052309B
                                                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0052185D
                                                        • WSAGetLastError.WSOCK32 ref: 00521884
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 005218DB
                                                        • WSAGetLastError.WSOCK32 ref: 005218E6
                                                        • closesocket.WSOCK32(00000000), ref: 00521915
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 1601658205-0
                                                        • Opcode ID: 72a3d62d0b9bbd9ba343578e6b8ae0242e0792af04dbdfac0412042106de832f
                                                        • Instruction ID: 55186609e13b0e60076ab04f247167d5b31260d007f3b5afaca61a351ab5c765
                                                        • Opcode Fuzzy Hash: 72a3d62d0b9bbd9ba343578e6b8ae0242e0792af04dbdfac0412042106de832f
                                                        • Instruction Fuzzy Hash: 5B51D371A00210AFDB10AF24D8C6F6A7BE5AF56718F08849DF9066F3C3C775AD418BA5
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                        • String ID:
                                                        • API String ID: 292994002-0
                                                        • Opcode ID: ff3c0dd6b06ac4b2b3d1b9b9a56368d58a85aed69ba6da6c1f20e426e48de062
                                                        • Instruction ID: c9771c53c8831e0ec17bbe10801efa030e1d6e3575600895881b8ec10e7aeda7
                                                        • Opcode Fuzzy Hash: ff3c0dd6b06ac4b2b3d1b9b9a56368d58a85aed69ba6da6c1f20e426e48de062
                                                        • Instruction Fuzzy Hash: 5221BF31740A059FD7208F2AC894B6A7FA5FF95315F189068E84A9B351CB71EC42CB98
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                        • API String ID: 0-1546025612
                                                        • Opcode ID: 6411e73b255ce6c73244056ec204adb5d3923dd98f14487e723fce295f1d49c3
                                                        • Instruction ID: 2817c5ce2aee7639e5b1e4e6fb773cf12f192f5d4764ec411525b83ea75eea5d
                                                        • Opcode Fuzzy Hash: 6411e73b255ce6c73244056ec204adb5d3923dd98f14487e723fce295f1d49c3
                                                        • Instruction Fuzzy Hash: C2A29C70E0025ACBDF24CF59C8407AEB7B1FB65315F2581ABD815A7381EB389D81CB99
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 005082AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: lstrlen
                                                        • String ID: ($tbV$|
                                                        • API String ID: 1659193697-2685671569
                                                        • Opcode ID: 912f5c5bad57ff274b8efc8f5d4b30ad38741a2a9daa55a82087fc31a353aa23
                                                        • Instruction ID: 8534dc0c33d3a34c8ee8762fd4a5c2bce8912e42e3f8bf9df5e8aeceaa320855
                                                        • Opcode Fuzzy Hash: 912f5c5bad57ff274b8efc8f5d4b30ad38741a2a9daa55a82087fc31a353aa23
                                                        • Instruction Fuzzy Hash: 3B322774A006059FCB28CF19C481EAABBF0FF48710B15C96EE59ADB3A1DB70E941CB44
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0052A6AC
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0052A6BA
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 0052A79C
                                                        • CloseHandle.KERNEL32(00000000), ref: 0052A7AB
                                                          • Part of subcall function 004BCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,004E3303,?), ref: 004BCE8A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                        • String ID:
                                                        • API String ID: 1991900642-0
                                                        • Opcode ID: 453bef742bd216f16d4fb76ec7eef1dd8134294fb75045eb5e2eff86b74868fb
                                                        • Instruction ID: dfe1933f9c9d653597d00918e19aeb3720d73a46dd31cc78c327e17eed343ac5
                                                        • Opcode Fuzzy Hash: 453bef742bd216f16d4fb76ec7eef1dd8134294fb75045eb5e2eff86b74868fb
                                                        • Instruction Fuzzy Hash: F051B0715083109FD310EF25C886E6BBBE8FF9A748F00491EF58597291EB34E904CBA6
                                                        APIs
                                                        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0050AAAC
                                                        • SetKeyboardState.USER32(00000080), ref: 0050AAC8
                                                        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0050AB36
                                                        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0050AB88
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: cae79d19c3bee768cddbcf9ba9aaf4178a563a04f0dcb8bb622f70da448db790
                                                        • Instruction ID: 89c4bde00f29211ea6cc2aabe4ee1c47ab58a0107e4f8451e6a1096b1372c5db
                                                        • Opcode Fuzzy Hash: cae79d19c3bee768cddbcf9ba9aaf4178a563a04f0dcb8bb622f70da448db790
                                                        • Instruction Fuzzy Hash: 29311431A40348AEFF358B68CC09BFE7FAABB84310F08421AF081961D1D774C985D762
                                                        APIs
                                                        • _free.LIBCMT ref: 004DBB7F
                                                          • Part of subcall function 004D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004DD7D1,00000000,00000000,00000000,00000000,?,004DD7F8,00000000,00000007,00000000,?,004DDBF5,00000000), ref: 004D29DE
                                                          • Part of subcall function 004D29C8: GetLastError.KERNEL32(00000000,?,004DD7D1,00000000,00000000,00000000,00000000,?,004DD7F8,00000000,00000007,00000000,?,004DDBF5,00000000,00000000), ref: 004D29F0
                                                        • GetTimeZoneInformation.KERNEL32 ref: 004DBB91
                                                        • WideCharToMultiByte.KERNEL32(00000000,?,0057121C,000000FF,?,0000003F,?,?), ref: 004DBC09
                                                        • WideCharToMultiByte.KERNEL32(00000000,?,00571270,000000FF,?,0000003F,?,?,?,0057121C,000000FF,?,0000003F,?,?), ref: 004DBC36
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                        • String ID:
                                                        • API String ID: 806657224-0
                                                        • Opcode ID: 9fa5ce953ed9029af32e5889da05320f21c60245e92e60502d910e9ca141aa70
                                                        • Instruction ID: 28d4d938775b1297e41507a6ce102a6150827b25956f9b3856d7c90f2eb50f07
                                                        • Opcode Fuzzy Hash: 9fa5ce953ed9029af32e5889da05320f21c60245e92e60502d910e9ca141aa70
                                                        • Instruction Fuzzy Hash: 6331DE70904205DFCB10DF6A9C9182EBBB8FF5571071582AFE014EB3A2D7349944EB98
                                                        APIs
                                                        • InternetReadFile.WININET(?,?,00000400,?), ref: 0051CE89
                                                        • GetLastError.KERNEL32(?,00000000), ref: 0051CEEA
                                                        • SetEvent.KERNEL32(?,?,00000000), ref: 0051CEFE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorEventFileInternetLastRead
                                                        • String ID:
                                                        • API String ID: 234945975-0
                                                        • Opcode ID: 2c824280f4bf3018e58633d6cec1da9f14f7e67e030abeaba58682500eef243a
                                                        • Instruction ID: 4dbc9a56528fbe51a9f3bcd613d6670732a999feae484b783ef941aa1c963ebb
                                                        • Opcode Fuzzy Hash: 2c824280f4bf3018e58633d6cec1da9f14f7e67e030abeaba58682500eef243a
                                                        • Instruction Fuzzy Hash: 2321ED71540305ABEB20DFA5C948BA7BFFCFB10308F10491EE542A2251E735EE898B94
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00515CC1
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00515D17
                                                        • FindClose.KERNEL32(?), ref: 00515D5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNext
                                                        • String ID:
                                                        • API String ID: 3541575487-0
                                                        • Opcode ID: 0e2f9ecc91c6b05f92b7ec27f3e4240d5d48e40eb24a8921337b7aa0780e3e34
                                                        • Instruction ID: b37cbb36d9c51bb47bfe0d19b6e3301aeb632543fec9c0662ebf0c86e7ebe0ad
                                                        • Opcode Fuzzy Hash: 0e2f9ecc91c6b05f92b7ec27f3e4240d5d48e40eb24a8921337b7aa0780e3e34
                                                        • Instruction Fuzzy Hash: 12519974604601DFD714CF28D484E9ABBE4FF8A318F14855EE99A8B3A1DB30ED84CB91
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32 ref: 004D271A
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004D2724
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 004D2731
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: 919f71bff13a998dba15f8905de480b2515cf90fcbaa09f32cba81747506e1f8
                                                        • Instruction ID: 5f71f5e34660db696bc24329952efa35b5148cd8c4fa803fe7704bc08e05ec42
                                                        • Opcode Fuzzy Hash: 919f71bff13a998dba15f8905de480b2515cf90fcbaa09f32cba81747506e1f8
                                                        • Instruction Fuzzy Hash: 1931D77590121CABCB61DF65DD88B9DBBB8AF18310F5041DAE81CA7260E7749F858F44
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 005151DA
                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00515238
                                                        • SetErrorMode.KERNEL32(00000000), ref: 005152A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DiskFreeSpace
                                                        • String ID:
                                                        • API String ID: 1682464887-0
                                                        • Opcode ID: bc6c47e7460973885c9abd85024b03ec729932e0a681c891031e669fe0c1f9ac
                                                        • Instruction ID: e5b9b63d826aef8f29a414a7cf7af2aa40d5f4641c6aaba6dade43356c606b99
                                                        • Opcode Fuzzy Hash: bc6c47e7460973885c9abd85024b03ec729932e0a681c891031e669fe0c1f9ac
                                                        • Instruction Fuzzy Hash: 0B313E75A00618DFDB00DF55D884EADBBB4FF59318F448099E805AB3A2DB35E859CB90
                                                        APIs
                                                          • Part of subcall function 004BFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 004C0668
                                                          • Part of subcall function 004BFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 004C0685
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0050170D
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0050173A
                                                        • GetLastError.KERNEL32 ref: 0050174A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                        • String ID:
                                                        • API String ID: 577356006-0
                                                        • Opcode ID: e099522c7b2f4f5eb8d5a3631b4efc467a9471dc3f418bab757732df11b43003
                                                        • Instruction ID: abfe1b3a0ada58ef57129eb14856480f0946b4939308ba4dbb0c43b413242428
                                                        • Opcode Fuzzy Hash: e099522c7b2f4f5eb8d5a3631b4efc467a9471dc3f418bab757732df11b43003
                                                        • Instruction Fuzzy Hash: 47119EB2504704AFD718AF54DC86DAEBBBDFB44754B20852EE05657281EB70FC458B24
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0050D608
                                                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0050D645
                                                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0050D650
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CloseControlCreateDeviceFileHandle
                                                        • String ID:
                                                        • API String ID: 33631002-0
                                                        • Opcode ID: 0dc02479fa967e961b0a0b6fe64ba5ce48fb94a96edcf6858857cc111086ad70
                                                        • Instruction ID: 6be9b52cdb727b6a026a37596be846937adc4520c109e04d8ebe5f76e2687f24
                                                        • Opcode Fuzzy Hash: 0dc02479fa967e961b0a0b6fe64ba5ce48fb94a96edcf6858857cc111086ad70
                                                        • Instruction Fuzzy Hash: 73117C75E01228BBDB108F949C44FAFBFBCEB45B50F108111F904E7290C2704A059BA1
                                                        APIs
                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0050168C
                                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 005016A1
                                                        • FreeSid.ADVAPI32(?), ref: 005016B1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                        • String ID:
                                                        • API String ID: 3429775523-0
                                                        • Opcode ID: 8d396450ce08f07dd52392a91b37aaff9a1f47553d3075a01aad7fecf38f8bdb
                                                        • Instruction ID: 9ed7fb4151037154a0b34a1b796f4bf700871f0bd0aeea5172afe6a55d87f3ae
                                                        • Opcode Fuzzy Hash: 8d396450ce08f07dd52392a91b37aaff9a1f47553d3075a01aad7fecf38f8bdb
                                                        • Instruction Fuzzy Hash: C2F0F47195030DFBDB00DFE49D89AAEBBBCFB08704F504565E501E2281E774AA489B54
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(004D28E9,?,004C4CBE,004D28E9,005688B8,0000000C,004C4E15,004D28E9,00000002,00000000,?,004D28E9), ref: 004C4D09
                                                        • TerminateProcess.KERNEL32(00000000,?,004C4CBE,004D28E9,005688B8,0000000C,004C4E15,004D28E9,00000002,00000000,?,004D28E9), ref: 004C4D10
                                                        • ExitProcess.KERNEL32 ref: 004C4D22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: 8ecf1b22b5ccf821d0318d2adddbd69bf33cdf3ec1e4cce1ba2a9446ba1daacb
                                                        • Instruction ID: a6818c641dd7cb799aadae6e8d994d15e70c6f69a620edea9be4dee0dd738047
                                                        • Opcode Fuzzy Hash: 8ecf1b22b5ccf821d0318d2adddbd69bf33cdf3ec1e4cce1ba2a9446ba1daacb
                                                        • Instruction Fuzzy Hash: E2E04635000108ABCF61BF20DE1AF893F29EB91795B004419FC069B322CB39DD42EB84
                                                        APIs
                                                        • GetUserNameW.ADVAPI32(?,?), ref: 004FD28C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID: X64
                                                        • API String ID: 2645101109-893830106
                                                        • Opcode ID: 1f8d784313d69e5045403ef42096dd439417c2a75496777282b789fbf42783b3
                                                        • Instruction ID: 0cd327201331b3caaa128eaa38ce9b1a8718b7ad65b8a7d4385c541b89586f08
                                                        • Opcode Fuzzy Hash: 1f8d784313d69e5045403ef42096dd439417c2a75496777282b789fbf42783b3
                                                        • Instruction Fuzzy Hash: CBD0C9B480111DEACB94DB90DC8CDDDB77CBB14305F100192F106E2100D73495499F21
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                        • Instruction ID: 0f6b3457ec738b1654c6b769f0af7a90a4acb776bc9a8fd75c6ab8763fc243b0
                                                        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                        • Instruction Fuzzy Hash: 70023B75E002199BDF54CFA9C980BAEBBF1EF49314F25816ED819E7380D735AE418B84
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Variable is not of type 'Object'.$p#W
                                                        • API String ID: 0-2765910906
                                                        • Opcode ID: 395ee195768c35b37114ca388b72696adb221d092059f658d1d6b1744738f5d8
                                                        • Instruction ID: 459a324063ecda1f1c379fbe92a7169e6c27918e48f2be9c4a14128d90452134
                                                        • Opcode Fuzzy Hash: 395ee195768c35b37114ca388b72696adb221d092059f658d1d6b1744738f5d8
                                                        • Instruction Fuzzy Hash: 52327A70900218DFDF14DF90C984AFEB7B5BF66308F14405AE906AB382D739AD46CB69
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00516918
                                                        • FindClose.KERNEL32(00000000), ref: 00516961
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 28764e77498c21e0444403f70b1008c461aa25b671568bc2b5dc75a290384eea
                                                        • Instruction ID: b6d0960201642d0e68b297940740aadf9ee4d5979641b5eef126cdbe86ec2a29
                                                        • Opcode Fuzzy Hash: 28764e77498c21e0444403f70b1008c461aa25b671568bc2b5dc75a290384eea
                                                        • Instruction Fuzzy Hash: A6117C356042109FD710DF2AD884A16BBE5FF85328F14C69EF8698B6A2C734EC45CB91
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00524891,?,?,00000035,?), ref: 005137E4
                                                        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00524891,?,?,00000035,?), ref: 005137F4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatLastMessage
                                                        • String ID:
                                                        • API String ID: 3479602957-0
                                                        • Opcode ID: d2590384f33ccb9c84b0f19ccbcd89b3720432e06c7a57806a8a823e23903dfc
                                                        • Instruction ID: 45db2f7295798ae2df590e919f1072f92c88585f7848f7d1cfcc649c1dd50980
                                                        • Opcode Fuzzy Hash: d2590384f33ccb9c84b0f19ccbcd89b3720432e06c7a57806a8a823e23903dfc
                                                        • Instruction Fuzzy Hash: AAF0EC716043142AE71057664C4DFDB3E5DEFC5765F000575F509E22D1D9609D48C7B0
                                                        APIs
                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0050B25D
                                                        • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 0050B270
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: InputSendkeybd_event
                                                        • String ID:
                                                        • API String ID: 3536248340-0
                                                        • Opcode ID: 3007cc89c21c96612a080841df259811ce50949ae3222dd9b4747409e024e4e1
                                                        • Instruction ID: 599f846481cc4be24e857103a0589defafb873470de58bc2779e2eb617904c32
                                                        • Opcode Fuzzy Hash: 3007cc89c21c96612a080841df259811ce50949ae3222dd9b4747409e024e4e1
                                                        • Instruction Fuzzy Hash: 44F01D7580424EABEB059FA0C805BAE7FB4FF14305F008409F955A5191C37986159F94
                                                        APIs
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,005011FC), ref: 005010D4
                                                        • CloseHandle.KERNEL32(?,?,005011FC), ref: 005010E9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                        • String ID:
                                                        • API String ID: 81990902-0
                                                        • Opcode ID: 3d499f46574b15849f9502bbe4040e3ebfd38c6f873e0663bf4ba7c146bf60d8
                                                        • Instruction ID: 822254bc999f679b31cbb8b3fbde040b5c774323980ba63ae5b18585daa4d17e
                                                        • Opcode Fuzzy Hash: 3d499f46574b15849f9502bbe4040e3ebfd38c6f873e0663bf4ba7c146bf60d8
                                                        • Instruction Fuzzy Hash: 04E0BF72014610AFE7252B51FC09EB77BE9EB04314B14882EF5A6905B1DB62ACA4EB64
                                                        APIs
                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004D6766,?,?,00000008,?,?,004DFEFE,00000000), ref: 004D6998
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 3997070919-0
                                                        • Opcode ID: 664dc38948e42dd1cf2f16e9cb65e04d0e37bf727c8a3e0d1911d6cd5b75415e
                                                        • Instruction ID: d852bbef5695602df3ffee58f933a11d8a4d54cdf03a9f892ca8c3181c6e8adc
                                                        • Opcode Fuzzy Hash: 664dc38948e42dd1cf2f16e9cb65e04d0e37bf727c8a3e0d1911d6cd5b75415e
                                                        • Instruction Fuzzy Hash: 97B16D716106089FD714CF28C4A6B657BE0FF05364F26869AE8D9CF3A1C339D982CB44
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3916222277
                                                        • Opcode ID: e576d6a7398f3fe0871404b7840f7ae5e02a2e74d19610b5092ddbee21a826a7
                                                        • Instruction ID: d6fae5a93a168a83799665ab2d55ec5063b10c8cd42b686341b2ed0fd2d3c7c9
                                                        • Opcode Fuzzy Hash: e576d6a7398f3fe0871404b7840f7ae5e02a2e74d19610b5092ddbee21a826a7
                                                        • Instruction Fuzzy Hash: 881250719002299BDB14CF58C8806FEB7F5FF48710F14819AE949EB251EB749E81CFA5
                                                        APIs
                                                        • BlockInput.USER32(00000001), ref: 0051EABD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: BlockInput
                                                        • String ID:
                                                        • API String ID: 3456056419-0
                                                        • Opcode ID: 26f7a71e928d0afd3a0575c383ccd07714998652118c7c5e4936ea839b9537ba
                                                        • Instruction ID: 6ceb894c89597592fed61042e1c9570b97bff656ffa23bcad3001a54e3673540
                                                        • Opcode Fuzzy Hash: 26f7a71e928d0afd3a0575c383ccd07714998652118c7c5e4936ea839b9537ba
                                                        • Instruction Fuzzy Hash: 0CE012312002049FD710DF5AD445D9ABBD9BF69764F00841AFC45D7351D674A8408B91
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,004C03EE), ref: 004C09DA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 161d99b96832c4661a2902e7758a2d1cbc4f46fbf39c4c42a56e12de4479ed7a
                                                        • Instruction ID: 1546f55995e969c3fa3c6851baf002323866d3f730423a74aa9e4f0852b44a59
                                                        • Opcode Fuzzy Hash: 161d99b96832c4661a2902e7758a2d1cbc4f46fbf39c4c42a56e12de4479ed7a
                                                        • Instruction Fuzzy Hash:
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                        • Instruction ID: e3d6939d9b3b9767a182e95562f4611ec756e338f48bd41e16d2ee9c47a87be3
                                                        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                        • Instruction Fuzzy Hash: F5517EAD60C60557EBF4662A4459FBF27959B12344F18050FDA82C7382C62DDE02DF7E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0&W
                                                        • API String ID: 0-3992681457
                                                        • Opcode ID: af80b4b9f378895bd21e2bd93cf6f7df0e7a15d17078d4a7d7c17ebaf647048e
                                                        • Instruction ID: c437a13a568acefba01f0ee8e1a7847479dc3f12103a5a5223a36a76fd737bde
                                                        • Opcode Fuzzy Hash: af80b4b9f378895bd21e2bd93cf6f7df0e7a15d17078d4a7d7c17ebaf647048e
                                                        • Instruction Fuzzy Hash: EE21D5322206118BD728CF79C8276BA77E5B764310F14862EE4A7C33D1DE39A944DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f4e1f9140c9d3d65d9c8893c9fda3506940c1e307d3503493e85017a2fedd5d9
                                                        • Instruction ID: 74ffd857413f4321bf1d36a36593dce5ef1b65df07a81d940ab391b940514b53
                                                        • Opcode Fuzzy Hash: f4e1f9140c9d3d65d9c8893c9fda3506940c1e307d3503493e85017a2fedd5d9
                                                        • Instruction Fuzzy Hash: 57322226D29F114DD7239634D832336A249AFB73C9F55C737F81AB5EAAEB28C4835101
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 86dcc5b858809cf2c586eab4df4f705001fbb93cf49afe545a38dcdad73ce92b
                                                        • Instruction ID: 25016c22b3c1a3cbb8344f99e124f06dc827120f1785d476888a588567d10718
                                                        • Opcode Fuzzy Hash: 86dcc5b858809cf2c586eab4df4f705001fbb93cf49afe545a38dcdad73ce92b
                                                        • Instruction Fuzzy Hash: 1A32F631A0414D8BDF28CA29C6D46BF7BB1EB45300F28856BD659CB391D23CDD82DB99
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 17f958cea7b142860917e0bce7bbb6ae3744377e96791ebe3c9dd40633cf85d6
                                                        • Instruction ID: 8992fecb0e192a75d1016f1f59f47273b39c618a978cbc943012500794ab9113
                                                        • Opcode Fuzzy Hash: 17f958cea7b142860917e0bce7bbb6ae3744377e96791ebe3c9dd40633cf85d6
                                                        • Instruction Fuzzy Hash: 3622D1B0A00609EFDF14CF65C841AAEB3B5FF55308F10452AE816A7391E739ED15CB69
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 62c3fb3e92da2d094283285b67a7b4a9c8327463100d4facc4ec30d2aefced43
                                                        • Instruction ID: 8b9714f7b7f9a356966f5f39d87041d0ccdad5b90c5fa68ef3ee1815e0dd5cad
                                                        • Opcode Fuzzy Hash: 62c3fb3e92da2d094283285b67a7b4a9c8327463100d4facc4ec30d2aefced43
                                                        • Instruction Fuzzy Hash: D602D7B1E00105EFCB04DF66D881AAEB7B5FF54304F10856AE8069B391E739EE15CB99
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                        • Instruction ID: 5ae4e298faa7a51da84f9ada5f2daf5f6da7ee8984155c43d541b5dee148bd5d
                                                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                        • Instruction Fuzzy Hash: 5A91BA7A1080A349D7A9423D8434A3FFFE15A533A1319079FE4F3CA2E2FE28D565D624
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                        • Instruction ID: 6d86691e3be10487ea07ff2f31d6fa3e6d0151a1ba52e4fff087744dac336b90
                                                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                        • Instruction Fuzzy Hash: 3891DB7A2090E309DB9D4279847493FFFE14A933A1319079FD4F2CA2E2FD28D965D624
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aa833f34d40d8c120fe9f7b5d0e85958607de0cb64e272b99499ef34e2647297
                                                        • Instruction ID: 78195b7a578e528b980c8eaba446c57ae51459f9eef499fc0dff9e406b3ecc91
                                                        • Opcode Fuzzy Hash: aa833f34d40d8c120fe9f7b5d0e85958607de0cb64e272b99499ef34e2647297
                                                        • Instruction Fuzzy Hash: D761247D20870567DBF49A288995FBF3394DB41718F14091FE942DB382E61EAE428F1E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fe631b7e0f07c919e5a89479cc61a72c1b9d5943cd1bccb771277419c304ac99
                                                        • Instruction ID: fcbd3f9de3365685df68d2d0234dd65bf4d4c5dcc07767ccd908b3755671a569
                                                        • Opcode Fuzzy Hash: fe631b7e0f07c919e5a89479cc61a72c1b9d5943cd1bccb771277419c304ac99
                                                        • Instruction Fuzzy Hash: 17617B7E20870967DAF84A285892FBF2394AF41744F10495FF943CB381DA1EAD42CE5E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                        • Instruction ID: 0fbb1e849c7f5d8d96e52fac2450b53df482d59758bfb76ed37f1298939c7cc5
                                                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                        • Instruction Fuzzy Hash: C481987A50D0A309DB9D4239857493FFFE15A933A131A079FD4F2CA2E3ED28C554D624
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1689522511.000000000151A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                        • Instruction ID: 0cb0a490474921426af3117e568a69fb22b630c161ac1cb937ff0bf4e7693b8c
                                                        • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                        • Instruction Fuzzy Hash: 5141D371D1051CEBDF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB40
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1689522511.000000000151A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                        • Instruction ID: 9fc08201f442f83aa0e33ec5a1160c9c74c5ac67e924b755a013412836db20dc
                                                        • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                        • Instruction Fuzzy Hash: 61019278A00109EFDB49DF98C5949AEF7F5FF48310F208999E809AB305D730AE41DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1689522511.000000000151A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                        • Instruction ID: 964a9539437cb6fcf2b6c1c3add94a4566932bc5df9ae80f962d29afa729f97f
                                                        • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                        • Instruction Fuzzy Hash: EB01A478A00209EFDB45DF98C5949AEF7F5FF48310F208599D809AB705D730AE41DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1689522511.000000000151A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0151A000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_151a000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                        • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                        • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                        • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00522B30
                                                        • DeleteObject.GDI32(00000000), ref: 00522B43
                                                        • DestroyWindow.USER32 ref: 00522B52
                                                        • GetDesktopWindow.USER32 ref: 00522B6D
                                                        • GetWindowRect.USER32(00000000), ref: 00522B74
                                                        • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00522CA3
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00522CB1
                                                        • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00522CF8
                                                        • GetClientRect.USER32(00000000,?), ref: 00522D04
                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00522D40
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00522D62
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00522D75
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00522D80
                                                        • GlobalLock.KERNEL32(00000000), ref: 00522D89
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00522D98
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00522DA1
                                                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00522DA8
                                                        • GlobalFree.KERNEL32(00000000), ref: 00522DB3
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00522DC5
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,0053FC38,00000000), ref: 00522DDB
                                                        • GlobalFree.KERNEL32(00000000), ref: 00522DEB
                                                        • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00522E11
                                                        • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00522E30
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00522E52
                                                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0052303F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                        • API String ID: 2211948467-2373415609
                                                        • Opcode ID: 8f24f629e9f6a66c0f3bb2b0689c66fbc988989cc235741da69a245e4537f77c
                                                        • Instruction ID: 5249657f1f41f16ddd515ee2408fc389d9f34fe4a4ca81847d43dc5c00b8ae34
                                                        • Opcode Fuzzy Hash: 8f24f629e9f6a66c0f3bb2b0689c66fbc988989cc235741da69a245e4537f77c
                                                        • Instruction Fuzzy Hash: 45029A75900214AFDB14DFA8DC89EAE7FB9FF59314F048518F915AB2A1CB34AD04DB60
                                                        APIs
                                                        • SetTextColor.GDI32(?,00000000), ref: 0053712F
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00537160
                                                        • GetSysColor.USER32(0000000F), ref: 0053716C
                                                        • SetBkColor.GDI32(?,000000FF), ref: 00537186
                                                        • SelectObject.GDI32(?,?), ref: 00537195
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 005371C0
                                                        • GetSysColor.USER32(00000010), ref: 005371C8
                                                        • CreateSolidBrush.GDI32(00000000), ref: 005371CF
                                                        • FrameRect.USER32(?,?,00000000), ref: 005371DE
                                                        • DeleteObject.GDI32(00000000), ref: 005371E5
                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00537230
                                                        • FillRect.USER32(?,?,?), ref: 00537262
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00537284
                                                          • Part of subcall function 005373E8: GetSysColor.USER32(00000012), ref: 00537421
                                                          • Part of subcall function 005373E8: SetTextColor.GDI32(?,?), ref: 00537425
                                                          • Part of subcall function 005373E8: GetSysColorBrush.USER32(0000000F), ref: 0053743B
                                                          • Part of subcall function 005373E8: GetSysColor.USER32(0000000F), ref: 00537446
                                                          • Part of subcall function 005373E8: GetSysColor.USER32(00000011), ref: 00537463
                                                          • Part of subcall function 005373E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00537471
                                                          • Part of subcall function 005373E8: SelectObject.GDI32(?,00000000), ref: 00537482
                                                          • Part of subcall function 005373E8: SetBkColor.GDI32(?,00000000), ref: 0053748B
                                                          • Part of subcall function 005373E8: SelectObject.GDI32(?,?), ref: 00537498
                                                          • Part of subcall function 005373E8: InflateRect.USER32(?,000000FF,000000FF), ref: 005374B7
                                                          • Part of subcall function 005373E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 005374CE
                                                          • Part of subcall function 005373E8: GetWindowLongW.USER32(00000000,000000F0), ref: 005374DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                        • String ID:
                                                        • API String ID: 4124339563-0
                                                        • Opcode ID: c5adac52d5989b2b3b95dcc05a547052b4d0f58126b1f2770178395bda3abcc0
                                                        • Instruction ID: dd878f62cda56a43ade082326a198b6e51f73a8f7fc5b19f971303ae1366e633
                                                        • Opcode Fuzzy Hash: c5adac52d5989b2b3b95dcc05a547052b4d0f58126b1f2770178395bda3abcc0
                                                        • Instruction Fuzzy Hash: DBA1B072408305AFDB109F64DC48E6B7FA9FF9C321F100A19F962A62E1D771E948EB51
                                                        APIs
                                                        • DestroyWindow.USER32(?,?), ref: 004B8E14
                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 004F6AC5
                                                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 004F6AFE
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004F6F43
                                                          • Part of subcall function 004B8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,004B8BE8,?,00000000,?,?,?,?,004B8BBA,00000000,?), ref: 004B8FC5
                                                        • SendMessageW.USER32(?,00001053), ref: 004F6F7F
                                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 004F6F96
                                                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 004F6FAC
                                                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 004F6FB7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                        • String ID: 0
                                                        • API String ID: 2760611726-4108050209
                                                        • Opcode ID: 72a3399895cec08877da8046dbf89ed201943b244517bcc0e30ee172b11beebf
                                                        • Instruction ID: 745975ebf5d0a1c33d07c4bb5cadaaad73339660b0dd4365649610b591dfad91
                                                        • Opcode Fuzzy Hash: 72a3399895cec08877da8046dbf89ed201943b244517bcc0e30ee172b11beebf
                                                        • Instruction Fuzzy Hash: BB12DE30200205DFDB25DF18D844BBABBE5FB54300F15406EE689CB261CB39EC96EB69
                                                        APIs
                                                        • DestroyWindow.USER32(00000000), ref: 0052273E
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0052286A
                                                        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 005228A9
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 005228B9
                                                        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00522900
                                                        • GetClientRect.USER32(00000000,?), ref: 0052290C
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00522955
                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00522964
                                                        • GetStockObject.GDI32(00000011), ref: 00522974
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00522978
                                                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00522988
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00522991
                                                        • DeleteDC.GDI32(00000000), ref: 0052299A
                                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 005229C6
                                                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 005229DD
                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00522A1D
                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00522A31
                                                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00522A42
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00522A77
                                                        • GetStockObject.GDI32(00000011), ref: 00522A82
                                                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00522A8D
                                                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00522A97
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                        • API String ID: 2910397461-517079104
                                                        • Opcode ID: 77faa6711ad153210878fa3e36355c7d3f65fdb9648e05ad563d29321df4b07e
                                                        • Instruction ID: dcf77e92ede271818ccef2ccf7b8b505ae1e90235797529534c92d4295d27815
                                                        • Opcode Fuzzy Hash: 77faa6711ad153210878fa3e36355c7d3f65fdb9648e05ad563d29321df4b07e
                                                        • Instruction Fuzzy Hash: D2B18B75A00215BFEB10DFA8DC8AEAE7BA9FB19714F008519F914E7290C774ED40DBA4
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00514AED
                                                        • GetDriveTypeW.KERNEL32(?,0053CB68,?,\\.\,0053CC08), ref: 00514BCA
                                                        • SetErrorMode.KERNEL32(00000000,0053CB68,?,\\.\,0053CC08), ref: 00514D36
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                        • API String ID: 2907320926-4222207086
                                                        • Opcode ID: 5ea677a5767b09a3f5b320f0a7498bdc2b782888c7d60ac73e58b55589547d5e
                                                        • Instruction ID: e902b35ef6085bbed35554e4808c65bc6719ffd4a27ac5d1d3aab3b37d994242
                                                        • Opcode Fuzzy Hash: 5ea677a5767b09a3f5b320f0a7498bdc2b782888c7d60ac73e58b55589547d5e
                                                        • Instruction Fuzzy Hash: F261D330705106EBEB04DF24CA81DECBFB1BB55748B24981AF806AB691DB39DD81DF81
                                                        APIs
                                                        • GetSysColor.USER32(00000012), ref: 00537421
                                                        • SetTextColor.GDI32(?,?), ref: 00537425
                                                        • GetSysColorBrush.USER32(0000000F), ref: 0053743B
                                                        • GetSysColor.USER32(0000000F), ref: 00537446
                                                        • CreateSolidBrush.GDI32(?), ref: 0053744B
                                                        • GetSysColor.USER32(00000011), ref: 00537463
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00537471
                                                        • SelectObject.GDI32(?,00000000), ref: 00537482
                                                        • SetBkColor.GDI32(?,00000000), ref: 0053748B
                                                        • SelectObject.GDI32(?,?), ref: 00537498
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 005374B7
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 005374CE
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 005374DB
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0053752A
                                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00537554
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00537572
                                                        • DrawFocusRect.USER32(?,?), ref: 0053757D
                                                        • GetSysColor.USER32(00000011), ref: 0053758E
                                                        • SetTextColor.GDI32(?,00000000), ref: 00537596
                                                        • DrawTextW.USER32(?,005370F5,000000FF,?,00000000), ref: 005375A8
                                                        • SelectObject.GDI32(?,?), ref: 005375BF
                                                        • DeleteObject.GDI32(?), ref: 005375CA
                                                        • SelectObject.GDI32(?,?), ref: 005375D0
                                                        • DeleteObject.GDI32(?), ref: 005375D5
                                                        • SetTextColor.GDI32(?,?), ref: 005375DB
                                                        • SetBkColor.GDI32(?,?), ref: 005375E5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 1996641542-0
                                                        • Opcode ID: f9b62472b38f789074412b49bfc609545119b35398872f50b1fca859e522ed3c
                                                        • Instruction ID: b169383f824b48c272e0f599a4d6653fac25964333cf632746c05930080c40ca
                                                        • Opcode Fuzzy Hash: f9b62472b38f789074412b49bfc609545119b35398872f50b1fca859e522ed3c
                                                        • Instruction Fuzzy Hash: 94616A72D00218AFDF119FA4DC49AEEBFB9FB08320F104115F915BB2A1D775A940EBA0
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00531128
                                                        • GetDesktopWindow.USER32 ref: 0053113D
                                                        • GetWindowRect.USER32(00000000), ref: 00531144
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00531199
                                                        • DestroyWindow.USER32(?), ref: 005311B9
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 005311ED
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0053120B
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0053121D
                                                        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00531232
                                                        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00531245
                                                        • IsWindowVisible.USER32(00000000), ref: 005312A1
                                                        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 005312BC
                                                        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 005312D0
                                                        • GetWindowRect.USER32(00000000,?), ref: 005312E8
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 0053130E
                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 00531328
                                                        • CopyRect.USER32(?,?), ref: 0053133F
                                                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 005313AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                        • String ID: ($0$tooltips_class32
                                                        • API String ID: 698492251-4156429822
                                                        • Opcode ID: 97396658040edea01c0a86af64b117a53e114bc2ae235c09496bc23841a470e2
                                                        • Instruction ID: 724a01eaea2afcd2699cb16361c9271c5dea4521fdfd1a81f9ef4df281371a4c
                                                        • Opcode Fuzzy Hash: 97396658040edea01c0a86af64b117a53e114bc2ae235c09496bc23841a470e2
                                                        • Instruction Fuzzy Hash: 8BB19C71608741AFD704DF65C889B6ABFE4FF94344F00891DF999AB2A2CB31E844CB95
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004B8968
                                                        • GetSystemMetrics.USER32(00000007), ref: 004B8970
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004B899B
                                                        • GetSystemMetrics.USER32(00000008), ref: 004B89A3
                                                        • GetSystemMetrics.USER32(00000004), ref: 004B89C8
                                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 004B89E5
                                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 004B89F5
                                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 004B8A28
                                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 004B8A3C
                                                        • GetClientRect.USER32(00000000,000000FF), ref: 004B8A5A
                                                        • GetStockObject.GDI32(00000011), ref: 004B8A76
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 004B8A81
                                                          • Part of subcall function 004B912D: GetCursorPos.USER32(?), ref: 004B9141
                                                          • Part of subcall function 004B912D: ScreenToClient.USER32(00000000,?), ref: 004B915E
                                                          • Part of subcall function 004B912D: GetAsyncKeyState.USER32(00000001), ref: 004B9183
                                                          • Part of subcall function 004B912D: GetAsyncKeyState.USER32(00000002), ref: 004B919D
                                                        • SetTimer.USER32(00000000,00000000,00000028,004B90FC), ref: 004B8AA8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                        • String ID: AutoIt v3 GUI
                                                        • API String ID: 1458621304-248962490
                                                        • Opcode ID: bda71adc8dd9781046ff4ed60be23a8f6dbf500b2f3da998568e315287feed56
                                                        • Instruction ID: cbd33743e1294167c0a1177b1846365cd7aa3733ef7384a79ad81ad54159e525
                                                        • Opcode Fuzzy Hash: bda71adc8dd9781046ff4ed60be23a8f6dbf500b2f3da998568e315287feed56
                                                        • Instruction Fuzzy Hash: 0AB17D71A002099FDF14DF68DC45BEE3BB5FB58314F11412AFA15A7290DB38A841DB69
                                                        APIs
                                                          • Part of subcall function 005010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00501114
                                                          • Part of subcall function 005010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00500B9B,?,?,?), ref: 00501120
                                                          • Part of subcall function 005010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00500B9B,?,?,?), ref: 0050112F
                                                          • Part of subcall function 005010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00500B9B,?,?,?), ref: 00501136
                                                          • Part of subcall function 005010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0050114D
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00500DF5
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00500E29
                                                        • GetLengthSid.ADVAPI32(?), ref: 00500E40
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00500E7A
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00500E96
                                                        • GetLengthSid.ADVAPI32(?), ref: 00500EAD
                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00500EB5
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00500EBC
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00500EDD
                                                        • CopySid.ADVAPI32(00000000), ref: 00500EE4
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00500F13
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00500F35
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00500F47
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00500F6E
                                                        • HeapFree.KERNEL32(00000000), ref: 00500F75
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00500F7E
                                                        • HeapFree.KERNEL32(00000000), ref: 00500F85
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00500F8E
                                                        • HeapFree.KERNEL32(00000000), ref: 00500F95
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00500FA1
                                                        • HeapFree.KERNEL32(00000000), ref: 00500FA8
                                                          • Part of subcall function 00501193: GetProcessHeap.KERNEL32(00000008,00500BB1,?,00000000,?,00500BB1,?), ref: 005011A1
                                                          • Part of subcall function 00501193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00500BB1,?), ref: 005011A8
                                                          • Part of subcall function 00501193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00500BB1,?), ref: 005011B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                        • String ID:
                                                        • API String ID: 4175595110-0
                                                        • Opcode ID: 0f696d51267f52744d424f46055d5c84aecd0d18bb2410a38bce1a69989b7c49
                                                        • Instruction ID: 26db33245dffc7fd9dff152860cf82edc54c64e16085659871bd4a77d37b0c4e
                                                        • Opcode Fuzzy Hash: 0f696d51267f52744d424f46055d5c84aecd0d18bb2410a38bce1a69989b7c49
                                                        • Instruction Fuzzy Hash: 11716A7290020AABDF209FA4DC49FAEBFB8BF15301F144115FA59F62D1D7719A09EB60
                                                        APIs
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0052C4BD
                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,0053CC08,00000000,?,00000000,?,?), ref: 0052C544
                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0052C5A4
                                                        • _wcslen.LIBCMT ref: 0052C5F4
                                                        • _wcslen.LIBCMT ref: 0052C66F
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0052C6B2
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0052C7C1
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0052C84D
                                                        • RegCloseKey.ADVAPI32(?), ref: 0052C881
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0052C88E
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0052C960
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                        • API String ID: 9721498-966354055
                                                        • Opcode ID: adced34419380172bd999540ba7f6f5fd437427947cdade7db41cc848932b1ef
                                                        • Instruction ID: 102bad20c93d9f42010e7913f0f2e081b4d100f4192b31a37d6c566281fb453e
                                                        • Opcode Fuzzy Hash: adced34419380172bd999540ba7f6f5fd437427947cdade7db41cc848932b1ef
                                                        • Instruction Fuzzy Hash: E7128A356042109FDB14EF15D881A2EBBE5FF8A358F04885DF84A9B3A2DB35EC41CB85
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 005309C6
                                                        • _wcslen.LIBCMT ref: 00530A01
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00530A54
                                                        • _wcslen.LIBCMT ref: 00530A8A
                                                        • _wcslen.LIBCMT ref: 00530B06
                                                        • _wcslen.LIBCMT ref: 00530B81
                                                          • Part of subcall function 004BF9F2: _wcslen.LIBCMT ref: 004BF9FD
                                                          • Part of subcall function 00502BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00502BFA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$MessageSend$BuffCharUpper
                                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                        • API String ID: 1103490817-4258414348
                                                        • Opcode ID: ca9bf60866ca54c685a95009428ede3fc2d35c2791cf0ef8f8109d28d9fa88b0
                                                        • Instruction ID: cb596a032d1ed6079f2f7e01fc1a74076a3ee6601be88dce19f9272c26bc8ce4
                                                        • Opcode Fuzzy Hash: ca9bf60866ca54c685a95009428ede3fc2d35c2791cf0ef8f8109d28d9fa88b0
                                                        • Instruction Fuzzy Hash: 4FE1BC312083019FC714EF25C4A092EBBE1BF99358F14895DF89A9B7A2DB35ED45CB81
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                        • API String ID: 1256254125-909552448
                                                        • Opcode ID: 6594269f5cadb3615606484a010c34c2047d337a7467c14ce5b628455c43fb1e
                                                        • Instruction ID: 51db135594217cf182ea41d0560241290417646d725f55ceb43f4ba4435aa086
                                                        • Opcode Fuzzy Hash: 6594269f5cadb3615606484a010c34c2047d337a7467c14ce5b628455c43fb1e
                                                        • Instruction Fuzzy Hash: F071143260013A8BCB20DE3CED515BE3F91BF66798B540529F866A72C6E735CD4483A0
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 0053835A
                                                        • _wcslen.LIBCMT ref: 0053836E
                                                        • _wcslen.LIBCMT ref: 00538391
                                                        • _wcslen.LIBCMT ref: 005383B4
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 005383F2
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,0053361A,?), ref: 0053844E
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00538487
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 005384CA
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00538501
                                                        • FreeLibrary.KERNEL32(?), ref: 0053850D
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0053851D
                                                        • DestroyIcon.USER32(?), ref: 0053852C
                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00538549
                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00538555
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                        • String ID: .dll$.exe$.icl
                                                        • API String ID: 799131459-1154884017
                                                        • Opcode ID: 303a20ebc3be0b5881ef9c2c52bb478dab5dfddce4fa8bba774a2103f99fd0d7
                                                        • Instruction ID: afd26e824f22a1830e4c25a8294615ab2cafd26a1980ba79ebc36334266b364b
                                                        • Opcode Fuzzy Hash: 303a20ebc3be0b5881ef9c2c52bb478dab5dfddce4fa8bba774a2103f99fd0d7
                                                        • Instruction Fuzzy Hash: E561E071500315BEEB18DF64CC41FBE7BA8BB58715F10460AF815E61D1DB74A984D7A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 0-1645009161
                                                        • Opcode ID: 09cae2a9a3876ded573ec70e998b3fa69486404c91abcb42810e1cf1aae5455b
                                                        • Instruction ID: 30af7281d1f85cf86d6d2affa2b4eac3ff468ec2710e26f7510a42200545ee94
                                                        • Opcode Fuzzy Hash: 09cae2a9a3876ded573ec70e998b3fa69486404c91abcb42810e1cf1aae5455b
                                                        • Instruction Fuzzy Hash: DD81FB75A04205BBDB20AF61DC42FAF7B64BF25344F04402FF905AA292EB7CD911D7A9
                                                        APIs
                                                        • LoadIconW.USER32(00000063), ref: 00505A2E
                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00505A40
                                                        • SetWindowTextW.USER32(?,?), ref: 00505A57
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00505A6C
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00505A72
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00505A82
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00505A88
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00505AA9
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00505AC3
                                                        • GetWindowRect.USER32(?,?), ref: 00505ACC
                                                        • _wcslen.LIBCMT ref: 00505B33
                                                        • SetWindowTextW.USER32(?,?), ref: 00505B6F
                                                        • GetDesktopWindow.USER32 ref: 00505B75
                                                        • GetWindowRect.USER32(00000000), ref: 00505B7C
                                                        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00505BD3
                                                        • GetClientRect.USER32(?,?), ref: 00505BE0
                                                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 00505C05
                                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00505C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                        • String ID:
                                                        • API String ID: 895679908-0
                                                        • Opcode ID: 8e0dd68f6e33a0e2170fe8e439f95f6ba85e04015ee470c9c073b3e1d5d5387d
                                                        • Instruction ID: c06caa34b4d040b1ed287b17ba7ba8e890cd76c7075902817da225e2ca437bc1
                                                        • Opcode Fuzzy Hash: 8e0dd68f6e33a0e2170fe8e439f95f6ba85e04015ee470c9c073b3e1d5d5387d
                                                        • Instruction Fuzzy Hash: E1715D31900B09AFDB20DFA8CE46A6FBFF5FF48705F104918E542A26A0E775A944DF50
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[V
                                                        • API String ID: 176396367-1647748031
                                                        • Opcode ID: d5b140fa25ebacbd083fab9487ea69004aa0ebdcd9077948f1366488c5fcffe5
                                                        • Instruction ID: dadd515dc310f1e60b1152b748fcf42fd434be81e45ac083890d4249ef530c20
                                                        • Opcode Fuzzy Hash: d5b140fa25ebacbd083fab9487ea69004aa0ebdcd9077948f1366488c5fcffe5
                                                        • Instruction Fuzzy Hash: F0E1E632A00516ABCF289F78C851BEEBFB8BF54714F54851EE456B7290EB30AE45C790
                                                        APIs
                                                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 004C00C6
                                                          • Part of subcall function 004C00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0057070C,00000FA0,C6CCC03A,?,?,?,?,004E23B3,000000FF), ref: 004C011C
                                                          • Part of subcall function 004C00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,004E23B3,000000FF), ref: 004C0127
                                                          • Part of subcall function 004C00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,004E23B3,000000FF), ref: 004C0138
                                                          • Part of subcall function 004C00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 004C014E
                                                          • Part of subcall function 004C00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 004C015C
                                                          • Part of subcall function 004C00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 004C016A
                                                          • Part of subcall function 004C00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004C0195
                                                          • Part of subcall function 004C00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004C01A0
                                                        • ___scrt_fastfail.LIBCMT ref: 004C00E7
                                                          • Part of subcall function 004C00A3: __onexit.LIBCMT ref: 004C00A9
                                                        Strings
                                                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 004C0122
                                                        • InitializeConditionVariable, xrefs: 004C0148
                                                        • kernel32.dll, xrefs: 004C0133
                                                        • WakeAllConditionVariable, xrefs: 004C0162
                                                        • SleepConditionVariableCS, xrefs: 004C0154
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                        • API String ID: 66158676-1714406822
                                                        • Opcode ID: dbf21d34f3001d2a151b3bb90bccb96adea704dc4f819ba0f904a7c613597377
                                                        • Instruction ID: 6c2f82869dfdd4773386cbe2da34441dc5111753cd25663a1b715ad3bea129a1
                                                        • Opcode Fuzzy Hash: dbf21d34f3001d2a151b3bb90bccb96adea704dc4f819ba0f904a7c613597377
                                                        • Instruction Fuzzy Hash: EA21F536A44310EBD7505BA5BC09F6ABBE4EB14B51F04053FF805A2391DFA89804AB98
                                                        APIs
                                                        • CharLowerBuffW.USER32(00000000,00000000,0053CC08), ref: 00514527
                                                        • _wcslen.LIBCMT ref: 0051453B
                                                        • _wcslen.LIBCMT ref: 00514599
                                                        • _wcslen.LIBCMT ref: 005145F4
                                                        • _wcslen.LIBCMT ref: 0051463F
                                                        • _wcslen.LIBCMT ref: 005146A7
                                                          • Part of subcall function 004BF9F2: _wcslen.LIBCMT ref: 004BF9FD
                                                        • GetDriveTypeW.KERNEL32(?,00566BF0,00000061), ref: 00514743
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharDriveLowerType
                                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                        • API String ID: 2055661098-1000479233
                                                        • Opcode ID: e655525d194f47f4eb8b4dbc077235dfafc27c285e42595528dfae4cff78798c
                                                        • Instruction ID: a63713451305bb9b5e95bbcf04bf0a6a202a326ec4b41f88e9192dbae5ebc767
                                                        • Opcode Fuzzy Hash: e655525d194f47f4eb8b4dbc077235dfafc27c285e42595528dfae4cff78798c
                                                        • Instruction Fuzzy Hash: 43B12F716083029FD310DF28C890AAEBBE5FFA6768F50591DF096C7291D734D885CBA2
                                                        APIs
                                                          • Part of subcall function 004B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 004B9BB2
                                                        • DragQueryPoint.SHELL32(?,?), ref: 00539147
                                                          • Part of subcall function 00537674: ClientToScreen.USER32(?,?), ref: 0053769A
                                                          • Part of subcall function 00537674: GetWindowRect.USER32(?,?), ref: 00537710
                                                          • Part of subcall function 00537674: PtInRect.USER32(?,?,00538B89), ref: 00537720
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 005391B0
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 005391BB
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 005391DE
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00539225
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0053923E
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00539255
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00539277
                                                        • DragFinish.SHELL32(?), ref: 0053927E
                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00539371
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#W
                                                        • API String ID: 221274066-2236016650
                                                        • Opcode ID: ca085180430d7473952a7bb8fba63c39fa4f5e7015ca3461c1090a3fdf4522f0
                                                        • Instruction ID: eb63af51b2c89c38649d1db84080aa5daedd85e8153adf6a5547767f40404814
                                                        • Opcode Fuzzy Hash: ca085180430d7473952a7bb8fba63c39fa4f5e7015ca3461c1090a3fdf4522f0
                                                        • Instruction Fuzzy Hash: FE616671108301AFC701EF65DC85DABBFE8FBA9354F00091EF595962A0DB709A49CB56
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 0052B198
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0052B1B0
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0052B1D4
                                                        • _wcslen.LIBCMT ref: 0052B200
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0052B214
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0052B236
                                                        • _wcslen.LIBCMT ref: 0052B332
                                                          • Part of subcall function 005105A7: GetStdHandle.KERNEL32(000000F6), ref: 005105C6
                                                        • _wcslen.LIBCMT ref: 0052B34B
                                                        • _wcslen.LIBCMT ref: 0052B366
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0052B3B6
                                                        • GetLastError.KERNEL32(00000000), ref: 0052B407
                                                        • CloseHandle.KERNEL32(?), ref: 0052B439
                                                        • CloseHandle.KERNEL32(00000000), ref: 0052B44A
                                                        • CloseHandle.KERNEL32(00000000), ref: 0052B45C
                                                        • CloseHandle.KERNEL32(00000000), ref: 0052B46E
                                                        • CloseHandle.KERNEL32(?), ref: 0052B4E3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 2178637699-0
                                                        • Opcode ID: 5e81bc1c5988d135b7713440fbcee82f500a402463430010d97f6e5604be3ce3
                                                        • Instruction ID: 76ddd686d60b19f1673ed13a3f7505597f5142358565f80d73472b4d1774c962
                                                        • Opcode Fuzzy Hash: 5e81bc1c5988d135b7713440fbcee82f500a402463430010d97f6e5604be3ce3
                                                        • Instruction Fuzzy Hash: A0F1AC315043109FD724EF25D895B6ABBE1BF86314F14885EF8958B2A2CB35EC44CB92
                                                        APIs
                                                        • GetMenuItemCount.USER32(00571990), ref: 004E2F8D
                                                        • GetMenuItemCount.USER32(00571990), ref: 004E303D
                                                        • GetCursorPos.USER32(?), ref: 004E3081
                                                        • SetForegroundWindow.USER32(00000000), ref: 004E308A
                                                        • TrackPopupMenuEx.USER32(00571990,00000000,?,00000000,00000000,00000000), ref: 004E309D
                                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004E30A9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                        • String ID: 0
                                                        • API String ID: 36266755-4108050209
                                                        • Opcode ID: 0f6d9c0e64c84021345a52d739e34193956f337fbfdb0cf44e1443f64d7948dc
                                                        • Instruction ID: 8d67a99d7f967b3226a4889ca9729b8be585e9b713a8b31b1fe7699efd84cfa2
                                                        • Opcode Fuzzy Hash: 0f6d9c0e64c84021345a52d739e34193956f337fbfdb0cf44e1443f64d7948dc
                                                        • Instruction Fuzzy Hash: EA712531640256BAEB218F29CD49FABBF68FF11325F200207F5146A2E0C7B5AD14EB59
                                                        APIs
                                                        • DestroyWindow.USER32(?,?), ref: 00536DEB
                                                          • Part of subcall function 004A6B57: _wcslen.LIBCMT ref: 004A6B6A
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00536E5F
                                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00536E81
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00536E94
                                                        • DestroyWindow.USER32(?), ref: 00536EB5
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,004A0000,00000000), ref: 00536EE4
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00536EFD
                                                        • GetDesktopWindow.USER32 ref: 00536F16
                                                        • GetWindowRect.USER32(00000000), ref: 00536F1D
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00536F35
                                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00536F4D
                                                          • Part of subcall function 004B9944: GetWindowLongW.USER32(?,000000EB), ref: 004B9952
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                        • String ID: 0$tooltips_class32
                                                        • API String ID: 2429346358-3619404913
                                                        • Opcode ID: 48feff9eddc77350ebeecab6344aa135f133e5699d890c0356a622b01c52262c
                                                        • Instruction ID: 5468b89cc07e45afe29933024367efa7bfd829922c93d746e8a5336368a55633
                                                        • Opcode Fuzzy Hash: 48feff9eddc77350ebeecab6344aa135f133e5699d890c0356a622b01c52262c
                                                        • Instruction Fuzzy Hash: C8717974104644AFDB21CF19D884EAABFF9FB99304F04481DFA9997260C770A94AEB25
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0051C4B0
                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0051C4C3
                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0051C4D7
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0051C4F0
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0051C533
                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0051C549
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0051C554
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0051C584
                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0051C5DC
                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0051C5F0
                                                        • InternetCloseHandle.WININET(00000000), ref: 0051C5FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                        • String ID:
                                                        • API String ID: 3800310941-3916222277
                                                        • Opcode ID: d3a6877e9593b689641e9c0fd1256481a3e08860fb7047923fe14d7a1f25e378
                                                        • Instruction ID: cb3f0047dd433d7e4374ab0fe1294ea3c476316b0fa4ac399a6d018bd6aa3d1a
                                                        • Opcode Fuzzy Hash: d3a6877e9593b689641e9c0fd1256481a3e08860fb7047923fe14d7a1f25e378
                                                        • Instruction Fuzzy Hash: 2F514BB5540209BFEB219FA4C988ABB7FFDFF18754F00441DF945A6210DB35E988AB60
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00538592
                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 005385A2
                                                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 005385AD
                                                        • CloseHandle.KERNEL32(00000000), ref: 005385BA
                                                        • GlobalLock.KERNEL32(00000000), ref: 005385C8
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 005385D7
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 005385E0
                                                        • CloseHandle.KERNEL32(00000000), ref: 005385E7
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 005385F8
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,0053FC38,?), ref: 00538611
                                                        • GlobalFree.KERNEL32(00000000), ref: 00538621
                                                        • GetObjectW.GDI32(?,00000018,000000FF), ref: 00538641
                                                        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00538671
                                                        • DeleteObject.GDI32(00000000), ref: 00538699
                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 005386AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID:
                                                        • API String ID: 3840717409-0
                                                        • Opcode ID: d4d420a6bdde58ab94a845125621d38b2abf30cb1e06101e2e38361421798733
                                                        • Instruction ID: 19665ca89025ec6901560a66cd76ffdb5e3163cd074a2b1cb6ecc3132301e912
                                                        • Opcode Fuzzy Hash: d4d420a6bdde58ab94a845125621d38b2abf30cb1e06101e2e38361421798733
                                                        • Instruction Fuzzy Hash: 7141F775600208BFDB159FA5DC89EAB7FB8FF99B11F148058F905EB260DB309905EB60
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000000), ref: 00511502
                                                        • VariantCopy.OLEAUT32(?,?), ref: 0051150B
                                                        • VariantClear.OLEAUT32(?), ref: 00511517
                                                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 005115FB
                                                        • VarR8FromDec.OLEAUT32(?,?), ref: 00511657
                                                        • VariantInit.OLEAUT32(?), ref: 00511708
                                                        • SysFreeString.OLEAUT32(?), ref: 0051178C
                                                        • VariantClear.OLEAUT32(?), ref: 005117D8
                                                        • VariantClear.OLEAUT32(?), ref: 005117E7
                                                        • VariantInit.OLEAUT32(00000000), ref: 00511823
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                        • API String ID: 1234038744-3931177956
                                                        • Opcode ID: 6d7871636b1d7fc3e6ae29c2fcb42d740934b6406d694e12386066dd89466da8
                                                        • Instruction ID: 7ee395ee6442921ab0822e63318e684d8695f62e766200b47fd89aeb965e9cd8
                                                        • Opcode Fuzzy Hash: 6d7871636b1d7fc3e6ae29c2fcb42d740934b6406d694e12386066dd89466da8
                                                        • Instruction Fuzzy Hash: 5FD11331600915DBEB009F65E884BFDBBB6BF45700F15849AF646AB280DB34DC84DF6A
                                                        APIs
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                          • Part of subcall function 0052C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0052B6AE,?,?), ref: 0052C9B5
                                                          • Part of subcall function 0052C998: _wcslen.LIBCMT ref: 0052C9F1
                                                          • Part of subcall function 0052C998: _wcslen.LIBCMT ref: 0052CA68
                                                          • Part of subcall function 0052C998: _wcslen.LIBCMT ref: 0052CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0052B6F4
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0052B772
                                                        • RegDeleteValueW.ADVAPI32(?,?), ref: 0052B80A
                                                        • RegCloseKey.ADVAPI32(?), ref: 0052B87E
                                                        • RegCloseKey.ADVAPI32(?), ref: 0052B89C
                                                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0052B8F2
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0052B904
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0052B922
                                                        • FreeLibrary.KERNEL32(00000000), ref: 0052B983
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0052B994
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 146587525-4033151799
                                                        • Opcode ID: 4b672bde09e2584b34f32becdfbcd0039aa88f8c6c050aad4742be5a2835a9d9
                                                        • Instruction ID: 4aec42824a6337a5ed15aed5ffbcbbe60c83243123594eaefe9f2c7f6a14a48e
                                                        • Opcode Fuzzy Hash: 4b672bde09e2584b34f32becdfbcd0039aa88f8c6c050aad4742be5a2835a9d9
                                                        • Instruction Fuzzy Hash: A4C19B34208211AFE714DF14D494F2ABBE5FF96308F18845CF59A8B2A2CB35ED45CB91
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 005225D8
                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 005225E8
                                                        • CreateCompatibleDC.GDI32(?), ref: 005225F4
                                                        • SelectObject.GDI32(00000000,?), ref: 00522601
                                                        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0052266D
                                                        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 005226AC
                                                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 005226D0
                                                        • SelectObject.GDI32(?,?), ref: 005226D8
                                                        • DeleteObject.GDI32(?), ref: 005226E1
                                                        • DeleteDC.GDI32(?), ref: 005226E8
                                                        • ReleaseDC.USER32(00000000,?), ref: 005226F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                        • String ID: (
                                                        • API String ID: 2598888154-3887548279
                                                        • Opcode ID: c308ab8df37cf36ee4c72b7c43e74e9d51e2ef7ce8f0f04f7e30409d5a5f093a
                                                        • Instruction ID: 9b1c1261533bd6357d10272d2fd98ec37deb40c57653a8b209b246ba190b801d
                                                        • Opcode Fuzzy Hash: c308ab8df37cf36ee4c72b7c43e74e9d51e2ef7ce8f0f04f7e30409d5a5f093a
                                                        • Instruction Fuzzy Hash: 5061F376D00219EFCF14CFA8D888AAEBBB5FF48310F208529E956A7350D774A951DF60
                                                        APIs
                                                        • ___free_lconv_mon.LIBCMT ref: 004DDAA1
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD659
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD66B
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD67D
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD68F
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD6A1
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD6B3
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD6C5
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD6D7
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD6E9
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD6FB
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD70D
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD71F
                                                          • Part of subcall function 004DD63C: _free.LIBCMT ref: 004DD731
                                                        • _free.LIBCMT ref: 004DDA96
                                                          • Part of subcall function 004D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004DD7D1,00000000,00000000,00000000,00000000,?,004DD7F8,00000000,00000007,00000000,?,004DDBF5,00000000), ref: 004D29DE
                                                          • Part of subcall function 004D29C8: GetLastError.KERNEL32(00000000,?,004DD7D1,00000000,00000000,00000000,00000000,?,004DD7F8,00000000,00000007,00000000,?,004DDBF5,00000000,00000000), ref: 004D29F0
                                                        • _free.LIBCMT ref: 004DDAB8
                                                        • _free.LIBCMT ref: 004DDACD
                                                        • _free.LIBCMT ref: 004DDAD8
                                                        • _free.LIBCMT ref: 004DDAFA
                                                        • _free.LIBCMT ref: 004DDB0D
                                                        • _free.LIBCMT ref: 004DDB1B
                                                        • _free.LIBCMT ref: 004DDB26
                                                        • _free.LIBCMT ref: 004DDB5E
                                                        • _free.LIBCMT ref: 004DDB65
                                                        • _free.LIBCMT ref: 004DDB82
                                                        • _free.LIBCMT ref: 004DDB9A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                        • String ID:
                                                        • API String ID: 161543041-0
                                                        • Opcode ID: 98cc1e119b8e890d0e33df2ba99b5195b3620c41dd7960fb1d665379eea6c098
                                                        • Instruction ID: deedefea6e1deecc08169e9ec2671c724cbefa79ec650addd1d9ecc39fe635d0
                                                        • Opcode Fuzzy Hash: 98cc1e119b8e890d0e33df2ba99b5195b3620c41dd7960fb1d665379eea6c098
                                                        • Instruction Fuzzy Hash: E0317CB1A046049FEB21AA3AE961B577BE8FF10318F10446FE049D7391DA78BC40D728
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 0050369C
                                                        • _wcslen.LIBCMT ref: 005036A7
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00503797
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 0050380C
                                                        • GetDlgCtrlID.USER32(?), ref: 0050385D
                                                        • GetWindowRect.USER32(?,?), ref: 00503882
                                                        • GetParent.USER32(?), ref: 005038A0
                                                        • ScreenToClient.USER32(00000000), ref: 005038A7
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00503921
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0050395D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                        • String ID: %s%u
                                                        • API String ID: 4010501982-679674701
                                                        • Opcode ID: 60239a1638bfc70ccb31a95b687c7cf4721468f92228fe7f42c7764cf60ce0b6
                                                        • Instruction ID: 48ac905e4ed89b1f4f929e18e9261c795f80ed34b215b962aa95f202be383e7e
                                                        • Opcode Fuzzy Hash: 60239a1638bfc70ccb31a95b687c7cf4721468f92228fe7f42c7764cf60ce0b6
                                                        • Instruction Fuzzy Hash: EC919E71204606AFD719DF25C885FAEBBACFF44354F008A29F999D2191DB30EA49CB91
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00504994
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 005049DA
                                                        • _wcslen.LIBCMT ref: 005049EB
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 005049F7
                                                        • _wcsstr.LIBVCRUNTIME ref: 00504A2C
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00504A64
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00504A9D
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00504AE6
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00504B20
                                                        • GetWindowRect.USER32(?,?), ref: 00504B8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                        • String ID: ThumbnailClass
                                                        • API String ID: 1311036022-1241985126
                                                        • Opcode ID: 164d7c8d679c85072f6c32997fe6ebc04f94c86eb83d89dee7b5af64b73383aa
                                                        • Instruction ID: a931947d9d0b7f6861d353dab2a60f2c6b216cbe2c0d553b804596f9d54346b1
                                                        • Opcode Fuzzy Hash: 164d7c8d679c85072f6c32997fe6ebc04f94c86eb83d89dee7b5af64b73383aa
                                                        • Instruction Fuzzy Hash: 4591A9B21042069BDB04DE14C985BAE7BE9FF84314F04846EFE859A1D6EB34ED45CFA1
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0052CC64
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0052CC8D
                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0052CD48
                                                          • Part of subcall function 0052CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0052CCAA
                                                          • Part of subcall function 0052CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0052CCBD
                                                          • Part of subcall function 0052CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0052CCCF
                                                          • Part of subcall function 0052CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0052CD05
                                                          • Part of subcall function 0052CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0052CD28
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0052CCF3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 2734957052-4033151799
                                                        • Opcode ID: 8b4edc9e74aba6143be390d43e14390376151eca886d12d89a8a501583ee4e5a
                                                        • Instruction ID: 6db114bad807b9cbad1002572585780735186ac5a4f97658cfb9a9fd1d53c1f2
                                                        • Opcode Fuzzy Hash: 8b4edc9e74aba6143be390d43e14390376151eca886d12d89a8a501583ee4e5a
                                                        • Instruction Fuzzy Hash: 84317E75901129BBD7208B61EC88EFFBF7CEF56740F000165A905E7281D6749E49EBA0
                                                        APIs
                                                        • timeGetTime.WINMM ref: 0050E6B4
                                                          • Part of subcall function 004BE551: timeGetTime.WINMM(?,?,0050E6D4), ref: 004BE555
                                                        • Sleep.KERNEL32(0000000A), ref: 0050E6E1
                                                        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0050E705
                                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0050E727
                                                        • SetActiveWindow.USER32 ref: 0050E746
                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0050E754
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 0050E773
                                                        • Sleep.KERNEL32(000000FA), ref: 0050E77E
                                                        • IsWindow.USER32 ref: 0050E78A
                                                        • EndDialog.USER32(00000000), ref: 0050E79B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                        • String ID: BUTTON
                                                        • API String ID: 1194449130-3405671355
                                                        • Opcode ID: 1ad05a4230f8f29608a642b771e30423434a7447c2617be6c0046de1ee83b5f2
                                                        • Instruction ID: 1a94f07a8a7a115e7d1c046ff75c887a15d54f5f9cbbcc2e2ed8e3b49abae250
                                                        • Opcode Fuzzy Hash: 1ad05a4230f8f29608a642b771e30423434a7447c2617be6c0046de1ee83b5f2
                                                        • Instruction Fuzzy Hash: 1A218470200245AFEB106F65FC8FA293F69F7B5349F240825F50A912E1DF719C48BB24
                                                        APIs
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0050EA5D
                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0050EA73
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0050EA84
                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0050EA96
                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0050EAA7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: SendString$_wcslen
                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                        • API String ID: 2420728520-1007645807
                                                        • Opcode ID: 6eabcaf0e3f314ac374f1511746dbfbe0bb54dae046ecabcf54a6f944b367039
                                                        • Instruction ID: d8f406910ea528a73db19f0ec0ccd40b0b39d835c3605cb2a789414c68b0d581
                                                        • Opcode Fuzzy Hash: 6eabcaf0e3f314ac374f1511746dbfbe0bb54dae046ecabcf54a6f944b367039
                                                        • Instruction Fuzzy Hash: C6114F21A5021979D720A7A2DC4ADFF6E7CFBE6B44F14082A7801A30D1EAB00945CAB0
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000001), ref: 00505CE2
                                                        • GetWindowRect.USER32(00000000,?), ref: 00505CFB
                                                        • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00505D59
                                                        • GetDlgItem.USER32(?,00000002), ref: 00505D69
                                                        • GetWindowRect.USER32(00000000,?), ref: 00505D7B
                                                        • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00505DCF
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00505DDD
                                                        • GetWindowRect.USER32(00000000,?), ref: 00505DEF
                                                        • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00505E31
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00505E44
                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00505E5A
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00505E67
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                        • String ID:
                                                        • API String ID: 3096461208-0
                                                        • Opcode ID: df5f69948ec092bba896b77ff816d45ec39d1de741ebb2be8d72b5b0148590c9
                                                        • Instruction ID: f9c800539618f18f003f89fab0cef91d818f1fa52dca7feda00e8879f97a90c1
                                                        • Opcode Fuzzy Hash: df5f69948ec092bba896b77ff816d45ec39d1de741ebb2be8d72b5b0148590c9
                                                        • Instruction Fuzzy Hash: F751FFB1A00615AFDF18CF68DD89AAE7FB9FB58300F548129F916E6290E7709E04CF50
                                                        APIs
                                                          • Part of subcall function 004B8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,004B8BE8,?,00000000,?,?,?,?,004B8BBA,00000000,?), ref: 004B8FC5
                                                        • DestroyWindow.USER32(?), ref: 004B8C81
                                                        • KillTimer.USER32(00000000,?,?,?,?,004B8BBA,00000000,?), ref: 004B8D1B
                                                        • DestroyAcceleratorTable.USER32(00000000), ref: 004F6973
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,004B8BBA,00000000,?), ref: 004F69A1
                                                        • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,004B8BBA,00000000,?), ref: 004F69B8
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,004B8BBA,00000000), ref: 004F69D4
                                                        • DeleteObject.GDI32(00000000), ref: 004F69E6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                        • String ID:
                                                        • API String ID: 641708696-0
                                                        • Opcode ID: 8d2c14503aae7d0f0db5aa0f7451f626d0bd624e202697f8829c5504e36be708
                                                        • Instruction ID: 0ffe65857a4a6104de1ee9ed2aaf68c0c8e2ef098864a2a758ddce31cb3fb0c2
                                                        • Opcode Fuzzy Hash: 8d2c14503aae7d0f0db5aa0f7451f626d0bd624e202697f8829c5504e36be708
                                                        • Instruction Fuzzy Hash: 0161ED71401A04DFCB218F18E948BBA7BF5FB60312F14441EE1469A660CB79ACD5EF69
                                                        APIs
                                                          • Part of subcall function 004B9944: GetWindowLongW.USER32(?,000000EB), ref: 004B9952
                                                        • GetSysColor.USER32(0000000F), ref: 004B9862
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ColorLongWindow
                                                        • String ID:
                                                        • API String ID: 259745315-0
                                                        • Opcode ID: 66c728d6585e4d2dbfe8fd3f73dc9d80dc4a85346f81b767dca7640a280fa93a
                                                        • Instruction ID: e1c4d7e8390111c8b1881c753340aeb85864a8b0836f2243cd159130a76fe509
                                                        • Opcode Fuzzy Hash: 66c728d6585e4d2dbfe8fd3f73dc9d80dc4a85346f81b767dca7640a280fa93a
                                                        • Instruction Fuzzy Hash: F441C431104604AFDB216F389C84BFA3B75AB16330F14465AFAA2973E1D7399C46EB25
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,004EF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00509717
                                                        • LoadStringW.USER32(00000000,?,004EF7F8,00000001), ref: 00509720
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,004EF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00509742
                                                        • LoadStringW.USER32(00000000,?,004EF7F8,00000001), ref: 00509745
                                                        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00509866
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                        • API String ID: 747408836-2268648507
                                                        • Opcode ID: d4d4930e76e5db8e3b6d32da10b0004db8f86cef0daa249e76cf486b119c8285
                                                        • Instruction ID: a0b2fd0b3c6eaa8cdeaa6f3e5001819f0f3062b878ab515956624fc0ccca705d
                                                        • Opcode Fuzzy Hash: d4d4930e76e5db8e3b6d32da10b0004db8f86cef0daa249e76cf486b119c8285
                                                        • Instruction Fuzzy Hash: E5415D72804219AACF04FBE1CD86DEE7B78EF66745F10442AF50572092EB396F48CB65
                                                        APIs
                                                          • Part of subcall function 004A6B57: _wcslen.LIBCMT ref: 004A6B6A
                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 005007A2
                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 005007BE
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 005007DA
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00500804
                                                        • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0050082C
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00500837
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0050083C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                        • API String ID: 323675364-22481851
                                                        • Opcode ID: aebb548adbbda032f65899e572022f5d49829763803fa6f4c75cb07860deae15
                                                        • Instruction ID: 2696c5b0387fcca0f872c5d2de01240a5262771d7eda8782b5f5f45bfa89db6b
                                                        • Opcode Fuzzy Hash: aebb548adbbda032f65899e572022f5d49829763803fa6f4c75cb07860deae15
                                                        • Instruction Fuzzy Hash: DC41F872C10229ABDF15EFA5DC859EDBB78FF14754F04412AE901B31A1EB749E18CBA0
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00523C5C
                                                        • CoInitialize.OLE32(00000000), ref: 00523C8A
                                                        • CoUninitialize.OLE32 ref: 00523C94
                                                        • _wcslen.LIBCMT ref: 00523D2D
                                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00523DB1
                                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00523ED5
                                                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00523F0E
                                                        • CoGetObject.OLE32(?,00000000,0053FB98,?), ref: 00523F2D
                                                        • SetErrorMode.KERNEL32(00000000), ref: 00523F40
                                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00523FC4
                                                        • VariantClear.OLEAUT32(?), ref: 00523FD8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                        • String ID:
                                                        • API String ID: 429561992-0
                                                        • Opcode ID: 8364a4c9f92b6c5eee56b63d04015b0e4fae25864ae2c0352ebd03e2d32acff4
                                                        • Instruction ID: a7f303e1adb70a2d37ba5c559a044fb0ef36d4f5dbe9948544aa0fd6bfac5639
                                                        • Opcode Fuzzy Hash: 8364a4c9f92b6c5eee56b63d04015b0e4fae25864ae2c0352ebd03e2d32acff4
                                                        • Instruction Fuzzy Hash: B7C15771608315AFC700DF68D88492BBBE9FF8A748F14491DF98A9B291D734EE05CB52
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00517AF3
                                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00517B8F
                                                        • SHGetDesktopFolder.SHELL32(?), ref: 00517BA3
                                                        • CoCreateInstance.OLE32(0053FD08,00000000,00000001,00566E6C,?), ref: 00517BEF
                                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00517C74
                                                        • CoTaskMemFree.OLE32(?,?), ref: 00517CCC
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00517D57
                                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00517D7A
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00517D81
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00517DD6
                                                        • CoUninitialize.OLE32 ref: 00517DDC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                        • String ID:
                                                        • API String ID: 2762341140-0
                                                        • Opcode ID: 98bdd190096bf8951a49df321cd50f7d4d5b722980d3d76c90f84b98b9b92a13
                                                        • Instruction ID: 82b050ac2a227a82a2a705f3640076e09178bba707cc5d3f01625138ec68f879
                                                        • Opcode Fuzzy Hash: 98bdd190096bf8951a49df321cd50f7d4d5b722980d3d76c90f84b98b9b92a13
                                                        • Instruction Fuzzy Hash: 77C11D75A04109AFDB14DF68C884DAEBBF9FF48318B148499E415DB361D734EE85CB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00535504
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00535515
                                                        • CharNextW.USER32(00000158), ref: 00535544
                                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00535585
                                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0053559B
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005355AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CharNext
                                                        • String ID:
                                                        • API String ID: 1350042424-0
                                                        • Opcode ID: edfda1449d0c83e5d09aaf5ad7616dc23a7033d2f6a39d3058334995ff652ae7
                                                        • Instruction ID: 01c84ee4bf98b98e412f5b786496ba899deca2096dbbf92e8cd0c1390265ce89
                                                        • Opcode Fuzzy Hash: edfda1449d0c83e5d09aaf5ad7616dc23a7033d2f6a39d3058334995ff652ae7
                                                        • Instruction Fuzzy Hash: 6E61AC71900609AFDF11CF64CC85AFE7FB9FB19320F109545F925AB290E7749A84EB60
                                                        APIs
                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 004FFAAF
                                                        • SafeArrayAllocData.OLEAUT32(?), ref: 004FFB08
                                                        • VariantInit.OLEAUT32(?), ref: 004FFB1A
                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 004FFB3A
                                                        • VariantCopy.OLEAUT32(?,?), ref: 004FFB8D
                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 004FFBA1
                                                        • VariantClear.OLEAUT32(?), ref: 004FFBB6
                                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 004FFBC3
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 004FFBCC
                                                        • VariantClear.OLEAUT32(?), ref: 004FFBDE
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 004FFBE9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                        • String ID:
                                                        • API String ID: 2706829360-0
                                                        • Opcode ID: e5a8665b84ee5db8c6945a4c4b018d05549a80aac1d2a98816fd913a8865acb5
                                                        • Instruction ID: f01f0c918462a579b2a10c74e74cba99f95a18089f87b0b6cbb072d64ded7d8d
                                                        • Opcode Fuzzy Hash: e5a8665b84ee5db8c6945a4c4b018d05549a80aac1d2a98816fd913a8865acb5
                                                        • Instruction Fuzzy Hash: 49415F35A002199FCF00DF65D8549BEBFB9FF58345F00806AE915A7361DB34E949CBA4
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00509CA1
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00509D22
                                                        • GetKeyState.USER32(000000A0), ref: 00509D3D
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00509D57
                                                        • GetKeyState.USER32(000000A1), ref: 00509D6C
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00509D84
                                                        • GetKeyState.USER32(00000011), ref: 00509D96
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00509DAE
                                                        • GetKeyState.USER32(00000012), ref: 00509DC0
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00509DD8
                                                        • GetKeyState.USER32(0000005B), ref: 00509DEA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: f1820fb13b228d7442c454a2cff7baefad62b4b605092afde87a84beb4264acd
                                                        • Instruction ID: 2abf1fab67ace184510465ff55488f267cef4eec682982290329927f270f59ff
                                                        • Opcode Fuzzy Hash: f1820fb13b228d7442c454a2cff7baefad62b4b605092afde87a84beb4264acd
                                                        • Instruction Fuzzy Hash: 4C41E9749447C96EFF308764C8043BDBEA07F21344F08805ADAC6566C7DBA49DC8C7A2
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?), ref: 005205BC
                                                        • inet_addr.WSOCK32(?), ref: 0052061C
                                                        • gethostbyname.WSOCK32(?), ref: 00520628
                                                        • IcmpCreateFile.IPHLPAPI ref: 00520636
                                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 005206C6
                                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 005206E5
                                                        • IcmpCloseHandle.IPHLPAPI(?), ref: 005207B9
                                                        • WSACleanup.WSOCK32 ref: 005207BF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                        • String ID: Ping
                                                        • API String ID: 1028309954-2246546115
                                                        • Opcode ID: 4c05e3c1b71690a0080c65a6f18509f91916bba613ef21e4ab0bc407f8f0a2a7
                                                        • Instruction ID: 6b17e86de30da17cab5b57ea1012cae1549cff01183f176aa978879e71fb49ad
                                                        • Opcode Fuzzy Hash: 4c05e3c1b71690a0080c65a6f18509f91916bba613ef21e4ab0bc407f8f0a2a7
                                                        • Instruction Fuzzy Hash: 51917935605211AFD320DF15E888B1ABFE0FF46318F1889A9E4699B6E2C734ED45CF91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharLower
                                                        • String ID: cdecl$none$stdcall$winapi
                                                        • API String ID: 707087890-567219261
                                                        • Opcode ID: ae159241b59b2396dd98815cf8e398e2e71f622cd946b0f7b31a048f78137d8c
                                                        • Instruction ID: aa2cbf5f3f3e15de1abfc1bb2b60264e444d8d2286958a1812419128fb275fb3
                                                        • Opcode Fuzzy Hash: ae159241b59b2396dd98815cf8e398e2e71f622cd946b0f7b31a048f78137d8c
                                                        • Instruction Fuzzy Hash: 6A51D472A011269BCF14DFACD9409BEBBA9BF66324B25422DE426E72C4DF34DD44C790
                                                        APIs
                                                        • CoInitialize.OLE32 ref: 00523774
                                                        • CoUninitialize.OLE32 ref: 0052377F
                                                        • CoCreateInstance.OLE32(?,00000000,00000017,0053FB78,?), ref: 005237D9
                                                        • IIDFromString.OLE32(?,?), ref: 0052384C
                                                        • VariantInit.OLEAUT32(?), ref: 005238E4
                                                        • VariantClear.OLEAUT32(?), ref: 00523936
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                        • API String ID: 636576611-1287834457
                                                        • Opcode ID: dc41e1dc70780d6ae1e2420606d5d189d64203b0761bdcda6892464820fa39bd
                                                        • Instruction ID: bcbd6edc6d23a42c83e1c0884942b993beb49d7604ee5e294e4911fa4f8c5a39
                                                        • Opcode Fuzzy Hash: dc41e1dc70780d6ae1e2420606d5d189d64203b0761bdcda6892464820fa39bd
                                                        • Instruction Fuzzy Hash: 26619D71608321AFD710DF54D888B5ABFE8FF8A714F040809F9859B291D774EE48CB96
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 005133CF
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 005133F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: LoadString$_wcslen
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 4099089115-3080491070
                                                        • Opcode ID: 4970f38106bf9efe66b14c02124ef50351abb23a7c41a44c5798fda0c03b7e81
                                                        • Instruction ID: ddd900c4a691f45d423b2e47251dfbca31192f9ccdd6d0b8d10133036a560ad8
                                                        • Opcode Fuzzy Hash: 4970f38106bf9efe66b14c02124ef50351abb23a7c41a44c5798fda0c03b7e81
                                                        • Instruction Fuzzy Hash: EE51D131800609AADF14EBE1CD46EEEBB79FF25744F10446AF40572092EB392F98DB64
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                        • API String ID: 1256254125-769500911
                                                        • Opcode ID: 1db5f7c13cfc998cb97f3b89e52b6b0e93ec6a96c512f19277f1dd354d0dbd4b
                                                        • Instruction ID: 48ef014b00cca67275503c182449dfd1c39a26646abe45f0f60504ee8e7d69a3
                                                        • Opcode Fuzzy Hash: 1db5f7c13cfc998cb97f3b89e52b6b0e93ec6a96c512f19277f1dd354d0dbd4b
                                                        • Instruction Fuzzy Hash: 2841A532A001279ADB205F7DC9D15BE7FA5FBA1B98B24462AE421D72C4E736CD81C790
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 005153A0
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00515416
                                                        • GetLastError.KERNEL32 ref: 00515420
                                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 005154A7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: 14b3bc5a604ef15ca7cf6afaac65180085a0b54952e8c500077f3131bcd828f6
                                                        • Instruction ID: 059beca7580130568db00309c0de80128a5ccec77786e27001c0153fb589cd9c
                                                        • Opcode Fuzzy Hash: 14b3bc5a604ef15ca7cf6afaac65180085a0b54952e8c500077f3131bcd828f6
                                                        • Instruction Fuzzy Hash: AC317E35A00605DFEB10DF68C484AEABFB4FB95309F54806AE405DB292E7B5DDC6CB90
                                                        APIs
                                                        • CreateMenu.USER32 ref: 00533C79
                                                        • SetMenu.USER32(?,00000000), ref: 00533C88
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00533D10
                                                        • IsMenu.USER32(?), ref: 00533D24
                                                        • CreatePopupMenu.USER32 ref: 00533D2E
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00533D5B
                                                        • DrawMenuBar.USER32 ref: 00533D63
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                        • String ID: 0$F
                                                        • API String ID: 161812096-3044882817
                                                        • Opcode ID: 8d9e3b9ec75c9a3297a90a7504ae6bb1a1bbc93e03b3a8628e77e4459fb648ea
                                                        • Instruction ID: 2285014adfdbf5a7519a4fffe083803df5cc1e9377cd4aa397e4987308fbf736
                                                        • Opcode Fuzzy Hash: 8d9e3b9ec75c9a3297a90a7504ae6bb1a1bbc93e03b3a8628e77e4459fb648ea
                                                        • Instruction Fuzzy Hash: 0F418779A01209AFDB14CFA4E884EAA7FB5FF59340F140429FA06A7360D730AA14DF94
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00533A9D
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00533AA0
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00533AC7
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00533AEA
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00533B62
                                                        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00533BAC
                                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00533BC7
                                                        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00533BE2
                                                        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00533BF6
                                                        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00533C13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow
                                                        • String ID:
                                                        • API String ID: 312131281-0
                                                        • Opcode ID: 29f975b7a8da00dce649491caa952d7535209679109c96d45fece63460316665
                                                        • Instruction ID: 9fc59aa07a750d98f656187a521d0b694c45ccee50fc2203df15d0926787a820
                                                        • Opcode Fuzzy Hash: 29f975b7a8da00dce649491caa952d7535209679109c96d45fece63460316665
                                                        • Instruction Fuzzy Hash: DE616C75900248AFDB10DFA8CC81EEE7BB8FF49700F104199FA15AB2A1C774AE45EB54
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 0050B151
                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0050A1E1,?,00000001), ref: 0050B165
                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 0050B16C
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0050A1E1,?,00000001), ref: 0050B17B
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0050B18D
                                                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0050A1E1,?,00000001), ref: 0050B1A6
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0050A1E1,?,00000001), ref: 0050B1B8
                                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0050A1E1,?,00000001), ref: 0050B1FD
                                                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0050A1E1,?,00000001), ref: 0050B212
                                                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0050A1E1,?,00000001), ref: 0050B21D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                        • String ID:
                                                        • API String ID: 2156557900-0
                                                        • Opcode ID: 238368087bb4f8b621feac6a98b8d40fefed73f8f4991244ca08f820665f35f7
                                                        • Instruction ID: f32cafe578e4d2cba51db7610f8b83646a7fd66140f7b5ce0a649cc1c31d350d
                                                        • Opcode Fuzzy Hash: 238368087bb4f8b621feac6a98b8d40fefed73f8f4991244ca08f820665f35f7
                                                        • Instruction Fuzzy Hash: 59319E75500205BFEB109F24EC89B6D7FA9BB71321F144445FA09E62D0E7B49A88FF60
                                                        APIs
                                                        • _free.LIBCMT ref: 004D2C94
                                                          • Part of subcall function 004D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004DD7D1,00000000,00000000,00000000,00000000,?,004DD7F8,00000000,00000007,00000000,?,004DDBF5,00000000), ref: 004D29DE
                                                          • Part of subcall function 004D29C8: GetLastError.KERNEL32(00000000,?,004DD7D1,00000000,00000000,00000000,00000000,?,004DD7F8,00000000,00000007,00000000,?,004DDBF5,00000000,00000000), ref: 004D29F0
                                                        • _free.LIBCMT ref: 004D2CA0
                                                        • _free.LIBCMT ref: 004D2CAB
                                                        • _free.LIBCMT ref: 004D2CB6
                                                        • _free.LIBCMT ref: 004D2CC1
                                                        • _free.LIBCMT ref: 004D2CCC
                                                        • _free.LIBCMT ref: 004D2CD7
                                                        • _free.LIBCMT ref: 004D2CE2
                                                        • _free.LIBCMT ref: 004D2CED
                                                        • _free.LIBCMT ref: 004D2CFB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 7ce36d871b2fa0528623e741effecd265645dda3af32ce45def24a5bc05f2501
                                                        • Instruction ID: 35f46ee5ae1dd6aff86f37427d871979491014b9d5e2e5680438cee9d1a45efd
                                                        • Opcode Fuzzy Hash: 7ce36d871b2fa0528623e741effecd265645dda3af32ce45def24a5bc05f2501
                                                        • Instruction Fuzzy Hash: 111107B6200008AFCB02EF55DA62CDD3BA5FF15344F4040ABFA485F322D6B5EE50AB94
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 004A1459
                                                        • OleUninitialize.OLE32(?,00000000), ref: 004A14F8
                                                        • UnregisterHotKey.USER32(?), ref: 004A16DD
                                                        • DestroyWindow.USER32(?), ref: 004E24B9
                                                        • FreeLibrary.KERNEL32(?), ref: 004E251E
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004E254B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                        • String ID: close all
                                                        • API String ID: 469580280-3243417748
                                                        • Opcode ID: 944afe7535413b12d0a22ba87b07186555cf7b3addb3d224aaf866383179e0d8
                                                        • Instruction ID: 47f5ede655ac8e654f648aa4a15fabc1e6cd68a2bbaf885e610689a82c0404a5
                                                        • Opcode Fuzzy Hash: 944afe7535413b12d0a22ba87b07186555cf7b3addb3d224aaf866383179e0d8
                                                        • Instruction Fuzzy Hash: C7D1CF31701212DFCB19EF16CA99A29F7A4BF16304F14429EE44A6B361CB38ED12CF59
                                                        APIs
                                                        • SetWindowLongW.USER32(?,000000EB), ref: 004A5C7A
                                                          • Part of subcall function 004A5D0A: GetClientRect.USER32(?,?), ref: 004A5D30
                                                          • Part of subcall function 004A5D0A: GetWindowRect.USER32(?,?), ref: 004A5D71
                                                          • Part of subcall function 004A5D0A: ScreenToClient.USER32(?,?), ref: 004A5D99
                                                        • GetDC.USER32 ref: 004E46F5
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 004E4708
                                                        • SelectObject.GDI32(00000000,00000000), ref: 004E4716
                                                        • SelectObject.GDI32(00000000,00000000), ref: 004E472B
                                                        • ReleaseDC.USER32(?,00000000), ref: 004E4733
                                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 004E47C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                        • String ID: U
                                                        • API String ID: 4009187628-3372436214
                                                        • Opcode ID: c70b6c5318f7ecffd1a834e929649acec6d37864fa24d86bee4a30b309c7444c
                                                        • Instruction ID: df916a91e8fce3bb8cb0bee0f6e27104510c70e1706832ac79feaa743a01f05f
                                                        • Opcode Fuzzy Hash: c70b6c5318f7ecffd1a834e929649acec6d37864fa24d86bee4a30b309c7444c
                                                        • Instruction Fuzzy Hash: 66710530400245DFCF218F65C984ABB7BB1FF9A326F14426BED555A26AC3388C42EF55
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 005135E4
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                        • LoadStringW.USER32(00572390,?,00000FFF,?), ref: 0051360A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: LoadString$_wcslen
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 4099089115-2391861430
                                                        • Opcode ID: 40fe9ae15109a240041b9714d383e9a1b8a319c09b4316158f441eddf6ec29fb
                                                        • Instruction ID: 11b05afda2af11479e8830c5d0ac4894c090aacd9b13e9db75666fd0f32637a3
                                                        • Opcode Fuzzy Hash: 40fe9ae15109a240041b9714d383e9a1b8a319c09b4316158f441eddf6ec29fb
                                                        • Instruction Fuzzy Hash: 15518F7180061AAADF15EBA1DC52EEEBF38FF25345F04412AF505721A1EB341B98DFA4
                                                        APIs
                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0051C272
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0051C29A
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0051C2CA
                                                        • GetLastError.KERNEL32 ref: 0051C322
                                                        • SetEvent.KERNEL32(?), ref: 0051C336
                                                        • InternetCloseHandle.WININET(00000000), ref: 0051C341
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                        • String ID:
                                                        • API String ID: 3113390036-3916222277
                                                        • Opcode ID: 7269dd3adef17f190c1fe6383c8332775d4924606132a744ba031e6406bc0055
                                                        • Instruction ID: d10c81c58f0b547d8494fd48964d35f418f2d83d9ddb9fc531af50f97aafb782
                                                        • Opcode Fuzzy Hash: 7269dd3adef17f190c1fe6383c8332775d4924606132a744ba031e6406bc0055
                                                        • Instruction Fuzzy Hash: AB317FB5540204AFE7219F658C88AAB7FFCFB59744B10891EF496E2200DB36DD889B61
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,004E3AAF,?,?,Bad directive syntax error,0053CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 005098BC
                                                        • LoadStringW.USER32(00000000,?,004E3AAF,?), ref: 005098C3
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00509987
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadMessageModuleString_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                        • API String ID: 858772685-4153970271
                                                        • Opcode ID: 3e2e293cbcb8ce0da8347790aa1ce861e290a8334adcbfa5d3d4a4eeab43dd9a
                                                        • Instruction ID: 55352abe0a5d5392dcba7d132544e1ae1cb0826491a896ffc1ab1acaf95d5193
                                                        • Opcode Fuzzy Hash: 3e2e293cbcb8ce0da8347790aa1ce861e290a8334adcbfa5d3d4a4eeab43dd9a
                                                        • Instruction Fuzzy Hash: 30219132D0421AABCF11AF91CC06EEE7B35FF29705F04481AF515620A2EB759A28DB54
                                                        APIs
                                                        • GetParent.USER32 ref: 005020AB
                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 005020C0
                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0050214D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameParentSend
                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                        • API String ID: 1290815626-3381328864
                                                        • Opcode ID: a93ad085244dcd71b086df11af149b7c9136e60f9a1bb3ed2836f79d36827404
                                                        • Instruction ID: c992fdf1517130b4b2b66343ffa6d778474ac0325413b8eda6f04a84a396b063
                                                        • Opcode Fuzzy Hash: a93ad085244dcd71b086df11af149b7c9136e60f9a1bb3ed2836f79d36827404
                                                        • Instruction Fuzzy Hash: 49113A7A2C8306B9F6156221DC0FDBE7F9CEB14328F20001EFB05A50E1FE6568459618
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                        • String ID:
                                                        • API String ID: 1282221369-0
                                                        • Opcode ID: 1708e042d3224c386fe1116cc0080ef15b318fd34472d78de025ac4ad2e63934
                                                        • Instruction ID: a67350e8c8420b83ae1edd916e9c90c6e018d2dc74c757be51889aa31477b5cd
                                                        • Opcode Fuzzy Hash: 1708e042d3224c386fe1116cc0080ef15b318fd34472d78de025ac4ad2e63934
                                                        • Instruction Fuzzy Hash: 8C6168B1A04302AFCF21AFB598F1AAA7BE5AF11314F04416FF904973C1D67D9901E798
                                                        APIs
                                                        • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00535186
                                                        • ShowWindow.USER32(?,00000000), ref: 005351C7
                                                        • ShowWindow.USER32(?,00000005,?,00000000), ref: 005351CD
                                                        • SetFocus.USER32(?,?,00000005,?,00000000), ref: 005351D1
                                                          • Part of subcall function 00536FBA: DeleteObject.GDI32(00000000), ref: 00536FE6
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0053520D
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0053521A
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0053524D
                                                        • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00535287
                                                        • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00535296
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                        • String ID:
                                                        • API String ID: 3210457359-0
                                                        • Opcode ID: 0661b2b6bc0f6705b4ac2366f6335fa67d57c2eec3b84738bc1a0f03d9daf10a
                                                        • Instruction ID: 8fd4a6083a8b684ee9c42344afee2de14dcc8117feec73f76a9a9298d079a3c3
                                                        • Opcode Fuzzy Hash: 0661b2b6bc0f6705b4ac2366f6335fa67d57c2eec3b84738bc1a0f03d9daf10a
                                                        • Instruction Fuzzy Hash: 9751E334A40A09FFEF209F24CC4AFD93F65FB05324F145406FA559A2E0E775A994EB40
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 004F6890
                                                        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 004F68A9
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 004F68B9
                                                        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 004F68D1
                                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 004F68F2
                                                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,004B8874,00000000,00000000,00000000,000000FF,00000000), ref: 004F6901
                                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 004F691E
                                                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,004B8874,00000000,00000000,00000000,000000FF,00000000), ref: 004F692D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                        • String ID:
                                                        • API String ID: 1268354404-0
                                                        • Opcode ID: aab401b99ecdfbc8b59246b07b439c3b1a4b51ebafd047df49581a566e155838
                                                        • Instruction ID: af5eeb787671d6ceb97121080c32a31e8002bf53141076c4c3faa6b210e9570d
                                                        • Opcode Fuzzy Hash: aab401b99ecdfbc8b59246b07b439c3b1a4b51ebafd047df49581a566e155838
                                                        • Instruction Fuzzy Hash: C0519C70600209EFDB20CF29CC55FAA7BB5FB54750F10451EFA06972A0DB74E991EB54
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0051C182
                                                        • GetLastError.KERNEL32 ref: 0051C195
                                                        • SetEvent.KERNEL32(?), ref: 0051C1A9
                                                          • Part of subcall function 0051C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0051C272
                                                          • Part of subcall function 0051C253: GetLastError.KERNEL32 ref: 0051C322
                                                          • Part of subcall function 0051C253: SetEvent.KERNEL32(?), ref: 0051C336
                                                          • Part of subcall function 0051C253: InternetCloseHandle.WININET(00000000), ref: 0051C341
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                        • String ID:
                                                        • API String ID: 337547030-0
                                                        • Opcode ID: b66874c049b0ff3906e5e5a522b1487335d6b6ec1ed79b0f990fa04261ab999c
                                                        • Instruction ID: bd9e7170adf2dd780ef4c1e66e1516b0b90d8a536f64603639282b41f4745cce
                                                        • Opcode Fuzzy Hash: b66874c049b0ff3906e5e5a522b1487335d6b6ec1ed79b0f990fa04261ab999c
                                                        • Instruction Fuzzy Hash: 36318375180601BFEB219FA5DC48AA7BFF9FF58300B00441DF9A692610D732E854EB60
                                                        APIs
                                                          • Part of subcall function 00503A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00503A57
                                                          • Part of subcall function 00503A3D: GetCurrentThreadId.KERNEL32 ref: 00503A5E
                                                          • Part of subcall function 00503A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005025B3), ref: 00503A65
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 005025BD
                                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 005025DB
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 005025DF
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 005025E9
                                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00502601
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00502605
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 0050260F
                                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00502623
                                                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00502627
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                        • String ID:
                                                        • API String ID: 2014098862-0
                                                        • Opcode ID: e9006b6b671b6085e0684e2ce75ea5a230e2e7d5130f704a5a6ba021f2121469
                                                        • Instruction ID: 0369d625b3db8b363a0401e5992c3b4351bf018e670e54816b762e59f1c85476
                                                        • Opcode Fuzzy Hash: e9006b6b671b6085e0684e2ce75ea5a230e2e7d5130f704a5a6ba021f2121469
                                                        • Instruction Fuzzy Hash: 3F01D431390210BBFB2067699C8EF593F59EB9EB12F100001F318BE1D1C9E22448EA69
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00501449,?,?,00000000), ref: 0050180C
                                                        • HeapAlloc.KERNEL32(00000000,?,00501449,?,?,00000000), ref: 00501813
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00501449,?,?,00000000), ref: 00501828
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00501449,?,?,00000000), ref: 00501830
                                                        • DuplicateHandle.KERNEL32(00000000,?,00501449,?,?,00000000), ref: 00501833
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00501449,?,?,00000000), ref: 00501843
                                                        • GetCurrentProcess.KERNEL32(00501449,00000000,?,00501449,?,?,00000000), ref: 0050184B
                                                        • DuplicateHandle.KERNEL32(00000000,?,00501449,?,?,00000000), ref: 0050184E
                                                        • CreateThread.KERNEL32(00000000,00000000,00501874,00000000,00000000,00000000), ref: 00501868
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                        • String ID:
                                                        • API String ID: 1957940570-0
                                                        • Opcode ID: 3e50f988b01720766be7958efbcb5f561cf5fc7a950d3d59025ed128106d92c9
                                                        • Instruction ID: c347d7cc2cdb32241bb72a316e1c8df5da4a9df7e4dc3ecf0f854b888f0084c5
                                                        • Opcode Fuzzy Hash: 3e50f988b01720766be7958efbcb5f561cf5fc7a950d3d59025ed128106d92c9
                                                        • Instruction Fuzzy Hash: 3801BF75240304BFE710AB65DC4DF5B3F6CEB99B11F004411FA05EB291C670D814EB20
                                                        APIs
                                                          • Part of subcall function 0050D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0050D501
                                                          • Part of subcall function 0050D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0050D50F
                                                          • Part of subcall function 0050D4DC: CloseHandle.KERNEL32(00000000), ref: 0050D5DC
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0052A16D
                                                        • GetLastError.KERNEL32 ref: 0052A180
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0052A1B3
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0052A268
                                                        • GetLastError.KERNEL32(00000000), ref: 0052A273
                                                        • CloseHandle.KERNEL32(00000000), ref: 0052A2C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 2533919879-2896544425
                                                        • Opcode ID: b41d01bc1184a27146f0a8182203322a71b6b964c684da1c3310315654b7d1f0
                                                        • Instruction ID: c46ceca008f41735e16bc2295b1155ddad256d18493958b66f3968418ec670d0
                                                        • Opcode Fuzzy Hash: b41d01bc1184a27146f0a8182203322a71b6b964c684da1c3310315654b7d1f0
                                                        • Instruction Fuzzy Hash: 33619A342042529FD720DF19D494F19BFA1BF56318F18848CE4668B7E2C776EC49CB92
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00533925
                                                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0053393A
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00533954
                                                        • _wcslen.LIBCMT ref: 00533999
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 005339C6
                                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 005339F4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcslen
                                                        • String ID: SysListView32
                                                        • API String ID: 2147712094-78025650
                                                        • Opcode ID: 0f73debd1cf6983e05f131e5e68cb3ef61bc9d420e91137cbf6ebcd0584bf2e8
                                                        • Instruction ID: e01c94bf06051c8e98a14293840a015b2a37fdace60d8f12bff47923f67797cb
                                                        • Opcode Fuzzy Hash: 0f73debd1cf6983e05f131e5e68cb3ef61bc9d420e91137cbf6ebcd0584bf2e8
                                                        • Instruction Fuzzy Hash: 0A41C271A00219ABEB219F64CC49FEA7FA9FF08354F10052AF958E7281D7719E84CB90
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0050BCFD
                                                        • IsMenu.USER32(00000000), ref: 0050BD1D
                                                        • CreatePopupMenu.USER32 ref: 0050BD53
                                                        • GetMenuItemCount.USER32(014E7460), ref: 0050BDA4
                                                        • InsertMenuItemW.USER32(014E7460,?,00000001,00000030), ref: 0050BDCC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                        • String ID: 0$2
                                                        • API String ID: 93392585-3793063076
                                                        • Opcode ID: 522828f38477c6d1137253b49408a5b55ed91eb761f4fe8925999547680ca399
                                                        • Instruction ID: c6aa574b8e378174c94ebba8f0b19f2928733f45e7d1cc1478c64f052a00a7d6
                                                        • Opcode Fuzzy Hash: 522828f38477c6d1137253b49408a5b55ed91eb761f4fe8925999547680ca399
                                                        • Instruction Fuzzy Hash: 84519C72A002069BEB20DFA8D8C9BAEFFF4BF95314F148619E811A72D1D7709944CB61
                                                        APIs
                                                        • _ValidateLocalCookies.LIBCMT ref: 004C2D4B
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 004C2D53
                                                        • _ValidateLocalCookies.LIBCMT ref: 004C2DE1
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 004C2E0C
                                                        • _ValidateLocalCookies.LIBCMT ref: 004C2E61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: &HL$csm
                                                        • API String ID: 1170836740-204362301
                                                        • Opcode ID: e79af5f953c96cba593554029b04014fce97676312b7b6830ad85a42cad882e0
                                                        • Instruction ID: e5de45abd4c67a6e52d85b62cd27078a3c1682c5ebbd1410930c3a6a12b93a06
                                                        • Opcode Fuzzy Hash: e79af5f953c96cba593554029b04014fce97676312b7b6830ad85a42cad882e0
                                                        • Instruction Fuzzy Hash: 7041E438A00208ABCF50DF69C944F9EBBA0BF54328F14805EE8156B392D7B99A05CB95
                                                        APIs
                                                        • LoadIconW.USER32(00000000,00007F03), ref: 0050C913
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2457776203-404129466
                                                        • Opcode ID: 8569ff7fdda9c162694d1334ad2b4032237d774a281a99de4f491b2d2dddc78e
                                                        • Instruction ID: 64cfdc3222c8538ee9501138647e36455518966c890de5e7577bce111af8993e
                                                        • Opcode Fuzzy Hash: 8569ff7fdda9c162694d1334ad2b4032237d774a281a99de4f491b2d2dddc78e
                                                        • Instruction Fuzzy Hash: 0C112B35789306BAE7145B549C83DAE2F9CFF16718B10452FF904A62C2D7756D005268
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$LocalTime
                                                        • String ID:
                                                        • API String ID: 952045576-0
                                                        • Opcode ID: df298b16b397ca4564c617b94f00f39a0ff27ba5aaf437e9f367bf1cee4b98ad
                                                        • Instruction ID: c66dd4ced25a34aeba981d2ccde7b7d527e1a4f094536d2c11d71c5c927083f0
                                                        • Opcode Fuzzy Hash: df298b16b397ca4564c617b94f00f39a0ff27ba5aaf437e9f367bf1cee4b98ad
                                                        • Instruction Fuzzy Hash: 47419369C1011865CB91EBB5C88AECFB7ACAF45310F50886FE518E3162EB38D245C3A9
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,004F682C,00000004,00000000,00000000), ref: 004BF953
                                                        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,004F682C,00000004,00000000,00000000), ref: 004FF3D1
                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,004F682C,00000004,00000000,00000000), ref: 004FF454
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ShowWindow
                                                        • String ID:
                                                        • API String ID: 1268545403-0
                                                        • Opcode ID: ff00ed9216d6caf96b7d52bd08b6986f4b8b6aa8a0a25064211b88bbfddf7532
                                                        • Instruction ID: bda7b29af9020bac1db77a6d7b17d176e754b74b09647ebfc5816ecf8629a233
                                                        • Opcode Fuzzy Hash: ff00ed9216d6caf96b7d52bd08b6986f4b8b6aa8a0a25064211b88bbfddf7532
                                                        • Instruction Fuzzy Hash: 6A410671208640BBC7398B2D8C887BB7B91AF66314F14443FE54F52760C639A88DEB39
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00532D1B
                                                        • GetDC.USER32(00000000), ref: 00532D23
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00532D2E
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00532D3A
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00532D76
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00532D87
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00535A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00532DC2
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00532DE1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID:
                                                        • API String ID: 3864802216-0
                                                        • Opcode ID: 58fc187f2e1e10a4b79771ba5f2f9a7932a5f7437bf184760f2ea8387b53c2d4
                                                        • Instruction ID: 56948cb2f33106d36961fb25b1cdbc4de73f404875131977458c282f101f6b3a
                                                        • Opcode Fuzzy Hash: 58fc187f2e1e10a4b79771ba5f2f9a7932a5f7437bf184760f2ea8387b53c2d4
                                                        • Instruction Fuzzy Hash: 77318B72201614BBEB218F54CC8AFEB3FA9FB19711F044055FE08AA291C6759C41CBA0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: c0d17c94fa954ab6c99d2e93462f3c229d59f6dbc57fb3398aafaa9e9320e2bf
                                                        • Instruction ID: e302e2a00707379f783dc0517618a26e9671cfb1e44c7bbcd224a5233de74dd5
                                                        • Opcode Fuzzy Hash: c0d17c94fa954ab6c99d2e93462f3c229d59f6dbc57fb3398aafaa9e9320e2bf
                                                        • Instruction Fuzzy Hash: 5521FC75A84A09B7E31455118E92FFF3B5CBF21388F440029FD059A9D2F726ED108EE9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                        • API String ID: 0-572801152
                                                        • Opcode ID: a9c88cf96b39b36ef448aa542019de7ee4417196ac8cb2055f210814696b5f29
                                                        • Instruction ID: 0688a7194a370b99bba6880733715db70e03c71921b5e9a6530845738403737d
                                                        • Opcode Fuzzy Hash: a9c88cf96b39b36ef448aa542019de7ee4417196ac8cb2055f210814696b5f29
                                                        • Instruction Fuzzy Hash: 1FD1D175A0061A9FDF10CFA8D884BAEBBB5FF49304F148469E915AB2C1E770DD45CB90
                                                        APIs
                                                        • GetCPInfo.KERNEL32(?,?), ref: 004E15CE
                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 004E1651
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004E16E4
                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 004E16FB
                                                          • Part of subcall function 004D3820: RtlAllocateHeap.NTDLL(00000000,?,00571444,?,004BFDF5,?,?,004AA976,00000010,00571440,004A13FC,?,004A13C6,?,004A1129), ref: 004D3852
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004E1777
                                                        • __freea.LIBCMT ref: 004E17A2
                                                        • __freea.LIBCMT ref: 004E17AE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                        • String ID:
                                                        • API String ID: 2829977744-0
                                                        • Opcode ID: e2dbd849d4edfeaae71788f4c72f46eaeb7bc26454dc2b700b9265ba311413e3
                                                        • Instruction ID: f78ca52211735c17b8af8e01ad20bd52b7139d773714c70331236836c2c110f4
                                                        • Opcode Fuzzy Hash: e2dbd849d4edfeaae71788f4c72f46eaeb7bc26454dc2b700b9265ba311413e3
                                                        • Instruction Fuzzy Hash: 3D91C371E40286ABDB208E76C881EEF7BB5AF45711F18465BE801E7261D73DCC40C768
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                        • API String ID: 2610073882-625585964
                                                        • Opcode ID: f75ae7a540a47695439be32beb356be9d18ba97ea44004a8cccb106ea426d55d
                                                        • Instruction ID: 8fae26793ddcec0fd658152c129f6c52c41f3108e1976e3ad6ed76b57513a402
                                                        • Opcode Fuzzy Hash: f75ae7a540a47695439be32beb356be9d18ba97ea44004a8cccb106ea426d55d
                                                        • Instruction Fuzzy Hash: AC91A071A00229ABDF20CFA5D884FAEBFB8FF46714F148559F515AB280D7709945CFA0
                                                        APIs
                                                        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0051125C
                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00511284
                                                        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 005112A8
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 005112D8
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0051135F
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 005113C4
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00511430
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                        • String ID:
                                                        • API String ID: 2550207440-0
                                                        • Opcode ID: ff4858ea42d9009aec483257b7a3615a679cd0fd4686c34aaccef1f5eb47761d
                                                        • Instruction ID: 6cea0085d782b3c25bfecfedeecf4cf54c586c7efbad6b6c2dd4f287f61fa802
                                                        • Opcode Fuzzy Hash: ff4858ea42d9009aec483257b7a3615a679cd0fd4686c34aaccef1f5eb47761d
                                                        • Instruction Fuzzy Hash: 50916675A00609AFEB00CF95C884BFEBBB4FF44715F104469E610EB291D7B8AC81CB98
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: dcb37ff8cc666905162b39ae285f94c0e4c3e5eff9a82591018345d265f54c51
                                                        • Instruction ID: 4be17b3f7f9053c0195041085199e185a0efad5771149d887f185d3a8b17537b
                                                        • Opcode Fuzzy Hash: dcb37ff8cc666905162b39ae285f94c0e4c3e5eff9a82591018345d265f54c51
                                                        • Instruction Fuzzy Hash: 61912671944219AFCB14CFA9CC84AEEBBB8FF49320F14405AE615B7251D378AD42CB64
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 0052396B
                                                        • CharUpperBuffW.USER32(?,?), ref: 00523A7A
                                                        • _wcslen.LIBCMT ref: 00523A8A
                                                        • VariantClear.OLEAUT32(?), ref: 00523C1F
                                                          • Part of subcall function 00510CDF: VariantInit.OLEAUT32(00000000), ref: 00510D1F
                                                          • Part of subcall function 00510CDF: VariantCopy.OLEAUT32(?,?), ref: 00510D28
                                                          • Part of subcall function 00510CDF: VariantClear.OLEAUT32(?), ref: 00510D34
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                        • API String ID: 4137639002-1221869570
                                                        • Opcode ID: b3819682ea7f337d4e2f7e022ac02ca14bda80b06976012a99bda4c189ec795a
                                                        • Instruction ID: 65ebaab4bf2a8786c4df6b58acf335fd5cb341628f8fa8bd1ca7e2a2b423adeb
                                                        • Opcode Fuzzy Hash: b3819682ea7f337d4e2f7e022ac02ca14bda80b06976012a99bda4c189ec795a
                                                        • Instruction Fuzzy Hash: 9C916A756083159FC704EF24D48496ABBE4FF8A318F04882EF88997391DB34EE45CB92
                                                        APIs
                                                          • Part of subcall function 0050000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,004FFF41,80070057,?,?,?,0050035E), ref: 0050002B
                                                          • Part of subcall function 0050000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004FFF41,80070057,?,?), ref: 00500046
                                                          • Part of subcall function 0050000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004FFF41,80070057,?,?), ref: 00500054
                                                          • Part of subcall function 0050000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004FFF41,80070057,?), ref: 00500064
                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00524C51
                                                        • _wcslen.LIBCMT ref: 00524D59
                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00524DCF
                                                        • CoTaskMemFree.OLE32(?), ref: 00524DDA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                        • String ID: NULL Pointer assignment
                                                        • API String ID: 614568839-2785691316
                                                        • Opcode ID: 5b6b704ee54d551c3a247099b4e2d9049556a3aed1bf774a50221cbd2c27cbc8
                                                        • Instruction ID: d9fab96c3873e69806cda95c5c4861bf25b4415e603d90ef23816ae59b83a78f
                                                        • Opcode Fuzzy Hash: 5b6b704ee54d551c3a247099b4e2d9049556a3aed1bf774a50221cbd2c27cbc8
                                                        • Instruction Fuzzy Hash: AD912771D00229AFDF14DFA4D891AEEBBB8BF09304F10856AE915B7291DB349E44CF61
                                                        APIs
                                                        • GetMenu.USER32(?), ref: 00532183
                                                        • GetMenuItemCount.USER32(00000000), ref: 005321B5
                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 005321DD
                                                        • _wcslen.LIBCMT ref: 00532213
                                                        • GetMenuItemID.USER32(?,?), ref: 0053224D
                                                        • GetSubMenu.USER32(?,?), ref: 0053225B
                                                          • Part of subcall function 00503A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00503A57
                                                          • Part of subcall function 00503A3D: GetCurrentThreadId.KERNEL32 ref: 00503A5E
                                                          • Part of subcall function 00503A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005025B3), ref: 00503A65
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 005322E3
                                                          • Part of subcall function 0050E97B: Sleep.KERNEL32 ref: 0050E9F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                        • String ID:
                                                        • API String ID: 4196846111-0
                                                        • Opcode ID: b1259f5b2a8a24af8498d1a728a393a179682862591dcbfe689e792aa6a645d5
                                                        • Instruction ID: 0e61dd6cc19934d9cd9c3001db966036aaeb3cf2aa5c406924b252501e1d1726
                                                        • Opcode Fuzzy Hash: b1259f5b2a8a24af8498d1a728a393a179682862591dcbfe689e792aa6a645d5
                                                        • Instruction Fuzzy Hash: 0B717C75A00605AFCB10EF69C885AAEBBF5BF88314F148459F816EB351DB34ED41CBA0
                                                        APIs
                                                        • GetParent.USER32(?), ref: 0050AEF9
                                                        • GetKeyboardState.USER32(?), ref: 0050AF0E
                                                        • SetKeyboardState.USER32(?), ref: 0050AF6F
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 0050AF9D
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 0050AFBC
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 0050AFFD
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0050B020
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: 08db6af13de9a07aeac161d97725393bb0583ea46bb62701dbee1b27669d2500
                                                        • Instruction ID: 66377ffa68d4fe07e9e2df9913a59bd7f1dbb435d78ad9b710f9f418818a7c5d
                                                        • Opcode Fuzzy Hash: 08db6af13de9a07aeac161d97725393bb0583ea46bb62701dbee1b27669d2500
                                                        • Instruction Fuzzy Hash: 3151A3A0A047D63DFB368334CC99BBE7EA97B06304F088589E1D9954C3D399ACC8D751
                                                        APIs
                                                        • GetParent.USER32(00000000), ref: 0050AD19
                                                        • GetKeyboardState.USER32(?), ref: 0050AD2E
                                                        • SetKeyboardState.USER32(?), ref: 0050AD8F
                                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0050ADBB
                                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0050ADD8
                                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0050AE17
                                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0050AE38
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: d0d9b673dad273d20eb580058d018dfbefb274341f5ac6b1015524f105c4bd05
                                                        • Instruction ID: 62ef93b7f5397c95daf814478048a159b703774aa8049481c5a1314e20e0e818
                                                        • Opcode Fuzzy Hash: d0d9b673dad273d20eb580058d018dfbefb274341f5ac6b1015524f105c4bd05
                                                        • Instruction Fuzzy Hash: FA51B5A15047D63DFB378334CC95BBEBEA97B46300F088589E1D55A8C3D294EC88E762
                                                        APIs
                                                        • GetConsoleCP.KERNEL32(004E3CD6,?,?,?,?,?,?,?,?,004D5BA3,?,?,004E3CD6,?,?), ref: 004D5470
                                                        • __fassign.LIBCMT ref: 004D54EB
                                                        • __fassign.LIBCMT ref: 004D5506
                                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,004E3CD6,00000005,00000000,00000000), ref: 004D552C
                                                        • WriteFile.KERNEL32(?,004E3CD6,00000000,004D5BA3,00000000,?,?,?,?,?,?,?,?,?,004D5BA3,?), ref: 004D554B
                                                        • WriteFile.KERNEL32(?,?,00000001,004D5BA3,00000000,?,?,?,?,?,?,?,?,?,004D5BA3,?), ref: 004D5584
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                        • String ID:
                                                        • API String ID: 1324828854-0
                                                        • Opcode ID: 4aaa1b719c979d1a56f636009fdb95899d2eacb92cc2e60563047e0a30d690df
                                                        • Instruction ID: 7d4d2e0fa818dc03efb9ebf3e2169d47b55fc24be54fc085d17718bd394f5eea
                                                        • Opcode Fuzzy Hash: 4aaa1b719c979d1a56f636009fdb95899d2eacb92cc2e60563047e0a30d690df
                                                        • Instruction Fuzzy Hash: BB51E3B0A00648AFCB11CFA8E861AEEBBF9EF19300F14411BF555E3391DB349A41CB65
                                                        APIs
                                                          • Part of subcall function 0052304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0052307A
                                                          • Part of subcall function 0052304E: _wcslen.LIBCMT ref: 0052309B
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00521112
                                                        • WSAGetLastError.WSOCK32 ref: 00521121
                                                        • WSAGetLastError.WSOCK32 ref: 005211C9
                                                        • closesocket.WSOCK32(00000000), ref: 005211F9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 2675159561-0
                                                        • Opcode ID: 91e2538f9b58c729da3d4e6b0e87a1cec482888be99abe75a8b0808fca9741d1
                                                        • Instruction ID: f7bb899751636e4b39b5023855624cab7311e26a5036e1f5f57ca8f8286cd687
                                                        • Opcode Fuzzy Hash: 91e2538f9b58c729da3d4e6b0e87a1cec482888be99abe75a8b0808fca9741d1
                                                        • Instruction Fuzzy Hash: CE411431600614AFDB109F24D884BAABFE9FF56328F148059FD06AB2D1C774AE45CBE5
                                                        APIs
                                                          • Part of subcall function 0050DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0050CF22,?), ref: 0050DDFD
                                                          • Part of subcall function 0050DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0050CF22,?), ref: 0050DE16
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0050CF45
                                                        • MoveFileW.KERNEL32(?,?), ref: 0050CF7F
                                                        • _wcslen.LIBCMT ref: 0050D005
                                                        • _wcslen.LIBCMT ref: 0050D01B
                                                        • SHFileOperationW.SHELL32(?), ref: 0050D061
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 3164238972-1173974218
                                                        • Opcode ID: 1765aefd31166b6611fe29053aac004007bc6ca989b83e8fb11c80cc2528f39c
                                                        • Instruction ID: 425506546c30724c6ab84d0e0b510d3dada727dd2f6d3bb1e3efc3e767b718c1
                                                        • Opcode Fuzzy Hash: 1765aefd31166b6611fe29053aac004007bc6ca989b83e8fb11c80cc2528f39c
                                                        • Instruction Fuzzy Hash: 034189B18052195FDF12EFA4C985EDE7FB8BF55380F1000EAE505E7181EB34AA48CB51
                                                        APIs
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00532E1C
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00532E4F
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00532E84
                                                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00532EB6
                                                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00532EE0
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00532EF1
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00532F0B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$MessageSend
                                                        • String ID:
                                                        • API String ID: 2178440468-0
                                                        • Opcode ID: 58274c385c2242985ee28ab8e9d1cd9f0908aa216a59ba29e1dc8f4576f1baba
                                                        • Instruction ID: 69520e05874e8c8c3ebc23714faa3237e702d90b2365e93a406fb1819ddc2be2
                                                        • Opcode Fuzzy Hash: 58274c385c2242985ee28ab8e9d1cd9f0908aa216a59ba29e1dc8f4576f1baba
                                                        • Instruction Fuzzy Hash: AA310335604650AFDB21CF5CEC86F653BE9FBAAB10F150164FA049F2B1CB71A885EB41
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00507769
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0050778F
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00507792
                                                        • SysAllocString.OLEAUT32(?), ref: 005077B0
                                                        • SysFreeString.OLEAUT32(?), ref: 005077B9
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 005077DE
                                                        • SysAllocString.OLEAUT32(?), ref: 005077EC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 7c38a5ba79708e8b2a79fc01c8b9c1b09aad108d1d30c4043d1e58b65a685f7c
                                                        • Instruction ID: 2d2419ed09881428ff6381362f081df0169d9f5d019fcaaa5043de8c18ea5170
                                                        • Opcode Fuzzy Hash: 7c38a5ba79708e8b2a79fc01c8b9c1b09aad108d1d30c4043d1e58b65a685f7c
                                                        • Instruction Fuzzy Hash: 2B21AE76A0421DAFDF10DFA8CC88CBF7BACFB093A47008425BA14DB290D670EC459764
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00507842
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00507868
                                                        • SysAllocString.OLEAUT32(00000000), ref: 0050786B
                                                        • SysAllocString.OLEAUT32 ref: 0050788C
                                                        • SysFreeString.OLEAUT32 ref: 00507895
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 005078AF
                                                        • SysAllocString.OLEAUT32(?), ref: 005078BD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: c67efe04485f4761c31beb9a3942b53d31672d8816fef9c8ede3207627730401
                                                        • Instruction ID: 9d65756c49aae788843515106ab39ee19a35db24ca25b71ca8de86827d048e63
                                                        • Opcode Fuzzy Hash: c67efe04485f4761c31beb9a3942b53d31672d8816fef9c8ede3207627730401
                                                        • Instruction Fuzzy Hash: 7D215E32A08208AFDF109BA8DC88DAA7BACFF0D7607148125B915DB2A1D674EC55DB64
                                                        APIs
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 005104F2
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0051052E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CreateHandlePipe
                                                        • String ID: nul
                                                        • API String ID: 1424370930-2873401336
                                                        • Opcode ID: deb81584a10af77fbaf9665f9c583cf04dc155cad446e80597bc0300b4bac9ed
                                                        • Instruction ID: 2486fbbb4cb96339e28c42a2c666aecf40daf6aa3b2830f1cebf4acc4f5df05e
                                                        • Opcode Fuzzy Hash: deb81584a10af77fbaf9665f9c583cf04dc155cad446e80597bc0300b4bac9ed
                                                        • Instruction Fuzzy Hash: C7217C75500305ABEF209F29D844AAA7FA5BF54724F204A19F8A1E62E0D7B099D4DF20
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 005105C6
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00510601
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CreateHandlePipe
                                                        • String ID: nul
                                                        • API String ID: 1424370930-2873401336
                                                        • Opcode ID: 77f2fdb05b9a728862bd4b85ce51626169f8a2d99c1433a9216172caaa61345c
                                                        • Instruction ID: 3baca586e07900e1ddc81f3ae6ad1813e0d5a2af5a97d461229a90553d5a5c54
                                                        • Opcode Fuzzy Hash: 77f2fdb05b9a728862bd4b85ce51626169f8a2d99c1433a9216172caaa61345c
                                                        • Instruction Fuzzy Hash: 142165755003059BEB209F69DC44AEA7FE4BF95720F205A19F8A1E72D0D7F099E0DB50
                                                        APIs
                                                          • Part of subcall function 004A600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004A604C
                                                          • Part of subcall function 004A600E: GetStockObject.GDI32(00000011), ref: 004A6060
                                                          • Part of subcall function 004A600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 004A606A
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00534112
                                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0053411F
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0053412A
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00534139
                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00534145
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 1025951953-3636473452
                                                        • Opcode ID: f0838e0099e5ca163386a33365488240af590d6a57fb482f9d7a45277d504e81
                                                        • Instruction ID: d310d0aa557236edfe9739e6fb7121c8bfbecc0510618c81a0ff6b36587ab6f4
                                                        • Opcode Fuzzy Hash: f0838e0099e5ca163386a33365488240af590d6a57fb482f9d7a45277d504e81
                                                        • Instruction Fuzzy Hash: 0411B2B214021DBEEF118F64CC86EE77F5DFF18798F014111FA18A6150CA729C61DBA4
                                                        APIs
                                                          • Part of subcall function 004DD7A3: _free.LIBCMT ref: 004DD7CC
                                                        • _free.LIBCMT ref: 004DD82D
                                                          • Part of subcall function 004D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004DD7D1,00000000,00000000,00000000,00000000,?,004DD7F8,00000000,00000007,00000000,?,004DDBF5,00000000), ref: 004D29DE
                                                          • Part of subcall function 004D29C8: GetLastError.KERNEL32(00000000,?,004DD7D1,00000000,00000000,00000000,00000000,?,004DD7F8,00000000,00000007,00000000,?,004DDBF5,00000000,00000000), ref: 004D29F0
                                                        • _free.LIBCMT ref: 004DD838
                                                        • _free.LIBCMT ref: 004DD843
                                                        • _free.LIBCMT ref: 004DD897
                                                        • _free.LIBCMT ref: 004DD8A2
                                                        • _free.LIBCMT ref: 004DD8AD
                                                        • _free.LIBCMT ref: 004DD8B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                        • Instruction ID: e28b1b8014b55cfbe98980bfb0d8cc91044ae864a863bd9cb6d35fc2ac4bd29c
                                                        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                        • Instruction Fuzzy Hash: F41151B1A40B04AAD521BFB2CC67FCB7BDC6F10704F40086FF29DA6292DA6DB5055654
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0050DA74
                                                        • LoadStringW.USER32(00000000), ref: 0050DA7B
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0050DA91
                                                        • LoadStringW.USER32(00000000), ref: 0050DA98
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0050DADC
                                                        Strings
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 0050DAB9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message
                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                        • API String ID: 4072794657-3128320259
                                                        • Opcode ID: abe2a43db59da85c9f1d33f90e73d8a5f8c90eab0b63542c55a868d2ecb4f66b
                                                        • Instruction ID: 125bb34235719f2a3180b40571d1925c58a52aea03cb7c9e503042da46b83c3e
                                                        • Opcode Fuzzy Hash: abe2a43db59da85c9f1d33f90e73d8a5f8c90eab0b63542c55a868d2ecb4f66b
                                                        • Instruction Fuzzy Hash: 340186F25002087FEB109BE49D89EEB3B6CF708301F400495B706F2181EA749E889F74
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(014DEF10,014DEF10), ref: 0051097B
                                                        • EnterCriticalSection.KERNEL32(014DEEF0,00000000), ref: 0051098D
                                                        • TerminateThread.KERNEL32(00000007,000001F6), ref: 0051099B
                                                        • WaitForSingleObject.KERNEL32(00000007,000003E8), ref: 005109A9
                                                        • CloseHandle.KERNEL32(00000007), ref: 005109B8
                                                        • InterlockedExchange.KERNEL32(014DEF10,000001F6), ref: 005109C8
                                                        • LeaveCriticalSection.KERNEL32(014DEEF0), ref: 005109CF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: bd77290145bbac2cf247566f2fa43bc66a455d007adbe5b93a5b67efa85ff292
                                                        • Instruction ID: 8e87f87b8df96f9b2bb83f9db7a0320a1a91f0e30291802fe2c34dfcb4fbb67e
                                                        • Opcode Fuzzy Hash: bd77290145bbac2cf247566f2fa43bc66a455d007adbe5b93a5b67efa85ff292
                                                        • Instruction Fuzzy Hash: D5F03131442502BBE7415F94EE8CBD67F35FF15702F402015F141A19A1C7B494B9DF90
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 004A5D30
                                                        • GetWindowRect.USER32(?,?), ref: 004A5D71
                                                        • ScreenToClient.USER32(?,?), ref: 004A5D99
                                                        • GetClientRect.USER32(?,?), ref: 004A5ED7
                                                        • GetWindowRect.USER32(?,?), ref: 004A5EF8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Rect$Client$Window$Screen
                                                        • String ID:
                                                        • API String ID: 1296646539-0
                                                        • Opcode ID: 3beaa10a506be9bfc780f1abe02b3bce032b262fa9838aadf05c3bb678ab94af
                                                        • Instruction ID: 8f4d22fe17fc375b5f8b9a137c0bd5c9fb8b1542742502c31f5bc26e2e26259e
                                                        • Opcode Fuzzy Hash: 3beaa10a506be9bfc780f1abe02b3bce032b262fa9838aadf05c3bb678ab94af
                                                        • Instruction Fuzzy Hash: 84B17A78A0068ADBDB10CFA9C5407EEB7F1FF68310F14841AE8A9D7250D738AA51DB59
                                                        APIs
                                                        • __allrem.LIBCMT ref: 004D00BA
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004D00D6
                                                        • __allrem.LIBCMT ref: 004D00ED
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004D010B
                                                        • __allrem.LIBCMT ref: 004D0122
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004D0140
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                        • String ID:
                                                        • API String ID: 1992179935-0
                                                        • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                        • Instruction ID: 2b6d903c312eaf3e5d3da0c8c358c7d367becd56103ee78a9fc4dbc10bdcce14
                                                        • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                        • Instruction Fuzzy Hash: 1181CF76A00706AAE7209A2ACC51B6B73A9EF41328F24413FF451D7781E77DD9048798
                                                        APIs
                                                          • Part of subcall function 00523149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,0052101C,00000000,?,?,00000000), ref: 00523195
                                                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00521DC0
                                                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00521DE1
                                                        • WSAGetLastError.WSOCK32 ref: 00521DF2
                                                        • inet_ntoa.WSOCK32(?), ref: 00521E8C
                                                        • htons.WSOCK32(?,?,?,?,?), ref: 00521EDB
                                                        • _strlen.LIBCMT ref: 00521F35
                                                          • Part of subcall function 005039E8: _strlen.LIBCMT ref: 005039F2
                                                          • Part of subcall function 004A6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,004BCF58,?,?,?), ref: 004A6DBA
                                                          • Part of subcall function 004A6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,004BCF58,?,?,?), ref: 004A6DED
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                        • String ID:
                                                        • API String ID: 1923757996-0
                                                        • Opcode ID: 152b533e33a417184a4ee2290673a66cdef37a074a8cf73d4e9d334b52a0fe96
                                                        • Instruction ID: a1881ee7123d695916262f1a5c684424da4775a2829b9411877d0b618d390426
                                                        • Opcode Fuzzy Hash: 152b533e33a417184a4ee2290673a66cdef37a074a8cf73d4e9d334b52a0fe96
                                                        • Instruction Fuzzy Hash: 97A10F31104710AFC324EF21D885E2BBBA5BFA6308F54894DF4565B2E2CB35ED46CBA5
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,004C82D9,004C82D9,?,?,?,004D644F,00000001,00000001,8BE85006), ref: 004D6258
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,004D644F,00000001,00000001,8BE85006,?,?,?), ref: 004D62DE
                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 004D63D8
                                                        • __freea.LIBCMT ref: 004D63E5
                                                          • Part of subcall function 004D3820: RtlAllocateHeap.NTDLL(00000000,?,00571444,?,004BFDF5,?,?,004AA976,00000010,00571440,004A13FC,?,004A13C6,?,004A1129), ref: 004D3852
                                                        • __freea.LIBCMT ref: 004D63EE
                                                        • __freea.LIBCMT ref: 004D6413
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1414292761-0
                                                        • Opcode ID: 24c93e0b845c25d3a536c84b8013510b46dfddc9c0ef67c98ea13e11069b5c43
                                                        • Instruction ID: fe8f6d450db04c38050625b263e127ca57cc0f9014ba4aa835b47a6fc26a7d2b
                                                        • Opcode Fuzzy Hash: 24c93e0b845c25d3a536c84b8013510b46dfddc9c0ef67c98ea13e11069b5c43
                                                        • Instruction Fuzzy Hash: 0B511172600216ABDB259F64CCA1EAF7BA9EB44714F16422BFC05D6341DB3CDC44D668
                                                        APIs
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                          • Part of subcall function 0052C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0052B6AE,?,?), ref: 0052C9B5
                                                          • Part of subcall function 0052C998: _wcslen.LIBCMT ref: 0052C9F1
                                                          • Part of subcall function 0052C998: _wcslen.LIBCMT ref: 0052CA68
                                                          • Part of subcall function 0052C998: _wcslen.LIBCMT ref: 0052CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0052BCCA
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0052BD25
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0052BD6A
                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0052BD99
                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0052BDF3
                                                        • RegCloseKey.ADVAPI32(?), ref: 0052BDFF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                        • String ID:
                                                        • API String ID: 1120388591-0
                                                        • Opcode ID: 49dec5eaca874a5ff86efb0ff0af3452c8a7bfee97becbc0e9cd75a24b4329be
                                                        • Instruction ID: 11b1b5fee4b14fa1eb78299474b86b0a14b7ee4d33ec7ad44b93c9ba538204f0
                                                        • Opcode Fuzzy Hash: 49dec5eaca874a5ff86efb0ff0af3452c8a7bfee97becbc0e9cd75a24b4329be
                                                        • Instruction Fuzzy Hash: 4A81CF70208241EFD714DF24D885E6ABBE9FF86308F14895DF4598B2A2DB31ED45CB92
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000035), ref: 004FF7B9
                                                        • SysAllocString.OLEAUT32(00000001), ref: 004FF860
                                                        • VariantCopy.OLEAUT32(004FFA64,00000000), ref: 004FF889
                                                        • VariantClear.OLEAUT32(004FFA64), ref: 004FF8AD
                                                        • VariantCopy.OLEAUT32(004FFA64,00000000), ref: 004FF8B1
                                                        • VariantClear.OLEAUT32(?), ref: 004FF8BB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCopy$AllocInitString
                                                        • String ID:
                                                        • API String ID: 3859894641-0
                                                        • Opcode ID: bf3189c9be6f6fe4b582217b7c63cee7ab615cd7b2102920113d895b08849ef9
                                                        • Instruction ID: 451fa2a16f966aedafb0a923444de318e63366814b8e73ad85c0338ecb79abb4
                                                        • Opcode Fuzzy Hash: bf3189c9be6f6fe4b582217b7c63cee7ab615cd7b2102920113d895b08849ef9
                                                        • Instruction Fuzzy Hash: F5510B71500314BBCF10AB66D895B39B3A8EF55314F14446BEA05DF291D7B88C48D76F
                                                        APIs
                                                          • Part of subcall function 004A7620: _wcslen.LIBCMT ref: 004A7625
                                                          • Part of subcall function 004A6B57: _wcslen.LIBCMT ref: 004A6B6A
                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 005194E5
                                                        • _wcslen.LIBCMT ref: 00519506
                                                        • _wcslen.LIBCMT ref: 0051952D
                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00519585
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$FileName$OpenSave
                                                        • String ID: X
                                                        • API String ID: 83654149-3081909835
                                                        • Opcode ID: 6620d051019ac9c840609a76e190cbe72a78d7104dbe807decb7b622d72ee611
                                                        • Instruction ID: 21aef8f837d0cf5eba5125e888c5ca21d3718863743a4f96988d213af43ea8ff
                                                        • Opcode Fuzzy Hash: 6620d051019ac9c840609a76e190cbe72a78d7104dbe807decb7b622d72ee611
                                                        • Instruction Fuzzy Hash: D7E1F5315043009FD724EF25C891AAEBBE1FF95318F04896DF8999B2A2DB34DD44CB96
                                                        APIs
                                                          • Part of subcall function 004B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 004B9BB2
                                                        • BeginPaint.USER32(?,?,?), ref: 004B9241
                                                        • GetWindowRect.USER32(?,?), ref: 004B92A5
                                                        • ScreenToClient.USER32(?,?), ref: 004B92C2
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 004B92D3
                                                        • EndPaint.USER32(?,?,?,?,?), ref: 004B9321
                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 004F71EA
                                                          • Part of subcall function 004B9339: BeginPath.GDI32(00000000), ref: 004B9357
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                        • String ID:
                                                        • API String ID: 3050599898-0
                                                        • Opcode ID: 0ac61421dcf54e5765d2524b2890fc90827ed6d93a70f85d618fe9e8cf5cc11f
                                                        • Instruction ID: b6ceab3bd13764d0ca95ac27a1b1eaa4aa54929103adf13a08956c61228d6b06
                                                        • Opcode Fuzzy Hash: 0ac61421dcf54e5765d2524b2890fc90827ed6d93a70f85d618fe9e8cf5cc11f
                                                        • Instruction Fuzzy Hash: 3441A131104200AFD711DF28DC85FBA7BE8EB59324F14066AFA54972A1C7399C4AEB66
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0051080C
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00510847
                                                        • EnterCriticalSection.KERNEL32(?), ref: 00510863
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 005108DC
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 005108F3
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00510921
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3368777196-0
                                                        • Opcode ID: e5c56b3c84b8786772b293b3f535d14ab18bd64b088f68cea3fc26a2b0603ef6
                                                        • Instruction ID: 6c10053987b33f00d0ea10007820e1011b065081284932fd8fa8ed5bfa7024ea
                                                        • Opcode Fuzzy Hash: e5c56b3c84b8786772b293b3f535d14ab18bd64b088f68cea3fc26a2b0603ef6
                                                        • Instruction Fuzzy Hash: 2641BC71900205EBEF04AF65DC81AAA7BB8FF04304F1040A9FD04AB297D774DEA4DBA4
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,004FF3AB,00000000,?,?,00000000,?,004F682C,00000004,00000000,00000000), ref: 0053824C
                                                        • EnableWindow.USER32(00000000,00000000), ref: 00538272
                                                        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 005382D1
                                                        • ShowWindow.USER32(00000000,00000004), ref: 005382E5
                                                        • EnableWindow.USER32(00000000,00000001), ref: 0053830B
                                                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0053832F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$Show$Enable$MessageSend
                                                        • String ID:
                                                        • API String ID: 642888154-0
                                                        • Opcode ID: e42e9e655227e4e5b899f2a6037e804cbb173ff9531e1148314877275c9d2321
                                                        • Instruction ID: f5486a9e81933a3ce49e7f9d2700da96a71bc30a40d7857fcf5ba379aa2e7b1f
                                                        • Opcode Fuzzy Hash: e42e9e655227e4e5b899f2a6037e804cbb173ff9531e1148314877275c9d2321
                                                        • Instruction Fuzzy Hash: 29419234601B44AFDB19CF19DC99BB57FE0FB5AB14F184169FA088F262CB31A845DB50
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00504C95
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00504CB2
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00504CEA
                                                        • _wcslen.LIBCMT ref: 00504D08
                                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00504D10
                                                        • _wcsstr.LIBVCRUNTIME ref: 00504D1A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                        • String ID:
                                                        • API String ID: 72514467-0
                                                        • Opcode ID: 0f000045acea6ca066c23b9fe73c93fc1a8c22bb8a4e1bba81b8dc4b9d0cc4c3
                                                        • Instruction ID: 63e0c4a92f6e19ea105362c9af7af9446f0901a773e8f04e06ab6279b1bac8d4
                                                        • Opcode Fuzzy Hash: 0f000045acea6ca066c23b9fe73c93fc1a8c22bb8a4e1bba81b8dc4b9d0cc4c3
                                                        • Instruction Fuzzy Hash: D121D7B22042107BEB155B3A9C4AE7F7F9CEF55754F10402EF909DE191DA65DD009BA0
                                                        APIs
                                                          • Part of subcall function 004A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004A3A97,?,?,004A2E7F,?,?,?,00000000), ref: 004A3AC2
                                                        • _wcslen.LIBCMT ref: 0051587B
                                                        • CoInitialize.OLE32(00000000), ref: 00515995
                                                        • CoCreateInstance.OLE32(0053FCF8,00000000,00000001,0053FB68,?), ref: 005159AE
                                                        • CoUninitialize.OLE32 ref: 005159CC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 3172280962-24824748
                                                        • Opcode ID: e20bbe277e063b6dbb0bf08ba1f6c1421bda2f340e1dd76a038137ffb90c14e5
                                                        • Instruction ID: 99d579a5f612682988d3b3808a13f2925813780e32db54138610dbddc2fe8fad
                                                        • Opcode Fuzzy Hash: e20bbe277e063b6dbb0bf08ba1f6c1421bda2f340e1dd76a038137ffb90c14e5
                                                        • Instruction Fuzzy Hash: 25D16574608601DFD714DF25C480A6ABBE1FF99714F14485EF88A9B361EB31EC85CB92
                                                        APIs
                                                          • Part of subcall function 00500FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00500FCA
                                                          • Part of subcall function 00500FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00500FD6
                                                          • Part of subcall function 00500FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00500FE5
                                                          • Part of subcall function 00500FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00500FEC
                                                          • Part of subcall function 00500FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00501002
                                                        • GetLengthSid.ADVAPI32(?,00000000,00501335), ref: 005017AE
                                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 005017BA
                                                        • HeapAlloc.KERNEL32(00000000), ref: 005017C1
                                                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 005017DA
                                                        • GetProcessHeap.KERNEL32(00000000,00000000,00501335), ref: 005017EE
                                                        • HeapFree.KERNEL32(00000000), ref: 005017F5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                        • String ID:
                                                        • API String ID: 3008561057-0
                                                        • Opcode ID: 8f4211489079c13443171fd8e52626668cef558011d5fe8963a6524f9039a8d5
                                                        • Instruction ID: 52f6f79012f4b47ae4beac5ad0685e17e47ec814113dd0f4135a9a7fd66bc415
                                                        • Opcode Fuzzy Hash: 8f4211489079c13443171fd8e52626668cef558011d5fe8963a6524f9039a8d5
                                                        • Instruction Fuzzy Hash: B411BE32500605FFDB189FA4CC49BAE7FE9FB55355F104018F481E7290C735A944EB65
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 005014FF
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00501506
                                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00501515
                                                        • CloseHandle.KERNEL32(00000004), ref: 00501520
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0050154F
                                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00501563
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 1413079979-0
                                                        • Opcode ID: 10b9e438c7b96f71a12c91d8bc029028e21241b9a61905dacb7a8d807d06e02f
                                                        • Instruction ID: 0fb1d772bd8b4a7315d7b02b6729f04d26bea68ee72dbd3d1289dad4981ea19b
                                                        • Opcode Fuzzy Hash: 10b9e438c7b96f71a12c91d8bc029028e21241b9a61905dacb7a8d807d06e02f
                                                        • Instruction Fuzzy Hash: 4E112672500249ABDF118FA8DD49FDE7FA9FF48748F044029FA05A61A0C3758E68EB65
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,004C3379,004C2FE5), ref: 004C3390
                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004C339E
                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004C33B7
                                                        • SetLastError.KERNEL32(00000000,?,004C3379,004C2FE5), ref: 004C3409
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastValue___vcrt_
                                                        • String ID:
                                                        • API String ID: 3852720340-0
                                                        • Opcode ID: 77ecd46c30f02e9709eb50e5034637e9bc5a4996ee5bc11243a0fd5844eb17a3
                                                        • Instruction ID: 6052f7df049d840bba22d679b4205c19b2f20de57d4edc1b6fe2c980c1d82348
                                                        • Opcode Fuzzy Hash: 77ecd46c30f02e9709eb50e5034637e9bc5a4996ee5bc11243a0fd5844eb17a3
                                                        • Instruction Fuzzy Hash: 4101D63A30C3116A96B42B797C95F6B2E54D72577F320822FF410812F1EE595D05614C
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,004D5686,004E3CD6,?,00000000,?,004D5B6A,?,?,?,?,?,004CE6D1,?,00568A48), ref: 004D2D78
                                                        • _free.LIBCMT ref: 004D2DAB
                                                        • _free.LIBCMT ref: 004D2DD3
                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,004CE6D1,?,00568A48,00000010,004A4F4A,?,?,00000000,004E3CD6), ref: 004D2DE0
                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,004CE6D1,?,00568A48,00000010,004A4F4A,?,?,00000000,004E3CD6), ref: 004D2DEC
                                                        • _abort.LIBCMT ref: 004D2DF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_free$_abort
                                                        • String ID:
                                                        • API String ID: 3160817290-0
                                                        • Opcode ID: acade5f77034f75de0ae2d032e43c1b1984633c86e4e006153642972ef95dcfa
                                                        • Instruction ID: da680cd3318c88d04d051d91cb1643e89edd3b1a7bf77001cb3ad8cdc4673632
                                                        • Opcode Fuzzy Hash: acade5f77034f75de0ae2d032e43c1b1984633c86e4e006153642972ef95dcfa
                                                        • Instruction Fuzzy Hash: C2F0F93150460027C21227397E36A5B29566FF27A5F24041FF424D33D1EEFC88056229
                                                        APIs
                                                          • Part of subcall function 004B9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 004B9693
                                                          • Part of subcall function 004B9639: SelectObject.GDI32(?,00000000), ref: 004B96A2
                                                          • Part of subcall function 004B9639: BeginPath.GDI32(?), ref: 004B96B9
                                                          • Part of subcall function 004B9639: SelectObject.GDI32(?,00000000), ref: 004B96E2
                                                        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00538A4E
                                                        • LineTo.GDI32(?,00000003,00000000), ref: 00538A62
                                                        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00538A70
                                                        • LineTo.GDI32(?,00000000,00000003), ref: 00538A80
                                                        • EndPath.GDI32(?), ref: 00538A90
                                                        • StrokePath.GDI32(?), ref: 00538AA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                        • String ID:
                                                        • API String ID: 43455801-0
                                                        • Opcode ID: 2e218535d5b89c0085b6d220bc5309605f41f3a1739192afeb4aa1270cd056b4
                                                        • Instruction ID: 22f56c85a3d699d8370805db229d8ee4adbbb26386bc2651e205e1ea325160dc
                                                        • Opcode Fuzzy Hash: 2e218535d5b89c0085b6d220bc5309605f41f3a1739192afeb4aa1270cd056b4
                                                        • Instruction Fuzzy Hash: 73111B7600014CFFDF129F94DC88EAA7F6CEB18354F008052BA19AA2A1C7719D59EFA0
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00505218
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00505229
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00505230
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00505238
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0050524F
                                                        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00505261
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$Release
                                                        • String ID:
                                                        • API String ID: 1035833867-0
                                                        • Opcode ID: f440f46c0e3a36ca8d6c7bafe68b8ec4241594bda1234c515ce7ca5ce15d0e8d
                                                        • Instruction ID: 8c7d648e11cf514f35eb97284484d9e43b6a93411e7514f0bc9f834c262d101a
                                                        • Opcode Fuzzy Hash: f440f46c0e3a36ca8d6c7bafe68b8ec4241594bda1234c515ce7ca5ce15d0e8d
                                                        • Instruction Fuzzy Hash: 5D014F75A00719BBEB109BE69C49A5EBFB8FF58751F044066FA04E7391D6709804DFA0
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 004A1BF4
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 004A1BFC
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004A1C07
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004A1C12
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 004A1C1A
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 004A1C22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: a804534593292eed471e983bd71540bc2743bd25d39f01cb2693f9c0ceb5950c
                                                        • Instruction ID: 004f9b85d94751e33f26da9cb4dc35a745f0ed582e025089701c29a316f1ad39
                                                        • Opcode Fuzzy Hash: a804534593292eed471e983bd71540bc2743bd25d39f01cb2693f9c0ceb5950c
                                                        • Instruction Fuzzy Hash: D4016CB09027597DE3008F5A8C85B52FFA8FF19354F00411B915C4BA41C7F5A864CBE5
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0050EB30
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0050EB46
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 0050EB55
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0050EB64
                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0050EB6E
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0050EB75
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: 0a667eb9c0964a1d1f700b1a509d40e8c1e57cb83621af8fe2cf7ac3604ed58f
                                                        • Instruction ID: c80b6dfa533636f0b71940d54d6c77e783fba5d87f7c07b1397d5221d9ca9d9b
                                                        • Opcode Fuzzy Hash: 0a667eb9c0964a1d1f700b1a509d40e8c1e57cb83621af8fe2cf7ac3604ed58f
                                                        • Instruction Fuzzy Hash: A7F05E72240158BBE7215B669C0EEEF3E7CEFDBB11F004158F601E5291D7A05A05E7B5
                                                        APIs
                                                        • GetClientRect.USER32(?), ref: 004F7452
                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 004F7469
                                                        • GetWindowDC.USER32(?), ref: 004F7475
                                                        • GetPixel.GDI32(00000000,?,?), ref: 004F7484
                                                        • ReleaseDC.USER32(?,00000000), ref: 004F7496
                                                        • GetSysColor.USER32(00000005), ref: 004F74B0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                        • String ID:
                                                        • API String ID: 272304278-0
                                                        • Opcode ID: 64fb3e753cba368998079016fe64ad2f9582972409330c81b4289870d844dbb4
                                                        • Instruction ID: 8d337cffaa8d3ba0a5b6c69ea427553ecfcf33aa9f7e8961f2ab0f6b4066fbc0
                                                        • Opcode Fuzzy Hash: 64fb3e753cba368998079016fe64ad2f9582972409330c81b4289870d844dbb4
                                                        • Instruction Fuzzy Hash: 4A018B31400609EFEB105FA8DC09BAA7FB5FB14311F1000A1FA16A22A0CB351E55FB11
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0050187F
                                                        • UnloadUserProfile.USERENV(?,?), ref: 0050188B
                                                        • CloseHandle.KERNEL32(?), ref: 00501894
                                                        • CloseHandle.KERNEL32(?), ref: 0050189C
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 005018A5
                                                        • HeapFree.KERNEL32(00000000), ref: 005018AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                        • String ID:
                                                        • API String ID: 146765662-0
                                                        • Opcode ID: 0024ec10a5a33081d56148640608fc361862c80507b2cc8fa5906394fab8fa94
                                                        • Instruction ID: 55d97d302e576f7da309f4398e8612e8c847ca7999c88780bb4264d84b014cc8
                                                        • Opcode Fuzzy Hash: 0024ec10a5a33081d56148640608fc361862c80507b2cc8fa5906394fab8fa94
                                                        • Instruction Fuzzy Hash: 3BE0E536004101BBDB015FA1ED0C90ABF39FF69B22B108624F225A1270CB329434FF50
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 004ABEB3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: D%W$D%W$D%W$D%WD%W
                                                        • API String ID: 1385522511-699628468
                                                        • Opcode ID: 16d1aa515d3b19747ed008874ebc606ed7777837e44ebe451a9593bc31fd7b6b
                                                        • Instruction ID: 58f9df65710f6ef76f991a450ea63a73206dfe6f3b18c8ead534578ad04a093c
                                                        • Opcode Fuzzy Hash: 16d1aa515d3b19747ed008874ebc606ed7777837e44ebe451a9593bc31fd7b6b
                                                        • Instruction Fuzzy Hash: 83914C75A00206CFCB14CF59C090AAAB7F1FF6A310F24816ED945AB352D739AD81DBD4
                                                        APIs
                                                          • Part of subcall function 004C0242: EnterCriticalSection.KERNEL32(0057070C,00571884,?,?,004B198B,00572518,?,?,?,004A12F9,00000000), ref: 004C024D
                                                          • Part of subcall function 004C0242: LeaveCriticalSection.KERNEL32(0057070C,?,004B198B,00572518,?,?,?,004A12F9,00000000), ref: 004C028A
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                          • Part of subcall function 004C00A3: __onexit.LIBCMT ref: 004C00A9
                                                        • __Init_thread_footer.LIBCMT ref: 00527BFB
                                                          • Part of subcall function 004C01F8: EnterCriticalSection.KERNEL32(0057070C,?,?,004B8747,00572514), ref: 004C0202
                                                          • Part of subcall function 004C01F8: LeaveCriticalSection.KERNEL32(0057070C,?,004B8747,00572514), ref: 004C0235
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                        • String ID: +TO$5$G$Variable must be of type 'Object'.
                                                        • API String ID: 535116098-707387787
                                                        • Opcode ID: c749bf5a6b860c9999bc4a65a843d175b012d4a738ca44a4185635feaaf009c8
                                                        • Instruction ID: 261648412d77c21255f531d0f9582a334252d339e85d2ccf98fe82a2cdad4376
                                                        • Opcode Fuzzy Hash: c749bf5a6b860c9999bc4a65a843d175b012d4a738ca44a4185635feaaf009c8
                                                        • Instruction Fuzzy Hash: A891AB70A04219EFCB04EF94E894DADBBB1FF4A304F14845DF806AB292DB31AE41DB51
                                                        APIs
                                                          • Part of subcall function 004A7620: _wcslen.LIBCMT ref: 004A7625
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0050C6EE
                                                        • _wcslen.LIBCMT ref: 0050C735
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0050C79C
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0050C7CA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info_wcslen$Default
                                                        • String ID: 0
                                                        • API String ID: 1227352736-4108050209
                                                        • Opcode ID: d546670d0d5e28264fb93ef4b04282ce329968cb9be2f2c5d7483cefb14da639
                                                        • Instruction ID: 71df39e5a8c5b2701da15b26bdfff544c2895dbed84aa9ef9cf5b7f14e2baad6
                                                        • Opcode Fuzzy Hash: d546670d0d5e28264fb93ef4b04282ce329968cb9be2f2c5d7483cefb14da639
                                                        • Instruction Fuzzy Hash: 6351BC716043009BD7649F28C885BAE7FE8FF9A314F040B2EF995E21E0DB64D9089B56
                                                        APIs
                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 0052AEA3
                                                          • Part of subcall function 004A7620: _wcslen.LIBCMT ref: 004A7625
                                                        • GetProcessId.KERNEL32(00000000), ref: 0052AF38
                                                        • CloseHandle.KERNEL32(00000000), ref: 0052AF67
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CloseExecuteHandleProcessShell_wcslen
                                                        • String ID: <$@
                                                        • API String ID: 146682121-1426351568
                                                        • Opcode ID: 88b7d8dd2b5e92a746f665d7fd3187f745e86955271d7b6e4482fb5771a83cf1
                                                        • Instruction ID: aadc42891a9f705ceaeced62b2b851850b76b64c211686d10142d2c57468b4db
                                                        • Opcode Fuzzy Hash: 88b7d8dd2b5e92a746f665d7fd3187f745e86955271d7b6e4482fb5771a83cf1
                                                        • Instruction Fuzzy Hash: 5D718975A00624DFCB14EF55D480A9EBBF4BF0A308F04849EE816AB392C778ED45CB95
                                                        APIs
                                                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00507206
                                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0050723C
                                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0050724D
                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 005072CF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                                        • String ID: DllGetClassObject
                                                        • API String ID: 753597075-1075368562
                                                        • Opcode ID: aea6bd80d312babd7f3be1ed30afdad5991b2deeb70e438274988c737956165c
                                                        • Instruction ID: d1cefbc49aa23771fee0a03148e30126207f49450e26ad5b8ee60593f86163d7
                                                        • Opcode Fuzzy Hash: aea6bd80d312babd7f3be1ed30afdad5991b2deeb70e438274988c737956165c
                                                        • Instruction Fuzzy Hash: 17418F75A04209EFDB15CF54C884A9E7FA9FF48310F1584A9BD059F28AD7B0EE44DBA0
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00533E35
                                                        • IsMenu.USER32(?), ref: 00533E4A
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00533E92
                                                        • DrawMenuBar.USER32 ref: 00533EA5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$DrawInfoInsert
                                                        • String ID: 0
                                                        • API String ID: 3076010158-4108050209
                                                        • Opcode ID: 546e255331d30fc001350a9bea7892cbdc47e2d26c1e798428400ab457db6393
                                                        • Instruction ID: 482beae9ba2bf9f0803bd015a546e744d492b3193bd964ac4f6666e660a1ac05
                                                        • Opcode Fuzzy Hash: 546e255331d30fc001350a9bea7892cbdc47e2d26c1e798428400ab457db6393
                                                        • Instruction Fuzzy Hash: A1414575A01209AFDB10DF64D884EAABBB9FF49354F044129E905AB350D730AE55EF60
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                        • API String ID: 176396367-4004644295
                                                        • Opcode ID: 5737b0d04cd531291b73ea12be878bc798fd266bd03a1970c4f5e630aec0bbd7
                                                        • Instruction ID: 714eedc2472fe1d66627909ddc48cbf96bbbe491e0c6ffb05f2f646da0139a36
                                                        • Opcode Fuzzy Hash: 5737b0d04cd531291b73ea12be878bc798fd266bd03a1970c4f5e630aec0bbd7
                                                        • Instruction Fuzzy Hash: 8331F573A005794ACB20DF2DE9505BE3F91BFA3794B05402EE855AB2C6E775CE8493A0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00532F8D
                                                        • LoadLibraryW.KERNEL32(?), ref: 00532F94
                                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00532FA9
                                                        • DestroyWindow.USER32(?), ref: 00532FB1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyLibraryLoadWindow
                                                        • String ID: SysAnimate32
                                                        • API String ID: 3529120543-1011021900
                                                        • Opcode ID: 28a0443efc7032ab9b90a10b1f6addf72b5ae21e56a27ca391004a4bbf09bdf1
                                                        • Instruction ID: d733e5b1a6436f4b9d146eae9a0d11c1cc3d8579919235b68d6fa62e46cfb88d
                                                        • Opcode Fuzzy Hash: 28a0443efc7032ab9b90a10b1f6addf72b5ae21e56a27ca391004a4bbf09bdf1
                                                        • Instruction Fuzzy Hash: 5B21C071204605ABEB104F64DC86EBB7BBDFF59368F100618F954D6190D771DC91A760
                                                        APIs
                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004C4D1E,004D28E9,?,004C4CBE,004D28E9,005688B8,0000000C,004C4E15,004D28E9,00000002), ref: 004C4D8D
                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 004C4DA0
                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,004C4D1E,004D28E9,?,004C4CBE,004D28E9,005688B8,0000000C,004C4E15,004D28E9,00000002,00000000), ref: 004C4DC3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: 89aa44add5d80d7385c67ec5f04d1a3a4d9610fcfd70279cd2fb36ec290069e1
                                                        • Instruction ID: f7afa786729c6fe3e58f63b0576733490d0e1e42e5ce41c68fdfb02f18da0542
                                                        • Opcode Fuzzy Hash: 89aa44add5d80d7385c67ec5f04d1a3a4d9610fcfd70279cd2fb36ec290069e1
                                                        • Instruction Fuzzy Hash: C0F0AF39A00208BBDB509F90DC09FEEBFB4EF54715F0000A9F906A63A0CB745A44EB95
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,004A4EDD,?,00571418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 004A4E9C
                                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 004A4EAE
                                                        • FreeLibrary.KERNEL32(00000000,?,?,004A4EDD,?,00571418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 004A4EC0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                        • API String ID: 145871493-3689287502
                                                        • Opcode ID: d4c781656a9bbcc5afde37fcd0be2b91531a7aec67b8295639c41ea79f2649d0
                                                        • Instruction ID: f73da69336b937ffd5a22a32ae1574303b858b0e713e8abbeeb7aa0708dbe7c8
                                                        • Opcode Fuzzy Hash: d4c781656a9bbcc5afde37fcd0be2b91531a7aec67b8295639c41ea79f2649d0
                                                        • Instruction Fuzzy Hash: EAE08636A016225BD22117256C18A5F6E54AFE3B63B050116FC01F3300DBA4CD05A2E4
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,004E3CDE,?,00571418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 004A4E62
                                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 004A4E74
                                                        • FreeLibrary.KERNEL32(00000000,?,?,004E3CDE,?,00571418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 004A4E87
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                        • API String ID: 145871493-1355242751
                                                        • Opcode ID: 03c1db25dcb4add31be38974b31a7687a8f4de29fc3b990e4ea26307610fd9d3
                                                        • Instruction ID: ea658c250665f79d72f2f690fff0d4d829d627205c10e7f560e2452bea312421
                                                        • Opcode Fuzzy Hash: 03c1db25dcb4add31be38974b31a7687a8f4de29fc3b990e4ea26307610fd9d3
                                                        • Instruction Fuzzy Hash: 4DD0C2365026215786221B247C18D8F6E18BFE3B213050112B801F7310CFA4CD01E6D4
                                                        APIs
                                                        • GetCurrentProcessId.KERNEL32 ref: 0052A427
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0052A435
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0052A468
                                                        • CloseHandle.KERNEL32(?), ref: 0052A63D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                                        • String ID:
                                                        • API String ID: 3488606520-0
                                                        • Opcode ID: 9fd7caafe72465d06ae2156641a7d43d58d5741e463da3e65d737d3eb6b4de69
                                                        • Instruction ID: 6a452c60ad567bf63cf2e25b5082a5c9df01d66684313ef79f3425a6e37f12e4
                                                        • Opcode Fuzzy Hash: 9fd7caafe72465d06ae2156641a7d43d58d5741e463da3e65d737d3eb6b4de69
                                                        • Instruction Fuzzy Hash: 65A1CF71604300AFD720DF25D882F2ABBE1AF95718F14881DF95A9B3D2D7B4EC418B92
                                                        APIs
                                                          • Part of subcall function 0050DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0050CF22,?), ref: 0050DDFD
                                                          • Part of subcall function 0050DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0050CF22,?), ref: 0050DE16
                                                          • Part of subcall function 0050E199: GetFileAttributesW.KERNEL32(?,0050CF95), ref: 0050E19A
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0050E473
                                                        • MoveFileW.KERNEL32(?,?), ref: 0050E4AC
                                                        • _wcslen.LIBCMT ref: 0050E5EB
                                                        • _wcslen.LIBCMT ref: 0050E603
                                                        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0050E650
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                        • String ID:
                                                        • API String ID: 3183298772-0
                                                        • Opcode ID: a0e4575f1f7f1c79a283d9cb1ff3379e1e494e99345b6cea2bf2dbf636107f6a
                                                        • Instruction ID: 39d2a050aa5ae1e4ee2b75842fc07ef5354295bc2c7c191867345f0c33e21eb6
                                                        • Opcode Fuzzy Hash: a0e4575f1f7f1c79a283d9cb1ff3379e1e494e99345b6cea2bf2dbf636107f6a
                                                        • Instruction Fuzzy Hash: 8151C1B20083455BC764EBA0DC81ADFB7ECAF95344F104D2EF589D3191EF35A688876A
                                                        APIs
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                          • Part of subcall function 0052C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0052B6AE,?,?), ref: 0052C9B5
                                                          • Part of subcall function 0052C998: _wcslen.LIBCMT ref: 0052C9F1
                                                          • Part of subcall function 0052C998: _wcslen.LIBCMT ref: 0052CA68
                                                          • Part of subcall function 0052C998: _wcslen.LIBCMT ref: 0052CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0052BAA5
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0052BB00
                                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0052BB63
                                                        • RegCloseKey.ADVAPI32(?,?), ref: 0052BBA6
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0052BBB3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                        • String ID:
                                                        • API String ID: 826366716-0
                                                        • Opcode ID: 6f1597e03df1b417f3b389dc45b0e2005cafcc4c3c487f6e01b53833038b074f
                                                        • Instruction ID: da0b422becb2bc7c4e88408962d3624c7bcddf7c5e893ea422e8f46ce2f6aee4
                                                        • Opcode Fuzzy Hash: 6f1597e03df1b417f3b389dc45b0e2005cafcc4c3c487f6e01b53833038b074f
                                                        • Instruction Fuzzy Hash: B161D231208241EFD714DF14D494E2ABBE5FF86348F14895DF4998B2A2CB35ED45CB92
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00508BCD
                                                        • VariantClear.OLEAUT32 ref: 00508C3E
                                                        • VariantClear.OLEAUT32 ref: 00508C9D
                                                        • VariantClear.OLEAUT32(?), ref: 00508D10
                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00508D3B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ChangeInitType
                                                        • String ID:
                                                        • API String ID: 4136290138-0
                                                        • Opcode ID: 67027d7bc22bb73cf38aa6faa8d34c2436268ef1d5172119f94205dddde989be
                                                        • Instruction ID: f6fc9e4cfb0d0a918fa4c3c28f933af3eed9699f9633ef286f89061fd803bade
                                                        • Opcode Fuzzy Hash: 67027d7bc22bb73cf38aa6faa8d34c2436268ef1d5172119f94205dddde989be
                                                        • Instruction Fuzzy Hash: 275169B5A00619EFCB10CF68C884EAABBF8FF89310B158559E945EB350E730E911CF90
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00518BAE
                                                        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00518BDA
                                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00518C32
                                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00518C57
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00518C5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String
                                                        • String ID:
                                                        • API String ID: 2832842796-0
                                                        • Opcode ID: 99a6e378859172670a2686f105d88de45768d03549c8f7c3957d15a7a2160c7f
                                                        • Instruction ID: 48ed5a2f0088bba1a4a19a516ae52ba986955db292bf5c9ad6d5741f93631ecf
                                                        • Opcode Fuzzy Hash: 99a6e378859172670a2686f105d88de45768d03549c8f7c3957d15a7a2160c7f
                                                        • Instruction Fuzzy Hash: 40515C35A00214EFDB10DF65C881AAEBBF5FF49318F088459E849AB362DB35ED51CB94
                                                        APIs
                                                        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00528F40
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00528FD0
                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00528FEC
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00529032
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00529052
                                                          • Part of subcall function 004BF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00511043,?,753CE610), ref: 004BF6E6
                                                          • Part of subcall function 004BF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,004FFA64,00000000,00000000,?,?,00511043,?,753CE610,?,004FFA64), ref: 004BF70D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                        • String ID:
                                                        • API String ID: 666041331-0
                                                        • Opcode ID: 9e55167907ee8d8bd679d393f91ebf2431d486d3aca77a60a6bbda1877fe18e0
                                                        • Instruction ID: afa2967b487786e0d057880b6ae137f574b78e0f72714e1dcbdb4539bec87efb
                                                        • Opcode Fuzzy Hash: 9e55167907ee8d8bd679d393f91ebf2431d486d3aca77a60a6bbda1877fe18e0
                                                        • Instruction Fuzzy Hash: 46513B35601215DFC711DF55C4948ADBBF1FF5A358F088099E809AB3A2DB35ED85CB90
                                                        APIs
                                                        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00536C33
                                                        • SetWindowLongW.USER32(?,000000EC,?), ref: 00536C4A
                                                        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00536C73
                                                        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0051AB79,00000000,00000000), ref: 00536C98
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00536CC7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$MessageSendShow
                                                        • String ID:
                                                        • API String ID: 3688381893-0
                                                        • Opcode ID: 1f8606d3f36ee6eb02067a52a8264d4c44cf76c82dcd4275727bbc7d9512c7bd
                                                        • Instruction ID: f92e567ea896ef7e08cfcf4c033f0455083949e495e2eeb2b14e124a1d237866
                                                        • Opcode Fuzzy Hash: 1f8606d3f36ee6eb02067a52a8264d4c44cf76c82dcd4275727bbc7d9512c7bd
                                                        • Instruction Fuzzy Hash: 7A419F35A04108BFDB24CF28CC59FA9BFA5FB09350F15926CE999AB2A0C371ED41DA50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: 8278a529b8511cd5b4d8d439836626147d5d47dea23f7f834331e0d00fc6c22d
                                                        • Instruction ID: 73624924707184cdf360c3704b0622ae999bd3ba329219284d3ee96301d52486
                                                        • Opcode Fuzzy Hash: 8278a529b8511cd5b4d8d439836626147d5d47dea23f7f834331e0d00fc6c22d
                                                        • Instruction Fuzzy Hash: 6141F172A00200AFCB20DF79CA90A6EB7A1EF98314B1581ABE605EB351D675AD01DB84
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 004B9141
                                                        • ScreenToClient.USER32(00000000,?), ref: 004B915E
                                                        • GetAsyncKeyState.USER32(00000001), ref: 004B9183
                                                        • GetAsyncKeyState.USER32(00000002), ref: 004B919D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorScreen
                                                        • String ID:
                                                        • API String ID: 4210589936-0
                                                        • Opcode ID: d7de96cefd6a2ca4caf2f3af7438b1459ea497de69199326e38686625a011cb5
                                                        • Instruction ID: 44a3687bc63bb7d2c6213aeb26a0ee827d1b0b6934370cdc3a48f9d94b03f076
                                                        • Opcode Fuzzy Hash: d7de96cefd6a2ca4caf2f3af7438b1459ea497de69199326e38686625a011cb5
                                                        • Instruction Fuzzy Hash: 86416E3190850ABBDF059F68C848BFEBB74FF05324F20821AE525A6390C7385D54DBA5
                                                        APIs
                                                        • GetInputState.USER32 ref: 005138CB
                                                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00513922
                                                        • TranslateMessage.USER32(?), ref: 0051394B
                                                        • DispatchMessageW.USER32(?), ref: 00513955
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00513966
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                        • String ID:
                                                        • API String ID: 2256411358-0
                                                        • Opcode ID: cc5be42a307d35be0a530c1148c284ddff06b1534c267c8b54b782476b8967d7
                                                        • Instruction ID: 72f8197354708105b4dd258720084311bd6b05febb8f12e5544e74e66b0ef517
                                                        • Opcode Fuzzy Hash: cc5be42a307d35be0a530c1148c284ddff06b1534c267c8b54b782476b8967d7
                                                        • Instruction Fuzzy Hash: 6C31D770504741AEFB35CF34A869FF63FA8FB25304F04096DE466961A0E3B496C9EB51
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0051C21E,00000000), ref: 0051CF38
                                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 0051CF6F
                                                        • GetLastError.KERNEL32(?,00000000,?,?,?,0051C21E,00000000), ref: 0051CFB4
                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,0051C21E,00000000), ref: 0051CFC8
                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,0051C21E,00000000), ref: 0051CFF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                        • String ID:
                                                        • API String ID: 3191363074-0
                                                        • Opcode ID: 50c1f0702048043789f0c13c4be96344b3e0c04d7f959281633c91b8ccc047ba
                                                        • Instruction ID: 302d35c1f7ed2fc26905cbef6dc9018905298bea0f4ce799f378b830770e7116
                                                        • Opcode Fuzzy Hash: 50c1f0702048043789f0c13c4be96344b3e0c04d7f959281633c91b8ccc047ba
                                                        • Instruction Fuzzy Hash: 52314C71540205AFEB20DFA5C884AEBBFF9FB14354B10442EF516E2241EB35EE86DB60
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00501915
                                                        • PostMessageW.USER32(00000001,00000201,00000001), ref: 005019C1
                                                        • Sleep.KERNEL32(00000000,?,?,?), ref: 005019C9
                                                        • PostMessageW.USER32(00000001,00000202,00000000), ref: 005019DA
                                                        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 005019E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleep$RectWindow
                                                        • String ID:
                                                        • API String ID: 3382505437-0
                                                        • Opcode ID: 7f8a26ec0c9f414a0d8a8bdf9413fe42b743a0997cddbf17f5e9b7c4e986b584
                                                        • Instruction ID: cd2151c67f36e2aa164911053bd805ac140f566802e90625e2e5d8c7a085025e
                                                        • Opcode Fuzzy Hash: 7f8a26ec0c9f414a0d8a8bdf9413fe42b743a0997cddbf17f5e9b7c4e986b584
                                                        • Instruction Fuzzy Hash: 5231AB72A00619EFCB00CFA8C999AEE3FB5FB55315F104629F921AB2D1C7709944DB91
                                                        APIs
                                                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00535745
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 0053579D
                                                        • _wcslen.LIBCMT ref: 005357AF
                                                        • _wcslen.LIBCMT ref: 005357BA
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00535816
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen
                                                        • String ID:
                                                        • API String ID: 763830540-0
                                                        • Opcode ID: 7094e2a78ffee37e319e9523237455d1a73c388a1b9c22dab153c0111b8de7e4
                                                        • Instruction ID: c608c11c651eaab8b756a8c8aff042b781a7a1a1713aabf17f3d3da0e7064178
                                                        • Opcode Fuzzy Hash: 7094e2a78ffee37e319e9523237455d1a73c388a1b9c22dab153c0111b8de7e4
                                                        • Instruction Fuzzy Hash: E421B475904618DADF208FA4DC85AEE7FB8FF54324F109616F929EB280E7708A85CF50
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 00520951
                                                        • GetForegroundWindow.USER32 ref: 00520968
                                                        • GetDC.USER32(00000000), ref: 005209A4
                                                        • GetPixel.GDI32(00000000,?,00000003), ref: 005209B0
                                                        • ReleaseDC.USER32(00000000,00000003), ref: 005209E8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: ca4bdc9edf7db7880115061acc8d2ec738cd1eb3058cda3d979ab87f0a0aa99e
                                                        • Instruction ID: f8504a9b7c69b31bf5fbf68aadf519302762f82a71f697fbe1eebb53fde82fbc
                                                        • Opcode Fuzzy Hash: ca4bdc9edf7db7880115061acc8d2ec738cd1eb3058cda3d979ab87f0a0aa99e
                                                        • Instruction Fuzzy Hash: 3A219235600214AFD704EF69D889A9EBFE9FF55704F04806DE846A77A2CB30EC44DB50
                                                        APIs
                                                        • GetEnvironmentStringsW.KERNEL32 ref: 004DCDC6
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004DCDE9
                                                          • Part of subcall function 004D3820: RtlAllocateHeap.NTDLL(00000000,?,00571444,?,004BFDF5,?,?,004AA976,00000010,00571440,004A13FC,?,004A13C6,?,004A1129), ref: 004D3852
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 004DCE0F
                                                        • _free.LIBCMT ref: 004DCE22
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004DCE31
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                        • String ID:
                                                        • API String ID: 336800556-0
                                                        • Opcode ID: 51c9930ebc4d2ebdc1bf504d1d5c1ce44a23723169e9d13d3d9a65e409eee7a9
                                                        • Instruction ID: 1f347b65c043104c556d92dbb09e32f9ec8e9e622d886afd85ebe7e4e030651a
                                                        • Opcode Fuzzy Hash: 51c9930ebc4d2ebdc1bf504d1d5c1ce44a23723169e9d13d3d9a65e409eee7a9
                                                        • Instruction Fuzzy Hash: E801D8B26012167F272116BB6CD8D7BBE6DDEC6BA1315012FF905D7300DA688D01E2B8
                                                        APIs
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 004B9693
                                                        • SelectObject.GDI32(?,00000000), ref: 004B96A2
                                                        • BeginPath.GDI32(?), ref: 004B96B9
                                                        • SelectObject.GDI32(?,00000000), ref: 004B96E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: 59357b07dc6a9a93b7f5cd925db798d35fd38e81bc3b11231a92d99b680ff21f
                                                        • Instruction ID: 900595c293c3dde660d2266b34033597605224f22292ad039bc82859a20f491e
                                                        • Opcode Fuzzy Hash: 59357b07dc6a9a93b7f5cd925db798d35fd38e81bc3b11231a92d99b680ff21f
                                                        • Instruction Fuzzy Hash: 14216031801609EFDB119F68EC197EA7BA4BB20315F100216F614A62A0D3785C9AFBAC
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: be35defa462cff15f14e53220a40ea779808354600c74c13867cb7b23414113b
                                                        • Instruction ID: 5597f931321d24283a1b0f6337ebff991f55aba7de74a98ea82d2db5c3f27203
                                                        • Opcode Fuzzy Hash: be35defa462cff15f14e53220a40ea779808354600c74c13867cb7b23414113b
                                                        • Instruction Fuzzy Hash: A301F5A5681609BBE71851119E82FBF7B4CFF223DCF000029FE049A6D2F724ED109BA5
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,004CF2DE,004D3863,00571444,?,004BFDF5,?,?,004AA976,00000010,00571440,004A13FC,?,004A13C6), ref: 004D2DFD
                                                        • _free.LIBCMT ref: 004D2E32
                                                        • _free.LIBCMT ref: 004D2E59
                                                        • SetLastError.KERNEL32(00000000,004A1129), ref: 004D2E66
                                                        • SetLastError.KERNEL32(00000000,004A1129), ref: 004D2E6F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_free
                                                        • String ID:
                                                        • API String ID: 3170660625-0
                                                        • Opcode ID: 05379d2809ef9f9537c1598ab47dbaf6ba497e34363a2a3093be285155ce257f
                                                        • Instruction ID: 85f5a68adde4843e24fc77e1bc117ef09d159e6b2df23745c4fdea625e817f7e
                                                        • Opcode Fuzzy Hash: 05379d2809ef9f9537c1598ab47dbaf6ba497e34363a2a3093be285155ce257f
                                                        • Instruction Fuzzy Hash: 53017D726006006BC61227366E65D2B2B5DABF13BA720042FF424E33D2EFFCCC056129
                                                        APIs
                                                        • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,004FFF41,80070057,?,?,?,0050035E), ref: 0050002B
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004FFF41,80070057,?,?), ref: 00500046
                                                        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004FFF41,80070057,?,?), ref: 00500054
                                                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004FFF41,80070057,?), ref: 00500064
                                                        • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004FFF41,80070057,?,?), ref: 00500070
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                                        • String ID:
                                                        • API String ID: 3897988419-0
                                                        • Opcode ID: 4572ddb1c256ba616e40744fa48ca91d37cae0781fb0e014c61942aefe6f9ba0
                                                        • Instruction ID: 2a4efca5337a25b900daebad65bbb9f78a63b178c0c89f5cf2456f5745d12bbd
                                                        • Opcode Fuzzy Hash: 4572ddb1c256ba616e40744fa48ca91d37cae0781fb0e014c61942aefe6f9ba0
                                                        • Instruction Fuzzy Hash: 3F018F76600204BFDB104F69DC0CBAEBEADFB44751F145124F905E2290DB71DE44ABA0
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 0050E997
                                                        • QueryPerformanceFrequency.KERNEL32(?), ref: 0050E9A5
                                                        • Sleep.KERNEL32(00000000), ref: 0050E9AD
                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 0050E9B7
                                                        • Sleep.KERNEL32 ref: 0050E9F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: 83e641925176222bd9b8262553053b5b1c53dbe9cbd0b5f0f5924d7bb32ef9c7
                                                        • Instruction ID: 3da9d9d9866f507d54a897f9fa2fde30de0e93fc4f1236b8dcc9ba92477a9e7b
                                                        • Opcode Fuzzy Hash: 83e641925176222bd9b8262553053b5b1c53dbe9cbd0b5f0f5924d7bb32ef9c7
                                                        • Instruction Fuzzy Hash: DA015731C01629DBCF00ABE5D95AAEDBF78BB18301F100946E502B2291CB309658EBA1
                                                        APIs
                                                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00501114
                                                        • GetLastError.KERNEL32(?,00000000,00000000,?,?,00500B9B,?,?,?), ref: 00501120
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00500B9B,?,?,?), ref: 0050112F
                                                        • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00500B9B,?,?,?), ref: 00501136
                                                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0050114D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 842720411-0
                                                        • Opcode ID: 82d6765795fc646808c660579ab0fa94437c6ef80c7ece88750b4ac07b156caf
                                                        • Instruction ID: ed55c61409f936e0ae8b71c258e5478d25f48919500c578e03f84f9269883d30
                                                        • Opcode Fuzzy Hash: 82d6765795fc646808c660579ab0fa94437c6ef80c7ece88750b4ac07b156caf
                                                        • Instruction Fuzzy Hash: 8B011975200615BFDB154FA5DC49A6A3F6EFF893A0B204419FA45E73A0DA31DC04EB60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00500FCA
                                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00500FD6
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00500FE5
                                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00500FEC
                                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00501002
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: d96a8a6a1a866f946ca0cebf37b4ca3e89b04a336045a7a78f27628c3e2d59a3
                                                        • Instruction ID: 35fde62185e266233b4bcadb5e659d8ab3180b737910b6a66f753361f1208a1c
                                                        • Opcode Fuzzy Hash: d96a8a6a1a866f946ca0cebf37b4ca3e89b04a336045a7a78f27628c3e2d59a3
                                                        • Instruction Fuzzy Hash: AAF04935200701ABDB224FA59C4DF5A3FADFF99762F104414FA85E7391DA70DC54AB60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0050102A
                                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00501036
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00501045
                                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0050104C
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00501062
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: 55b55a2fd34d6c5afbc79c08d3612e7c800f674615d8e23a34852e27215766f7
                                                        • Instruction ID: 806e8aa3838f74d13105c10fdce562bae60724bed2d9d905174aaa64767a0242
                                                        • Opcode Fuzzy Hash: 55b55a2fd34d6c5afbc79c08d3612e7c800f674615d8e23a34852e27215766f7
                                                        • Instruction Fuzzy Hash: 77F04935200701ABDB215FA6EC5DF5A3FADFF99761F100414FA85E7390CA70D854AB60
                                                        APIs
                                                        • CloseHandle.KERNEL32(?,?,?,?,0051017D,?,005132FC,?,00000001,004E2592,?), ref: 00510324
                                                        • CloseHandle.KERNEL32(?,?,?,?,0051017D,?,005132FC,?,00000001,004E2592,?), ref: 00510331
                                                        • CloseHandle.KERNEL32(?,?,?,?,0051017D,?,005132FC,?,00000001,004E2592,?), ref: 0051033E
                                                        • CloseHandle.KERNEL32(?,?,?,?,0051017D,?,005132FC,?,00000001,004E2592,?), ref: 0051034B
                                                        • CloseHandle.KERNEL32(?,?,?,?,0051017D,?,005132FC,?,00000001,004E2592,?), ref: 00510358
                                                        • CloseHandle.KERNEL32(?,?,?,?,0051017D,?,005132FC,?,00000001,004E2592,?), ref: 00510365
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle
                                                        • String ID:
                                                        • API String ID: 2962429428-0
                                                        • Opcode ID: f523c33a0e2e4d3bcdeda4be8dc80eac9a6586cb9594614bb726307828efa4c8
                                                        • Instruction ID: 3a1da09ee6cf4471f92bf7bf26bb5d326d8cb1bb3a379996a25451fa1332d864
                                                        • Opcode Fuzzy Hash: f523c33a0e2e4d3bcdeda4be8dc80eac9a6586cb9594614bb726307828efa4c8
                                                        • Instruction Fuzzy Hash: AC01EE72800B018FDB30AF66D880842FBF9BF603053049E3FD1A252970C3B0A999DF80
                                                        APIs
                                                        • _free.LIBCMT ref: 004DD752
                                                          • Part of subcall function 004D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004DD7D1,00000000,00000000,00000000,00000000,?,004DD7F8,00000000,00000007,00000000,?,004DDBF5,00000000), ref: 004D29DE
                                                          • Part of subcall function 004D29C8: GetLastError.KERNEL32(00000000,?,004DD7D1,00000000,00000000,00000000,00000000,?,004DD7F8,00000000,00000007,00000000,?,004DDBF5,00000000,00000000), ref: 004D29F0
                                                        • _free.LIBCMT ref: 004DD764
                                                        • _free.LIBCMT ref: 004DD776
                                                        • _free.LIBCMT ref: 004DD788
                                                        • _free.LIBCMT ref: 004DD79A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 397f8c71c66650d8342054bd906db316f57ae4f501e1b16e2cec890808008fc0
                                                        • Instruction ID: bdfa8ef44a19b3842e31d249ff9ffa21381d00260226b1c7294e1c492359a58e
                                                        • Opcode Fuzzy Hash: 397f8c71c66650d8342054bd906db316f57ae4f501e1b16e2cec890808008fc0
                                                        • Instruction Fuzzy Hash: C1F068B2A402046B8631EB59FAE5C177BDDBB54310B94084BF059D7702C778FC405668
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00505C58
                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00505C6F
                                                        • MessageBeep.USER32(00000000), ref: 00505C87
                                                        • KillTimer.USER32(?,0000040A), ref: 00505CA3
                                                        • EndDialog.USER32(?,00000001), ref: 00505CBD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                        • String ID:
                                                        • API String ID: 3741023627-0
                                                        • Opcode ID: d8b232672574d8ff4bf1ab540f27aca8870a72f097cb7dfa52f77abb8b72b51a
                                                        • Instruction ID: 943addd37f4ce1b1b9149d4b2d15fe3516be17a6d49e1b0225e0159e02bf69e2
                                                        • Opcode Fuzzy Hash: d8b232672574d8ff4bf1ab540f27aca8870a72f097cb7dfa52f77abb8b72b51a
                                                        • Instruction Fuzzy Hash: 30011D31500B04ABFB215B14DE4FFAA7FB8BB14B05F041559A583B15E1EBF4AD889F90
                                                        APIs
                                                        • _free.LIBCMT ref: 004D22BE
                                                          • Part of subcall function 004D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004DD7D1,00000000,00000000,00000000,00000000,?,004DD7F8,00000000,00000007,00000000,?,004DDBF5,00000000), ref: 004D29DE
                                                          • Part of subcall function 004D29C8: GetLastError.KERNEL32(00000000,?,004DD7D1,00000000,00000000,00000000,00000000,?,004DD7F8,00000000,00000007,00000000,?,004DDBF5,00000000,00000000), ref: 004D29F0
                                                        • _free.LIBCMT ref: 004D22D0
                                                        • _free.LIBCMT ref: 004D22E3
                                                        • _free.LIBCMT ref: 004D22F4
                                                        • _free.LIBCMT ref: 004D2305
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 3f88d405b040507c24fb3a3d41b49908f59535974696edec5c205b802ee1e01a
                                                        • Instruction ID: b552ea2180cbec275c4b7b912fc92a2d4d3d8acd2c2402edac7b2abde70d6bab
                                                        • Opcode Fuzzy Hash: 3f88d405b040507c24fb3a3d41b49908f59535974696edec5c205b802ee1e01a
                                                        • Instruction Fuzzy Hash: 90F030F85005108B8622AF69BD218193FA4B739750700158BF418D33B2CBB80499BBAC
                                                        APIs
                                                        • EndPath.GDI32(?), ref: 004B95D4
                                                        • StrokeAndFillPath.GDI32(?,?,004F71F7,00000000,?,?,?), ref: 004B95F0
                                                        • SelectObject.GDI32(?,00000000), ref: 004B9603
                                                        • DeleteObject.GDI32 ref: 004B9616
                                                        • StrokePath.GDI32(?), ref: 004B9631
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: 306c0f34dd7a38b0698da7e48d5a711e47ed33bfd5d619047f3ac3c14b89a516
                                                        • Instruction ID: 61e18f95751a19781432b5bd713162ceadf0d077cd7b7619216c0587e1120c20
                                                        • Opcode Fuzzy Hash: 306c0f34dd7a38b0698da7e48d5a711e47ed33bfd5d619047f3ac3c14b89a516
                                                        • Instruction Fuzzy Hash: F6F03131005644EBDB265F59FD1C7A93F61A720322F048215F619652F0C734499AFF28
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: __freea$_free
                                                        • String ID: a/p$am/pm
                                                        • API String ID: 3432400110-3206640213
                                                        • Opcode ID: 591436bf7b1ead1b77389bf3439b6eee8c5d050d180d00cdac861c492e1e1359
                                                        • Instruction ID: 7829ae3e262b7677979b964a721e474b375fc504f10e1e6dbba51c54b20d54b7
                                                        • Opcode Fuzzy Hash: 591436bf7b1ead1b77389bf3439b6eee8c5d050d180d00cdac861c492e1e1359
                                                        • Instruction Fuzzy Hash: 04D1D335900205EAEB299F68C865BBFB7B1EF06300F24415BED01ABB61D37D9D81CB59
                                                        APIs
                                                          • Part of subcall function 004C0242: EnterCriticalSection.KERNEL32(0057070C,00571884,?,?,004B198B,00572518,?,?,?,004A12F9,00000000), ref: 004C024D
                                                          • Part of subcall function 004C0242: LeaveCriticalSection.KERNEL32(0057070C,?,004B198B,00572518,?,?,?,004A12F9,00000000), ref: 004C028A
                                                          • Part of subcall function 004C00A3: __onexit.LIBCMT ref: 004C00A9
                                                        • __Init_thread_footer.LIBCMT ref: 00526238
                                                          • Part of subcall function 004C01F8: EnterCriticalSection.KERNEL32(0057070C,?,?,004B8747,00572514), ref: 004C0202
                                                          • Part of subcall function 004C01F8: LeaveCriticalSection.KERNEL32(0057070C,?,004B8747,00572514), ref: 004C0235
                                                          • Part of subcall function 0051359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 005135E4
                                                          • Part of subcall function 0051359C: LoadStringW.USER32(00572390,?,00000FFF,?), ref: 0051360A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                        • String ID: x#W$x#W$x#W
                                                        • API String ID: 1072379062-177975842
                                                        • Opcode ID: 3063c5190275ef8fb90c384878358500307b8860fb581bcf16fbc8389dcc75db
                                                        • Instruction ID: e8fe29ebde2eba31f24a0c40df9f8b1d4d038f111b2c7e78bb2912e43c536769
                                                        • Opcode Fuzzy Hash: 3063c5190275ef8fb90c384878358500307b8860fb581bcf16fbc8389dcc75db
                                                        • Instruction Fuzzy Hash: F8C18C71A00115AFCB14EF58D890EBEBBB9FF59300F10846AF945AB291DB74ED45CBA0
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 004D8B6E
                                                        • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 004D8B7A
                                                        • __dosmaperr.LIBCMT ref: 004D8B81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                        • String ID: .L
                                                        • API String ID: 2434981716-3603714933
                                                        • Opcode ID: b11d1288e111b4b7f0cb58a01c8eeafcb61b3f2523b862388bcd44b24403f3f3
                                                        • Instruction ID: f705f8de240f893f00e316c66d7ac12746a8ff5b57d0ba79aee0f0411a468182
                                                        • Opcode Fuzzy Hash: b11d1288e111b4b7f0cb58a01c8eeafcb61b3f2523b862388bcd44b24403f3f3
                                                        • Instruction Fuzzy Hash: EB416E74604185AFDB259F28DCA0A7E7FE5DB86304F2841AFF88587342DE39DC02A758
                                                        APIs
                                                          • Part of subcall function 0050B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005021D0,?,?,00000034,00000800,?,00000034), ref: 0050B42D
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00502760
                                                          • Part of subcall function 0050B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005021FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0050B3F8
                                                          • Part of subcall function 0050B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0050B355
                                                          • Part of subcall function 0050B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00502194,00000034,?,?,00001004,00000000,00000000), ref: 0050B365
                                                          • Part of subcall function 0050B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00502194,00000034,?,?,00001004,00000000,00000000), ref: 0050B37B
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005027CD
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0050281A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                        • String ID: @
                                                        • API String ID: 4150878124-2766056989
                                                        • Opcode ID: d07da12a62946fbd84bd996b373b3d7ee89370b57a882f8190d695230b16f855
                                                        • Instruction ID: d0a7dbc24008c70e583f30f0e2fa1e66ec0b627f51d411f5aadf39c642e2cb93
                                                        • Opcode Fuzzy Hash: d07da12a62946fbd84bd996b373b3d7ee89370b57a882f8190d695230b16f855
                                                        • Instruction Fuzzy Hash: 3D414E76900219AFDB10DFA4CD86AEEBBB8FF49300F108059FA55B7191DB706E45CBA0
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\EZZGTmJj4O.exe,00000104), ref: 004D1769
                                                        • _free.LIBCMT ref: 004D1834
                                                        • _free.LIBCMT ref: 004D183E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _free$FileModuleName
                                                        • String ID: C:\Users\user\Desktop\EZZGTmJj4O.exe
                                                        • API String ID: 2506810119-3652401455
                                                        • Opcode ID: 3b750918483f51c30d36e65d96f8124540b34034e2775967484186f50bcc9699
                                                        • Instruction ID: 75ca5b3c558207cf6efa8647c92e58b4f7f268def70b5063f935c104275a356d
                                                        • Opcode Fuzzy Hash: 3b750918483f51c30d36e65d96f8124540b34034e2775967484186f50bcc9699
                                                        • Instruction Fuzzy Hash: D33182B5A00218BFDB21DB9AD895D9FBBFCEB95310B1041ABF804D7321D6744E44EB98
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0050C306
                                                        • DeleteMenu.USER32(?,00000007,00000000), ref: 0050C34C
                                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00571990,014E7460), ref: 0050C395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem
                                                        • String ID: 0
                                                        • API String ID: 135850232-4108050209
                                                        • Opcode ID: 3c9ed2c0372c0d837f300fba970c6dac579a7d6f4e1861a201f12cf930bd3ba3
                                                        • Instruction ID: 8ffbde03f868d368ce7a2d47c5af4f3fe25c93cda34d97a322d7804d8ac30ac5
                                                        • Opcode Fuzzy Hash: 3c9ed2c0372c0d837f300fba970c6dac579a7d6f4e1861a201f12cf930bd3ba3
                                                        • Instruction Fuzzy Hash: 59417C312043029FD720DF25D885B9EBFA4BB96324F148B1EF9A5972D1D770A904CB62
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0053CC08,00000000,?,?,?,?), ref: 005344AA
                                                        • GetWindowLongW.USER32 ref: 005344C7
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005344D7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID: SysTreeView32
                                                        • API String ID: 847901565-1698111956
                                                        • Opcode ID: db8612c7913a32e830cb6530db190f77dd846293b2b949386fd12bf91d662bf7
                                                        • Instruction ID: 394659fdac89857fd88d0c8b1e4727b51cbdb7b5fb6140844a96c6e697b7c45c
                                                        • Opcode Fuzzy Hash: db8612c7913a32e830cb6530db190f77dd846293b2b949386fd12bf91d662bf7
                                                        • Instruction Fuzzy Hash: 50319E32210605AFDF209E78DC45BEA7BA9FB09338F244729F975A22D0D774EC509B50
                                                        APIs
                                                        • SysReAllocString.OLEAUT32(?,?), ref: 00506EED
                                                        • VariantCopyInd.OLEAUT32(?,?), ref: 00506F08
                                                        • VariantClear.OLEAUT32(?), ref: 00506F12
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Variant$AllocClearCopyString
                                                        • String ID: *jP
                                                        • API String ID: 2173805711-1055049981
                                                        • Opcode ID: 4ad6ae25dcd957293385b70ab56cffb497d70b05607e14d47abdaafc375f0100
                                                        • Instruction ID: d5130c20d230c73aad919e09abca3aa8f2bce4b1afda7b175a050a4c7e21659c
                                                        • Opcode Fuzzy Hash: 4ad6ae25dcd957293385b70ab56cffb497d70b05607e14d47abdaafc375f0100
                                                        • Instruction Fuzzy Hash: 8D31C471604246DFCB04AFA5E8509BE3B76FF55708B1008ADF8024B2E2C7349961DBD4
                                                        APIs
                                                          • Part of subcall function 0052335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00523077,?,?), ref: 00523378
                                                        • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0052307A
                                                        • _wcslen.LIBCMT ref: 0052309B
                                                        • htons.WSOCK32(00000000,?,?,00000000), ref: 00523106
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                        • String ID: 255.255.255.255
                                                        • API String ID: 946324512-2422070025
                                                        • Opcode ID: 1bfffce1471e4011fe9413493f3f74e3c32b58b772b2e3b70bf11e67db068e9a
                                                        • Instruction ID: 144fd9267943ddb584f6b6925a1c36920b86c1f44d9b92ead8792d012da5dde1
                                                        • Opcode Fuzzy Hash: 1bfffce1471e4011fe9413493f3f74e3c32b58b772b2e3b70bf11e67db068e9a
                                                        • Instruction Fuzzy Hash: 7D31C1392002219FC710CF68D485EA97BE0FF56318F248459E8158B3E2CB79DE45C760
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00534705
                                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00534713
                                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0053471A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 4014797782-2298589950
                                                        • Opcode ID: edae5b30017e46834f2fd8f90f02128e03af4ed586f67d9db02c8896523508f7
                                                        • Instruction ID: ee3b468214ff4f0ca733ca17afd0f85c0c2f83121cca870d01dac3a669eed37f
                                                        • Opcode Fuzzy Hash: edae5b30017e46834f2fd8f90f02128e03af4ed586f67d9db02c8896523508f7
                                                        • Instruction Fuzzy Hash: BF215EB5600209AFDB10DF68DCC1DA73BADFB5A398B040059FA059B291CB70FC52DA60
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                        • API String ID: 176396367-2734436370
                                                        • Opcode ID: 4ae58233f4d443235552178cf8d4842925d9203f2569f78d182ca52317317158
                                                        • Instruction ID: bee065988c22f21db5bc1466b8d90af2d7f5e80b90a3b4b5ef8a44bf35b9049d
                                                        • Opcode Fuzzy Hash: 4ae58233f4d443235552178cf8d4842925d9203f2569f78d182ca52317317158
                                                        • Instruction Fuzzy Hash: 0021387210451166C331AA269C12FBF7B98BFA5314F10442EF949970C6EB56AD41C3D9
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00533840
                                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00533850
                                                        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00533876
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: 73dd7153766c4e7871387ae569efd44b1815fffd5a92c7c2140af0d3be9f8212
                                                        • Instruction ID: 3b9bcce0ae609db51587e3c57d386b4c226d43a2203c6946b74eaf0801e21657
                                                        • Opcode Fuzzy Hash: 73dd7153766c4e7871387ae569efd44b1815fffd5a92c7c2140af0d3be9f8212
                                                        • Instruction Fuzzy Hash: 6521D172610218BBEF218F64DC85FBB3B6EFF99764F118124F904AB190C671DD5287A0
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00514A08
                                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00514A5C
                                                        • SetErrorMode.KERNEL32(00000000,?,?,0053CC08), ref: 00514AD0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume
                                                        • String ID: %lu
                                                        • API String ID: 2507767853-685833217
                                                        • Opcode ID: 97da4518d4f24a63e1b5e26655e2bd7c118506908621f0a7d77d072b8b0465e3
                                                        • Instruction ID: 0c4b80c7415959aae5c4bc563a82a8d7c9f0bdea572a37db65c9a89a4b423d68
                                                        • Opcode Fuzzy Hash: 97da4518d4f24a63e1b5e26655e2bd7c118506908621f0a7d77d072b8b0465e3
                                                        • Instruction Fuzzy Hash: 1D317C75A00209AFDB10DF54C885EAA7BF8EF09308F1480A9F909EB352D775EE45CB61
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0053424F
                                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00534264
                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00534271
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: msctls_trackbar32
                                                        • API String ID: 3850602802-1010561917
                                                        • Opcode ID: 3c06d88bf084e78f939fba4bbafc171ff56b14cbbec6e3b5330f4f41d253bdc9
                                                        • Instruction ID: 8cfc82df176dc240bb533fdd9bd6a9e68bab3b2fd2c8c84c37f191f08fb6503d
                                                        • Opcode Fuzzy Hash: 3c06d88bf084e78f939fba4bbafc171ff56b14cbbec6e3b5330f4f41d253bdc9
                                                        • Instruction Fuzzy Hash: EF11A331240248BEEF215E69CC06FAB3FACFF95B54F110514FA55E61A0D671EC519B24
                                                        APIs
                                                          • Part of subcall function 004A6B57: _wcslen.LIBCMT ref: 004A6B6A
                                                          • Part of subcall function 00502DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00502DC5
                                                          • Part of subcall function 00502DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00502DD6
                                                          • Part of subcall function 00502DA7: GetCurrentThreadId.KERNEL32 ref: 00502DDD
                                                          • Part of subcall function 00502DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00502DE4
                                                        • GetFocus.USER32 ref: 00502F78
                                                          • Part of subcall function 00502DEE: GetParent.USER32(00000000), ref: 00502DF9
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00502FC3
                                                        • EnumChildWindows.USER32(?,0050303B), ref: 00502FEB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                        • String ID: %s%d
                                                        • API String ID: 1272988791-1110647743
                                                        • Opcode ID: 1da5a6a2ac9263c55e4073a7aaddd05d2d38ca130dee9e98965f5d642ced2fae
                                                        • Instruction ID: cb8903da10898fd870168944d5e03a852d0e2df699321f44384519279df7c380
                                                        • Opcode Fuzzy Hash: 1da5a6a2ac9263c55e4073a7aaddd05d2d38ca130dee9e98965f5d642ced2fae
                                                        • Instruction Fuzzy Hash: A611A5716002056BCF15BF648C9AEED7B6ABF94304F044079B909AB292DE349D499B70
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 005358C1
                                                        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 005358EE
                                                        • DrawMenuBar.USER32(?), ref: 005358FD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Menu$InfoItem$Draw
                                                        • String ID: 0
                                                        • API String ID: 3227129158-4108050209
                                                        • Opcode ID: 8b4ca4690541721e0e2802fbda20ed9213ba05403c437ac90154699bb327e5d5
                                                        • Instruction ID: 21910b7791c00ad88241909f7f7295739d6b3204b8f19a94b64bfa3bf2a9cd73
                                                        • Opcode Fuzzy Hash: 8b4ca4690541721e0e2802fbda20ed9213ba05403c437ac90154699bb327e5d5
                                                        • Instruction Fuzzy Hash: FE011B32500218EEDB219F21DC45BAEBFB5FB45365F10849AF849D6251EB348A98EF31
                                                        APIs
                                                        • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 004FD3BF
                                                        • FreeLibrary.KERNEL32 ref: 004FD3E5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeLibraryProc
                                                        • String ID: GetSystemWow64DirectoryW$X64
                                                        • API String ID: 3013587201-2590602151
                                                        • Opcode ID: 4743174aa4035f1cf6aab95e2ffbf55300d5b73cc3349c1233fdf30635d3d3ca
                                                        • Instruction ID: c2fa362edce52029f89a0e8cd886d8a8096247b1cc21023ad3e1710442f7cdd6
                                                        • Opcode Fuzzy Hash: 4743174aa4035f1cf6aab95e2ffbf55300d5b73cc3349c1233fdf30635d3d3ca
                                                        • Instruction Fuzzy Hash: 37F02022C05A289AE73112108C549BA3B55AF10B01B568597AB02F6308D72CCC49A3EF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 35215f246a90a02ce8f913828d65cafccc0d6baf5ba098faac38dc2d06c2c3b1
                                                        • Instruction ID: e89c3e89b6fb86f1c4a389585ab5b495e7ca3ce52cecd2459c6b911e4ddbe6ad
                                                        • Opcode Fuzzy Hash: 35215f246a90a02ce8f913828d65cafccc0d6baf5ba098faac38dc2d06c2c3b1
                                                        • Instruction Fuzzy Hash: C8C14975A0020AEFCB15CFA4C894BAEBBB5FF48314F249598E505EB291D731EE41DB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInitInitializeUninitialize
                                                        • String ID:
                                                        • API String ID: 1998397398-0
                                                        • Opcode ID: ed44b7d0ab689b59eeafdc29766bc6a463fb07235b5d81fc1f15623993f4f5b2
                                                        • Instruction ID: 1b770eb7f51f99316e806ef49c4e06a57318da367d1d7c3e68477546f8792f7f
                                                        • Opcode Fuzzy Hash: ed44b7d0ab689b59eeafdc29766bc6a463fb07235b5d81fc1f15623993f4f5b2
                                                        • Instruction Fuzzy Hash: B0A180756043109FC710EF25D485A2ABBE5FF89318F04885DF98A9B3A2DB34EE05CB95
                                                        APIs
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0053FC08,?), ref: 005005F0
                                                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0053FC08,?), ref: 00500608
                                                        • CLSIDFromProgID.OLE32(?,?,00000000,0053CC40,000000FF,?,00000000,00000800,00000000,?,0053FC08,?), ref: 0050062D
                                                        • _memcmp.LIBVCRUNTIME ref: 0050064E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: FromProg$FreeTask_memcmp
                                                        • String ID:
                                                        • API String ID: 314563124-0
                                                        • Opcode ID: 86402a2162c00e796d8544b0b74d7f6e759120f2bb6931cb918a8a405fbc208d
                                                        • Instruction ID: 409e4e0d44475b3c05c18f3e2b5547037faae0cadd345e344387deb875362659
                                                        • Opcode Fuzzy Hash: 86402a2162c00e796d8544b0b74d7f6e759120f2bb6931cb918a8a405fbc208d
                                                        • Instruction Fuzzy Hash: 6981EC75A00109EFCB04DF94C984EEEBBB9FF89315F204559E516AB290DB71AE06CF60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: 1d8ff6cc5867824e5dc56658fb044d6b4588aa14828be525d52e0843b354e3d8
                                                        • Instruction ID: ea62cb21c18bb1177270362ed8e5f87fdf0252d8fe153650001eacb5cfa24a05
                                                        • Opcode Fuzzy Hash: 1d8ff6cc5867824e5dc56658fb044d6b4588aa14828be525d52e0843b354e3d8
                                                        • Instruction Fuzzy Hash: 62415E356805806BDB256BBB8C45FBF3AA5EF41379F14026FF418D23E2E63C4841936A
                                                        APIs
                                                        • GetWindowRect.USER32(014EF780,?), ref: 005362E2
                                                        • ScreenToClient.USER32(?,?), ref: 00536315
                                                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00536382
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientMoveRectScreen
                                                        • String ID:
                                                        • API String ID: 3880355969-0
                                                        • Opcode ID: eb1be309f85b1020f69d8e5585ef6cc048ebdbb9308d28216a73a70b71549794
                                                        • Instruction ID: c8b61914f82661b57c8ad3913908e63df71a8dff3df0794711d4d5dcfd0d998e
                                                        • Opcode Fuzzy Hash: eb1be309f85b1020f69d8e5585ef6cc048ebdbb9308d28216a73a70b71549794
                                                        • Instruction Fuzzy Hash: 1B513975A00209AFCF10DF68D880AAE7FB5FB55360F10856DF9159B2A0D730ED81DB90
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00521AFD
                                                        • WSAGetLastError.WSOCK32 ref: 00521B0B
                                                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00521B8A
                                                        • WSAGetLastError.WSOCK32 ref: 00521B94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$socket
                                                        • String ID:
                                                        • API String ID: 1881357543-0
                                                        • Opcode ID: 34d69ec2b3dccef979b4344cecc63523174165e09590e47d5c5b1a83ad42ff28
                                                        • Instruction ID: ebe9dcf57304c920f4bd48412dc56fff0c5910e03d83efda9d836697e81f9f76
                                                        • Opcode Fuzzy Hash: 34d69ec2b3dccef979b4344cecc63523174165e09590e47d5c5b1a83ad42ff28
                                                        • Instruction Fuzzy Hash: 9E41F034600200AFE720AF21D886F2A7BE5AF56708F54848DF91A9F3D3D776ED418B94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fce307d3892eef9d1f2e6a80f4b3498c51da49a607ce571225c248175c6cdcf4
                                                        • Instruction ID: 57727fa914632972a47061e376e11aa195fdd5956f857357dafdf862e3916aff
                                                        • Opcode Fuzzy Hash: fce307d3892eef9d1f2e6a80f4b3498c51da49a607ce571225c248175c6cdcf4
                                                        • Instruction Fuzzy Hash: B141F175A00204FFD724DF39C852BAABBA9EB88718F11452FF141DB392D779A90187D4
                                                        APIs
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00515783
                                                        • GetLastError.KERNEL32(?,00000000), ref: 005157A9
                                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 005157CE
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 005157FA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 3321077145-0
                                                        • Opcode ID: bd1f1505fb528b2f637adee5c0db21068975fb19bab08e7058a857f911d1375c
                                                        • Instruction ID: 20814a834f0ecf944f7f6e97b20a76f8fc999f4eadec58a2988fac431a56607c
                                                        • Opcode Fuzzy Hash: bd1f1505fb528b2f637adee5c0db21068975fb19bab08e7058a857f911d1375c
                                                        • Instruction Fuzzy Hash: FD412F39600610DFCB11EF15C485A5EBBE2FF99354B188489E84A6B362DB34FD40CB95
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,00000000,?,004C6D71,00000000,00000000,004C82D9,?,004C82D9,?,00000001,004C6D71,?,00000001,004C82D9,004C82D9), ref: 004DD910
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004DD999
                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 004DD9AB
                                                        • __freea.LIBCMT ref: 004DD9B4
                                                          • Part of subcall function 004D3820: RtlAllocateHeap.NTDLL(00000000,?,00571444,?,004BFDF5,?,?,004AA976,00000010,00571440,004A13FC,?,004A13C6,?,004A1129), ref: 004D3852
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                        • String ID:
                                                        • API String ID: 2652629310-0
                                                        • Opcode ID: 56346ac989b57a09a0185688e3e1d8d62a3b5afa2de9ec736189c60dc5b21522
                                                        • Instruction ID: 0071ffddcf5bd38bedc959ed6941b4d20a34c574f891010dfbbfcaf9800acf43
                                                        • Opcode Fuzzy Hash: 56346ac989b57a09a0185688e3e1d8d62a3b5afa2de9ec736189c60dc5b21522
                                                        • Instruction Fuzzy Hash: AF31B1B2A00206ABDB25DF65DCA5EAF7BA5EF40310F05016AFC0496350D73ADD54DB94
                                                        APIs
                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00535352
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00535375
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00535382
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 005353A8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$InvalidateMessageRectSend
                                                        • String ID:
                                                        • API String ID: 3340791633-0
                                                        • Opcode ID: 8ed777d331ef215ce77cb2599a87524a64de49bdfa50c36232be24cf2aeded66
                                                        • Instruction ID: 911be1609558ff520bad72b70336496fc0def7cef410455e4eb1f9aeb28e8d2a
                                                        • Opcode Fuzzy Hash: 8ed777d331ef215ce77cb2599a87524a64de49bdfa50c36232be24cf2aeded66
                                                        • Instruction Fuzzy Hash: 6631C434A55A08EFEB309E18CC06BE83F65FB04390F986D01FA11962E1E7B09D84EB41
                                                        APIs
                                                        • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 0050ABF1
                                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 0050AC0D
                                                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 0050AC74
                                                        • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 0050ACC6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: e0c7272df49053a0d02ed031d9d22b9971d62ec6afbce9cb0102052acc2a3620
                                                        • Instruction ID: 83fb0b828e17a3ddadf2c76c723b2cc364718f84d6f85c12292446aabe9fa4ac
                                                        • Opcode Fuzzy Hash: e0c7272df49053a0d02ed031d9d22b9971d62ec6afbce9cb0102052acc2a3620
                                                        • Instruction Fuzzy Hash: 1131F030A04718AFFF358B698C09BFE7FA5BB89310F09461AF485962D1C3758D8597A2
                                                        APIs
                                                        • ClientToScreen.USER32(?,?), ref: 0053769A
                                                        • GetWindowRect.USER32(?,?), ref: 00537710
                                                        • PtInRect.USER32(?,?,00538B89), ref: 00537720
                                                        • MessageBeep.USER32(00000000), ref: 0053778C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: c8e57fe9c410f2fce48c1e9afdc47ca44f934c426a402e70c90e65b2f6e3728c
                                                        • Instruction ID: 9e60822a3edaeea31a605c3c334926e61175ba9022817f1a318e162bf41b8471
                                                        • Opcode Fuzzy Hash: c8e57fe9c410f2fce48c1e9afdc47ca44f934c426a402e70c90e65b2f6e3728c
                                                        • Instruction Fuzzy Hash: 9A41ADB4A05619EFCB22CF58D895EA97FF4FB5D310F1440A8E5149B261C330A946EF90
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 005316EB
                                                          • Part of subcall function 00503A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00503A57
                                                          • Part of subcall function 00503A3D: GetCurrentThreadId.KERNEL32 ref: 00503A5E
                                                          • Part of subcall function 00503A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005025B3), ref: 00503A65
                                                        • GetCaretPos.USER32(?), ref: 005316FF
                                                        • ClientToScreen.USER32(00000000,?), ref: 0053174C
                                                        • GetForegroundWindow.USER32 ref: 00531752
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: 968cd0041dc1ef47243b7a8887ba42c5f5f9dfcd4b4baf6d154ebb72fd3b05f3
                                                        • Instruction ID: 5c86db7ce7bce6ab5dc5f1dcbbde8dc0ec27fe19d6d8b9dac0d5f04a13d4b408
                                                        • Opcode Fuzzy Hash: 968cd0041dc1ef47243b7a8887ba42c5f5f9dfcd4b4baf6d154ebb72fd3b05f3
                                                        • Instruction Fuzzy Hash: CD316171D00109AFCB00DFAAC881CAEBBFDFF99308B5480AAE415E7251D7359E45CBA4
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0050D501
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0050D50F
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 0050D52F
                                                        • CloseHandle.KERNEL32(00000000), ref: 0050D5DC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 420147892-0
                                                        • Opcode ID: f7fc3c44374494c6d0c31b53bab8dae3051ec413a5f761c3d35edef93d184cb3
                                                        • Instruction ID: 5723248bc7db3aecc18b048e99b50277c4a4511e9c91e48c8bf054788fdda138
                                                        • Opcode Fuzzy Hash: f7fc3c44374494c6d0c31b53bab8dae3051ec413a5f761c3d35edef93d184cb3
                                                        • Instruction Fuzzy Hash: 3A3181711083009FD300EF54CC85AAFBFF8EFAA358F14092DF581961A1EB759949DBA2
                                                        APIs
                                                          • Part of subcall function 004B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 004B9BB2
                                                        • GetCursorPos.USER32(?), ref: 00539001
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,004F7711,?,?,?,?,?), ref: 00539016
                                                        • GetCursorPos.USER32(?), ref: 0053905E
                                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,004F7711,?,?,?), ref: 00539094
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                        • String ID:
                                                        • API String ID: 2864067406-0
                                                        • Opcode ID: 80054f07442dfe0bdbe3a19d3965eba1a325d4b26f4eb3527cd8052f644f8cb3
                                                        • Instruction ID: 62e4672d7a9e61a0ade08e0df6ba826f8d411e9710edc8a2f53cce8054b1c11d
                                                        • Opcode Fuzzy Hash: 80054f07442dfe0bdbe3a19d3965eba1a325d4b26f4eb3527cd8052f644f8cb3
                                                        • Instruction Fuzzy Hash: C621BF75600118EFCB2A8F98C858EEA3FB9FB49350F004059F9059B261C3719D91EB60
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(?,0053CB68), ref: 0050D2FB
                                                        • GetLastError.KERNEL32 ref: 0050D30A
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0050D319
                                                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0053CB68), ref: 0050D376
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast
                                                        • String ID:
                                                        • API String ID: 2267087916-0
                                                        • Opcode ID: 4bf6590a0b3f724ace69e6d3fc6b392d9c9d4847ae9d6ebc456dbba41ecddf03
                                                        • Instruction ID: 36b445601edea7447484be29c00e881c6f880bd946067dd958cb1832e916b513
                                                        • Opcode Fuzzy Hash: 4bf6590a0b3f724ace69e6d3fc6b392d9c9d4847ae9d6ebc456dbba41ecddf03
                                                        • Instruction Fuzzy Hash: 5A216D745053019FC700DF68C8814AEBBE4BF66368F504E1EF499932E1D7309949CBA3
                                                        APIs
                                                          • Part of subcall function 00501014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0050102A
                                                          • Part of subcall function 00501014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00501036
                                                          • Part of subcall function 00501014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00501045
                                                          • Part of subcall function 00501014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0050104C
                                                          • Part of subcall function 00501014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00501062
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 005015BE
                                                        • _memcmp.LIBVCRUNTIME ref: 005015E1
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00501617
                                                        • HeapFree.KERNEL32(00000000), ref: 0050161E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                        • String ID:
                                                        • API String ID: 1592001646-0
                                                        • Opcode ID: 99603668f733bfaf0ebb43b9cec084670b82309bdadf344f44683df2d36f4548
                                                        • Instruction ID: 9535780f260234a4dcc9b3242a23c82be4151edfc8322f14bf63981f3b2c0862
                                                        • Opcode Fuzzy Hash: 99603668f733bfaf0ebb43b9cec084670b82309bdadf344f44683df2d36f4548
                                                        • Instruction Fuzzy Hash: A9217A31E00509AFDF14DFA4CD49BEEBBB8FF44344F084459E441AB281E731AA45DBA5
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0053280A
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00532824
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00532832
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00532840
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$AttributesLayered
                                                        • String ID:
                                                        • API String ID: 2169480361-0
                                                        • Opcode ID: 7aca0735ba780b393242d2d56d909a3f5413a0ecb200cbdfdef49ec6c999222c
                                                        • Instruction ID: 37f52694ccbdf1f58e42f621a780404239adb42b978ffa6953af95a515d272b6
                                                        • Opcode Fuzzy Hash: 7aca0735ba780b393242d2d56d909a3f5413a0ecb200cbdfdef49ec6c999222c
                                                        • Instruction Fuzzy Hash: 8F21D331204A11AFD7149B24C855FAABF95FF95328F148158F4268B6E2C775FC42CBD0
                                                        APIs
                                                          • Part of subcall function 00508D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0050790A,?,000000FF,?,00508754,00000000,?,0000001C,?,?), ref: 00508D8C
                                                          • Part of subcall function 00508D7D: lstrcpyW.KERNEL32(00000000,?,?,0050790A,?,000000FF,?,00508754,00000000,?,0000001C,?,?,00000000), ref: 00508DB2
                                                          • Part of subcall function 00508D7D: lstrcmpiW.KERNEL32(00000000,?,0050790A,?,000000FF,?,00508754,00000000,?,0000001C,?,?), ref: 00508DE3
                                                        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00508754,00000000,?,0000001C,?,?,00000000), ref: 00507923
                                                        • lstrcpyW.KERNEL32(00000000,?,?,00508754,00000000,?,0000001C,?,?,00000000), ref: 00507949
                                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00508754,00000000,?,0000001C,?,?,00000000), ref: 00507984
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: lstrcmpilstrcpylstrlen
                                                        • String ID: cdecl
                                                        • API String ID: 4031866154-3896280584
                                                        • Opcode ID: 139194ed503524ce0c1ca2a57172a37a6b5eca06069515e13075fa92cbf16c9a
                                                        • Instruction ID: 0e5028924fadf0d42bbb7d319972fb1e9b1f0940e1d772d15f0f637e6a190571
                                                        • Opcode Fuzzy Hash: 139194ed503524ce0c1ca2a57172a37a6b5eca06069515e13075fa92cbf16c9a
                                                        • Instruction Fuzzy Hash: AE11263A200306ABCB159F39CC45D7E7BA9FF99350B00442AF846C73A4EB31E811D7A1
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00537D0B
                                                        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00537D2A
                                                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00537D42
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0051B7AD,00000000), ref: 00537D6B
                                                          • Part of subcall function 004B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 004B9BB2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID:
                                                        • API String ID: 847901565-0
                                                        • Opcode ID: 8893418c2d98317008296d446c45f376b43984961f1cf7dbe0800ba5e10dcb09
                                                        • Instruction ID: d4721d0a749f13d5ce11605056f3ec216589c7300eaba020fcfa57ee6365419a
                                                        • Opcode Fuzzy Hash: 8893418c2d98317008296d446c45f376b43984961f1cf7dbe0800ba5e10dcb09
                                                        • Instruction Fuzzy Hash: B911C071914658AFCB208F28DC04AA63FA4BF49360F118B24F939D72F0D7309D51EB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00001060,?,00000004), ref: 005356BB
                                                        • _wcslen.LIBCMT ref: 005356CD
                                                        • _wcslen.LIBCMT ref: 005356D8
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00535816
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen
                                                        • String ID:
                                                        • API String ID: 455545452-0
                                                        • Opcode ID: c8bd0ba32ff1f1f1f429507f3de9909c1c8552d11db67b28c1a0d2103f0b9607
                                                        • Instruction ID: 87627f3cd24808e3499939ee08d636ea563296a2fde896be6a187d2175c5710d
                                                        • Opcode Fuzzy Hash: c8bd0ba32ff1f1f1f429507f3de9909c1c8552d11db67b28c1a0d2103f0b9607
                                                        • Instruction Fuzzy Hash: 6C110375A0061896DF20DF65DC86AEE7FACFF11764F10542AF905D6081FB70CA84CB64
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00501A47
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00501A59
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00501A6F
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00501A8A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 0505a26860a4b4bf9cc0d2fca7a8b6065912ad17420c377bc6b39624a6099fc9
                                                        • Instruction ID: 5c9050c86210926bfaddd917c5918d8eb8e30c258163355c0ca4f736d888610e
                                                        • Opcode Fuzzy Hash: 0505a26860a4b4bf9cc0d2fca7a8b6065912ad17420c377bc6b39624a6099fc9
                                                        • Instruction Fuzzy Hash: F611F73AA01219FFEB119BA5CD85FADBB78FB08750F200091EA05B7290D6716E50DB98
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 0050E1FD
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 0050E230
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0050E246
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0050E24D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                        • String ID:
                                                        • API String ID: 2880819207-0
                                                        • Opcode ID: 52712dc107d4ef8bec5781143975066b1967aff452545a83f6e4ff1ef66e0d68
                                                        • Instruction ID: 9375d0840a278d7dba9735fa823610328cd58857a4e86e5b2317b8929cf2db32
                                                        • Opcode Fuzzy Hash: 52712dc107d4ef8bec5781143975066b1967aff452545a83f6e4ff1ef66e0d68
                                                        • Instruction Fuzzy Hash: 6E110876904215BBC7019BACAC0AA9E7FACEB55314F104A59F815E33D0D270C908A7A0
                                                        APIs
                                                        • CreateThread.KERNEL32(00000000,?,004CCFF9,00000000,00000004,00000000), ref: 004CD218
                                                        • GetLastError.KERNEL32 ref: 004CD224
                                                        • __dosmaperr.LIBCMT ref: 004CD22B
                                                        • ResumeThread.KERNEL32(00000000), ref: 004CD249
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                        • String ID:
                                                        • API String ID: 173952441-0
                                                        • Opcode ID: e13d9ba6c6d03df9049ffb9a06ffaa6c25c69461bbf8ca8816a81b342b27a017
                                                        • Instruction ID: 7edaba13e00780c20f2c6912c314f9765c4c2585327d3dec15a32ea2c10cac2e
                                                        • Opcode Fuzzy Hash: e13d9ba6c6d03df9049ffb9a06ffaa6c25c69461bbf8ca8816a81b342b27a017
                                                        • Instruction Fuzzy Hash: 0701003A804204BBCB605BA6DC09FAB7A69DF81334F20026FF824922D0CF79C805D7A5
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004A604C
                                                        • GetStockObject.GDI32(00000011), ref: 004A6060
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 004A606A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CreateMessageObjectSendStockWindow
                                                        • String ID:
                                                        • API String ID: 3970641297-0
                                                        • Opcode ID: 1816f87bf356122aa34fc475a40812c4871c85832c50942e7b132493c823821f
                                                        • Instruction ID: 90af7a53eb53190e864d3463ece474978b84ada24e5a812e3dda27c2b2e9643e
                                                        • Opcode Fuzzy Hash: 1816f87bf356122aa34fc475a40812c4871c85832c50942e7b132493c823821f
                                                        • Instruction Fuzzy Hash: 0811A1B2505508BFEF128FA49C44EEB7F69EF29354F050106FA1556210C7369CA0EBA4
                                                        APIs
                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 004C3B56
                                                          • Part of subcall function 004C3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 004C3AD2
                                                          • Part of subcall function 004C3AA3: ___AdjustPointer.LIBCMT ref: 004C3AED
                                                        • _UnwindNestedFrames.LIBCMT ref: 004C3B6B
                                                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 004C3B7C
                                                        • CallCatchBlock.LIBVCRUNTIME ref: 004C3BA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                        • String ID:
                                                        • API String ID: 737400349-0
                                                        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                        • Instruction ID: 19e3afe62488ceb19499cc05b235c245ffa880d545d868d024781f7ca3ec4614
                                                        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                        • Instruction Fuzzy Hash: 57016D36100148BBCF515E96CC42EEB3B7DEF88759F04801EFE0856121D33AE961DBA4
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,004A13C6,00000000,00000000,?,004D301A,004A13C6,00000000,00000000,00000000,?,004D328B,00000006,FlsSetValue), ref: 004D30A5
                                                        • GetLastError.KERNEL32(?,004D301A,004A13C6,00000000,00000000,00000000,?,004D328B,00000006,FlsSetValue,00542290,FlsSetValue,00000000,00000364,?,004D2E46), ref: 004D30B1
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004D301A,004A13C6,00000000,00000000,00000000,?,004D328B,00000006,FlsSetValue,00542290,FlsSetValue,00000000), ref: 004D30BF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad$ErrorLast
                                                        • String ID:
                                                        • API String ID: 3177248105-0
                                                        • Opcode ID: ede8f12d4ab94acecfb608787ba16c8ae5596b8b79db46fc48054ef093b35268
                                                        • Instruction ID: aabd4f019f2db490415ad5479a7d8cf0b8713db21b8e714a17bd3defb2c7a81f
                                                        • Opcode Fuzzy Hash: ede8f12d4ab94acecfb608787ba16c8ae5596b8b79db46fc48054ef093b35268
                                                        • Instruction Fuzzy Hash: 87012B36301222ABCB324F78AC549577B98AF15B62B140623F905F7384C725DD05D7E5
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0050747F
                                                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00507497
                                                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 005074AC
                                                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 005074CA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Type$Register$FileLoadModuleNameUser
                                                        • String ID:
                                                        • API String ID: 1352324309-0
                                                        • Opcode ID: 68d26274228116e844124a344b987ca9ee9ee2d5604897347b8039f2da25ec29
                                                        • Instruction ID: 48234c1e96a0a0aff718f900612b3eb4f09aadaeffdbb9afe9a85f79cb6da3d6
                                                        • Opcode Fuzzy Hash: 68d26274228116e844124a344b987ca9ee9ee2d5604897347b8039f2da25ec29
                                                        • Instruction Fuzzy Hash: 001184B5A053199FEB208F54DC09F967FFCFB04B04F108569A666D6191D7B0F908EB60
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0050ACD3,?,00008000), ref: 0050B0C4
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0050ACD3,?,00008000), ref: 0050B0E9
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0050ACD3,?,00008000), ref: 0050B0F3
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0050ACD3,?,00008000), ref: 0050B126
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CounterPerformanceQuerySleep
                                                        • String ID:
                                                        • API String ID: 2875609808-0
                                                        • Opcode ID: da63d9e120fcfb803507ad5e1863d7a8d113b09f141306c907e52cf4edf962fe
                                                        • Instruction ID: f43954de6ed977871fdc11bd1039072b9afcd2999233f230009bcb50271c57ab
                                                        • Opcode Fuzzy Hash: da63d9e120fcfb803507ad5e1863d7a8d113b09f141306c907e52cf4edf962fe
                                                        • Instruction Fuzzy Hash: AA116D31C0152CE7DF00AFE5E9A8AEEBF78FF59711F104486D941B2281CB305664EB91
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00502DC5
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00502DD6
                                                        • GetCurrentThreadId.KERNEL32 ref: 00502DDD
                                                        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00502DE4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 2710830443-0
                                                        • Opcode ID: 097a83826f070e954b040eaea6b2d4abb3a526baea9b79ebbed1f7b4a9a734bc
                                                        • Instruction ID: 8d33e1e634447e37646839da92f001e1895ffce6b718fbeecb5c3aa6df1baeb0
                                                        • Opcode Fuzzy Hash: 097a83826f070e954b040eaea6b2d4abb3a526baea9b79ebbed1f7b4a9a734bc
                                                        • Instruction Fuzzy Hash: 8BE092B21016247BDB201B769C0EFEB3E6CFF62BA1F000015F105E11809AA0C845E7B0
                                                        APIs
                                                          • Part of subcall function 004B9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 004B9693
                                                          • Part of subcall function 004B9639: SelectObject.GDI32(?,00000000), ref: 004B96A2
                                                          • Part of subcall function 004B9639: BeginPath.GDI32(?), ref: 004B96B9
                                                          • Part of subcall function 004B9639: SelectObject.GDI32(?,00000000), ref: 004B96E2
                                                        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00538887
                                                        • LineTo.GDI32(?,?,?), ref: 00538894
                                                        • EndPath.GDI32(?), ref: 005388A4
                                                        • StrokePath.GDI32(?), ref: 005388B2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                        • String ID:
                                                        • API String ID: 1539411459-0
                                                        • Opcode ID: d99dcfa4e20215ed46c4fa748ea326d4bceecab8663b01ec21ed7ca19881a954
                                                        • Instruction ID: 3b20442d5cd036a0ab05fdd0fb10e11a328a9e87bb7a3d33fb0e049cc565829d
                                                        • Opcode Fuzzy Hash: d99dcfa4e20215ed46c4fa748ea326d4bceecab8663b01ec21ed7ca19881a954
                                                        • Instruction Fuzzy Hash: 64F09A36001658BADB121F98AC0DFCE3F69AF26310F048000FB02751E2C7740566EBA9
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 004B98CC
                                                        • SetTextColor.GDI32(?,?), ref: 004B98D6
                                                        • SetBkMode.GDI32(?,00000001), ref: 004B98E9
                                                        • GetStockObject.GDI32(00000005), ref: 004B98F1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Color$ModeObjectStockText
                                                        • String ID:
                                                        • API String ID: 4037423528-0
                                                        • Opcode ID: 958727ed270985df0c1bb973a90d1b6e17349530102c0186a92df04a83dc49fb
                                                        • Instruction ID: 443aaad805d5d1af21c373a5cd13621c8413dadd651590a930f5667639aa3946
                                                        • Opcode Fuzzy Hash: 958727ed270985df0c1bb973a90d1b6e17349530102c0186a92df04a83dc49fb
                                                        • Instruction Fuzzy Hash: 5FE06531244244AADB215B74AC09BE93F10AB21335F04821AF7F6642E1C3754644EB10
                                                        APIs
                                                        • GetCurrentThread.KERNEL32 ref: 00501634
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,005011D9), ref: 0050163B
                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,005011D9), ref: 00501648
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,005011D9), ref: 0050164F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CurrentOpenProcessThreadToken
                                                        • String ID:
                                                        • API String ID: 3974789173-0
                                                        • Opcode ID: 093ab03acb7348e30903603ee23a95b5e1d0e3ffbee112fd2e780f4383a1b0b3
                                                        • Instruction ID: d5efe91cd9ff4fbbfb015a313485a325f3acf7015ce65f4081a098f7e4048347
                                                        • Opcode Fuzzy Hash: 093ab03acb7348e30903603ee23a95b5e1d0e3ffbee112fd2e780f4383a1b0b3
                                                        • Instruction Fuzzy Hash: 76E08C32602211EBD7201FE0AE0DB8B3F7CBF64792F148808F285E9080E7348448DB65
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 004FD858
                                                        • GetDC.USER32(00000000), ref: 004FD862
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 004FD882
                                                        • ReleaseDC.USER32(?), ref: 004FD8A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 9daf12899fc412e9e4e213a591443a906eeb76c853061b6e60a061a56c1ee2a3
                                                        • Instruction ID: f129274bbd6e7db1d7e2c3fcd5283e7fd029ebcfe0c7759564622daf46e307e0
                                                        • Opcode Fuzzy Hash: 9daf12899fc412e9e4e213a591443a906eeb76c853061b6e60a061a56c1ee2a3
                                                        • Instruction Fuzzy Hash: 43E0E5B5800204DFCB41AFA5984D66DBFB2AB18310F10804AF846A7360C7388906AF55
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 004FD86C
                                                        • GetDC.USER32(00000000), ref: 004FD876
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 004FD882
                                                        • ReleaseDC.USER32(?), ref: 004FD8A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: f62ac233bc2d8d815bc994d2aa93530e7725121a06c20af5b338454609a5a34d
                                                        • Instruction ID: ad6c514245c903b57ef1b59546cc270cb495f9f85fb34e573c86749a72dc6beb
                                                        • Opcode Fuzzy Hash: f62ac233bc2d8d815bc994d2aa93530e7725121a06c20af5b338454609a5a34d
                                                        • Instruction Fuzzy Hash: 07E012B5C00200EFCB40AFA4D84D66DBFB1BB28310F108049F84AF7360CB38990AAF50
                                                        APIs
                                                          • Part of subcall function 004A7620: _wcslen.LIBCMT ref: 004A7625
                                                        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00514ED4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Connection_wcslen
                                                        • String ID: *$LPT
                                                        • API String ID: 1725874428-3443410124
                                                        • Opcode ID: 71d5466e29e0f5be9385ad91aa789017c2f0b0d4a78da54511067ed0f89b98f1
                                                        • Instruction ID: 36a65a20b3a93545ab86ca95f936f6d09b2a099558a0d8841fed13425310b60c
                                                        • Opcode Fuzzy Hash: 71d5466e29e0f5be9385ad91aa789017c2f0b0d4a78da54511067ed0f89b98f1
                                                        • Instruction Fuzzy Hash: 61915E75A002049FDB14DF58C484EAABBF5BF45308F199099E80A9F3A2D735ED86CF91
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 004CE30D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__start
                                                        • String ID: pow
                                                        • API String ID: 3213639722-2276729525
                                                        • Opcode ID: cdf4fb59efcf2ec17438f1506c2760a4e755e14d2357c72bd03bacccbcb749b7
                                                        • Instruction ID: 45b4b41e5925aeeb7807ca2c04f498ff121126dfb56d6c7c9e605a5baff77266
                                                        • Opcode Fuzzy Hash: cdf4fb59efcf2ec17438f1506c2760a4e755e14d2357c72bd03bacccbcb749b7
                                                        • Instruction Fuzzy Hash: 13518D69A0C20196CB157715C952BBB3B949B10744F708D9FF495423F9FB3C8C86AA4E
                                                        APIs
                                                        • CharUpperBuffW.USER32(004F569E,00000000,?,0053CC08,?,00000000,00000000), ref: 005278DD
                                                          • Part of subcall function 004A6B57: _wcslen.LIBCMT ref: 004A6B6A
                                                        • CharUpperBuffW.USER32(004F569E,00000000,?,0053CC08,00000000,?,00000000,00000000), ref: 0052783B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper$_wcslen
                                                        • String ID: <sV
                                                        • API String ID: 3544283678-1412045586
                                                        • Opcode ID: 9ba26666700d96960757a7ee1b1e63e33e364b81b7262005704bb5fdafb03243
                                                        • Instruction ID: 899187c45e3e2040a2371c17e4dae5f06f11e0ddff366f3b2762b13bc967e8e7
                                                        • Opcode Fuzzy Hash: 9ba26666700d96960757a7ee1b1e63e33e364b81b7262005704bb5fdafb03243
                                                        • Instruction Fuzzy Hash: 1E61827291422CAACF04FBA5DC91DFDB778BF2A304F44452AF502A3091EF385A45CBA4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: #
                                                        • API String ID: 0-1885708031
                                                        • Opcode ID: 8f7aaec8504f68e44cd62453258bd9fd7e265ef9de8166f3aa3c42c1a532df5b
                                                        • Instruction ID: 44632e7e6f3e0564b494622d4921408d61d46a49b7a331f92f8c40a7900ff3c6
                                                        • Opcode Fuzzy Hash: 8f7aaec8504f68e44cd62453258bd9fd7e265ef9de8166f3aa3c42c1a532df5b
                                                        • Instruction Fuzzy Hash: C051243550024ADFDB18EF2AC0416FA7BA4EF65311F24409BEA519B3E0D63C9D43C7A9
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 004BF2A2
                                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 004BF2BB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: 7fe548b49b548bf98ed7a6eeb8ef80d5babad00ca642b774703882121b7ce072
                                                        • Instruction ID: bf65c96f551f41c0d843f39aa7685733252eb6f9f3114372b4ef5695cad4d32b
                                                        • Opcode Fuzzy Hash: 7fe548b49b548bf98ed7a6eeb8ef80d5babad00ca642b774703882121b7ce072
                                                        • Instruction Fuzzy Hash: 775147714087449FD320AF11DC86BABBBF8FFA5304F81885EF1D9411A5EB748529CB6A
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 005257E0
                                                        • _wcslen.LIBCMT ref: 005257EC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper_wcslen
                                                        • String ID: CALLARGARRAY
                                                        • API String ID: 157775604-1150593374
                                                        • Opcode ID: 7afe675083704abd084b195c2b0f21e3f8ad09f9d9753041154da816fd1c6ead
                                                        • Instruction ID: bbf2657d7e7b93e8e057491703371403dd388045f993d73541a16cb6a035758b
                                                        • Opcode Fuzzy Hash: 7afe675083704abd084b195c2b0f21e3f8ad09f9d9753041154da816fd1c6ead
                                                        • Instruction Fuzzy Hash: E641AF31A001199FCB14DFA9D8859AEBFF5FF5A364F20402EE505A7291E7749D81CBA0
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 0051D130
                                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0051D13A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_wcslen
                                                        • String ID: |
                                                        • API String ID: 596671847-2343686810
                                                        • Opcode ID: 6eaf2bcda5dda2a0e707028a186d35fdfff683d85ff69ef012e5d2c1a9401709
                                                        • Instruction ID: 1c60f811d0d0181644e71e8111014fd8e2ddb44a73f565531bb1eae0c78896b1
                                                        • Opcode Fuzzy Hash: 6eaf2bcda5dda2a0e707028a186d35fdfff683d85ff69ef012e5d2c1a9401709
                                                        • Instruction Fuzzy Hash: 0A313971D00219ABDF11EFA5CC85AEFBFB9FF15304F00001AE815A6161D739AA46CB64
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?), ref: 00533621
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0053365C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$DestroyMove
                                                        • String ID: static
                                                        • API String ID: 2139405536-2160076837
                                                        • Opcode ID: ebb10f64481b7ef555c7c9acebba7bfabc5ba3ff2d575a9bbd251c7e4fcebfb2
                                                        • Instruction ID: c998ad3adc2ca76f86ebd8111a28b9c204b2961cdecff576290e74a5a81f9634
                                                        • Opcode Fuzzy Hash: ebb10f64481b7ef555c7c9acebba7bfabc5ba3ff2d575a9bbd251c7e4fcebfb2
                                                        • Instruction Fuzzy Hash: 7131BC71100204AEDB20DF68DC81EFB7BA9FF98724F00861DF8A5D7280DA34AD91D760
                                                        APIs
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0053461F
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00534634
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: 4034bc6a45c4895b019fb4269aa8b7fe6823ec28ae8396425c421b53dca6cb67
                                                        • Instruction ID: c4cc85ff7ef4598fcb525e1e5caceeada0ffb34427b4ba578ba9bd18627366b1
                                                        • Opcode Fuzzy Hash: 4034bc6a45c4895b019fb4269aa8b7fe6823ec28ae8396425c421b53dca6cb67
                                                        • Instruction Fuzzy Hash: A8313674E0030A9FDB14CFA9C981BEABBB5FF09300F10406AE905AB381D770A951DF90
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0053327C
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00533287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: b98bab13de2ddff3c078119b9f0b81d0c52c83d9319f7b6f5dfaced4265b18ab
                                                        • Instruction ID: 4904c9cff823fb83b59bb6601bbdac89e43270bf6ddbdd70fd729af83ee9f283
                                                        • Opcode Fuzzy Hash: b98bab13de2ddff3c078119b9f0b81d0c52c83d9319f7b6f5dfaced4265b18ab
                                                        • Instruction Fuzzy Hash: B211C4753002087FFF259F94DC85EBB3F6AFB98364F104229F9189B290D6719D519760
                                                        APIs
                                                          • Part of subcall function 004A600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004A604C
                                                          • Part of subcall function 004A600E: GetStockObject.GDI32(00000011), ref: 004A6060
                                                          • Part of subcall function 004A600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 004A606A
                                                        • GetWindowRect.USER32(00000000,?), ref: 0053377A
                                                        • GetSysColor.USER32(00000012), ref: 00533794
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                        • String ID: static
                                                        • API String ID: 1983116058-2160076837
                                                        • Opcode ID: 786f9ff2a31b37105e844dc781cd1ee72d4d4d92133bc40f6dfc543ccab83b77
                                                        • Instruction ID: baf79651767c658c3b45e4968665665dfacb80a1a9d5b180a54363a0a223eada
                                                        • Opcode Fuzzy Hash: 786f9ff2a31b37105e844dc781cd1ee72d4d4d92133bc40f6dfc543ccab83b77
                                                        • Instruction Fuzzy Hash: FC1137B261020AAFDF00DFA8CC46EFA7BB8FB18314F014919F955E2250E735E965DB60
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0051CD7D
                                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0051CDA6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Internet$OpenOption
                                                        • String ID: <local>
                                                        • API String ID: 942729171-4266983199
                                                        • Opcode ID: 44e2fcd436ce0fad51602fa6b35841311545111bb3389995fcc1dcc95f92c961
                                                        • Instruction ID: 33ef7326ec2905d078a014901a8ffdad61f5711caadb519ee5c2934927c509e0
                                                        • Opcode Fuzzy Hash: 44e2fcd436ce0fad51602fa6b35841311545111bb3389995fcc1dcc95f92c961
                                                        • Instruction Fuzzy Hash: 031106712816717AE7344B669C44EE7BE6CFF127A4F00422AB10993180D3729880D6F0
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 005334AB
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 005334BA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: edit
                                                        • API String ID: 2978978980-2167791130
                                                        • Opcode ID: 40979a89ab09d2eb0f6071e356e887fd88cff883087a066fe2c6b3439081aef0
                                                        • Instruction ID: dd1b382972fcb108f3dab821263109f8d69649494d54d31940a8fb6232ed4534
                                                        • Opcode Fuzzy Hash: 40979a89ab09d2eb0f6071e356e887fd88cff883087a066fe2c6b3439081aef0
                                                        • Instruction Fuzzy Hash: A4118F71100208ABEF118F64DC48ABB3F6AFB15378F504724F965971E0C775DC95A750
                                                        APIs
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                        • CharUpperBuffW.USER32(?,?,?), ref: 00506CB6
                                                        • _wcslen.LIBCMT ref: 00506CC2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: STOP
                                                        • API String ID: 1256254125-2411985666
                                                        • Opcode ID: e17cc9151a4396ced5c19982e7a2a7eb59451fc421d4d692052464d76a16b415
                                                        • Instruction ID: 9d9ce37dd45d038d1336190e24b8338c7cbf4bcd4b08c6664f911304e023dcd2
                                                        • Opcode Fuzzy Hash: e17cc9151a4396ced5c19982e7a2a7eb59451fc421d4d692052464d76a16b415
                                                        • Instruction Fuzzy Hash: D0010033A005278BDB20AFBEDC819BF7BA4FB61714B400929E862971D0EB35DC20C650
                                                        APIs
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                          • Part of subcall function 00503CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00503CCA
                                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00501D4C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: e204ba1cd676857f908134dd75d97995d476d91ec5aba05e0a96c2d4bead502a
                                                        • Instruction ID: f293982367168cc48cfa70f9f5d4fab259e923d22f58f21dd7b0d79bba33c03c
                                                        • Opcode Fuzzy Hash: e204ba1cd676857f908134dd75d97995d476d91ec5aba05e0a96c2d4bead502a
                                                        • Instruction Fuzzy Hash: 54012832600614ABCB04EBA4CC15CFE7B68FF63394B04090EF822673D1EA345D088765
                                                        APIs
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                          • Part of subcall function 00503CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00503CCA
                                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00501C46
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: 1926c22245ab8f0eb2374fd2147f5139d5e15a81732f69fae528599af4c12e27
                                                        • Instruction ID: 9c048dbc739b9ca1be6a009e7a35006915bdf225206776df23ae6f72da1a0cae
                                                        • Opcode Fuzzy Hash: 1926c22245ab8f0eb2374fd2147f5139d5e15a81732f69fae528599af4c12e27
                                                        • Instruction Fuzzy Hash: 6A01A77568150467DB18EB90C9569FF7BA8BF62384F14001EF406772C1EA24DE4886BA
                                                        APIs
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                          • Part of subcall function 00503CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00503CCA
                                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00501CC8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: f79dddbbc389799ebdb37e078695481d52c117b6a5dd15cea72fa0442ed0c5a8
                                                        • Instruction ID: f38c0adfaa07a43d6e1b8306cc386cd0b6461b0394694200bef91f8ccab6243d
                                                        • Opcode Fuzzy Hash: f79dddbbc389799ebdb37e078695481d52c117b6a5dd15cea72fa0442ed0c5a8
                                                        • Instruction Fuzzy Hash: 1801DB7168091467DB14E795CA16AFE7BACBF22384F14001AB802772C1EA24DF08C676
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 004BA529
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer_wcslen
                                                        • String ID: ,%W$3yO
                                                        • API String ID: 2551934079-1505818326
                                                        • Opcode ID: bc543461afa51c682f6f20f1acbd201078d797c612deb9447a8c6720b1b02cfe
                                                        • Instruction ID: f53e469ed9d6429da6c0085407bd707cb484d9d21c60f0e0999593fe3d69dcbd
                                                        • Opcode Fuzzy Hash: bc543461afa51c682f6f20f1acbd201078d797c612deb9447a8c6720b1b02cfe
                                                        • Instruction Fuzzy Hash: EB01473260061497C620F76AE80BFAD3794EB05714F40002FF5061B2C2DE1CAE058AAF
                                                        APIs
                                                          • Part of subcall function 004A9CB3: _wcslen.LIBCMT ref: 004A9CBD
                                                          • Part of subcall function 00503CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00503CCA
                                                        • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00501DD3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: fa6c9cdb87eec0ed026d3fee8f53701ecef7df5f5e389dd2940dba12b4a97695
                                                        • Instruction ID: bf412ccb9ae13412f89a1c46b95b84b7c26180bf52ce80c4d8a1d1d37954439b
                                                        • Opcode Fuzzy Hash: fa6c9cdb87eec0ed026d3fee8f53701ecef7df5f5e389dd2940dba12b4a97695
                                                        • Instruction Fuzzy Hash: 10F0F472A50A1566DB04F7A4CC52AFE7B6CBF22394F04091AB822A72C1EA745D088269
                                                        APIs
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00573018,0057305C), ref: 005381BF
                                                        • CloseHandle.KERNEL32 ref: 005381D1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateHandleProcess
                                                        • String ID: \0W
                                                        • API String ID: 3712363035-2964257890
                                                        • Opcode ID: 806ffd2868330db91f7a3f3faad87e5d4455e7f3463fa8d8ffde67ab9c1559cb
                                                        • Instruction ID: 3e52303ecc5ea3dd370b0665aa9cc178f68d541cce87683614c39a6d3b9aa837
                                                        • Opcode Fuzzy Hash: 806ffd2868330db91f7a3f3faad87e5d4455e7f3463fa8d8ffde67ab9c1559cb
                                                        • Instruction Fuzzy Hash: 10F054B1640300BAE3106761BC49F773E5CEB15764F004425BB0CD51A1D6B98A58B3B9
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: 3, 3, 16, 1
                                                        • API String ID: 176396367-3042988571
                                                        • Opcode ID: 5ce6da662516d898fcf2dda017373aa50a9ae2554f86e56d9528ca5a7db5cb91
                                                        • Instruction ID: 87d2eaac3da569ca4637e88e0eb91919e6f37e410a1040002b74ee4bb7de6b98
                                                        • Opcode Fuzzy Hash: 5ce6da662516d898fcf2dda017373aa50a9ae2554f86e56d9528ca5a7db5cb91
                                                        • Instruction Fuzzy Hash: D8E023467043301056B13276BDC1E7F5E89EFCF754710182FF541C2296D6548D9153E4
                                                        APIs
                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00500B23
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Message
                                                        • String ID: AutoIt$Error allocating memory.
                                                        • API String ID: 2030045667-4017498283
                                                        • Opcode ID: c7093ad5e7e025b8dde83439f8370666d49abd978b07121fed4f73ec098bdc02
                                                        • Instruction ID: 74c5b4bf9d45d5c1fcf063fee821a9b6fa854aae5b70f3898e20ab87236866b3
                                                        • Opcode Fuzzy Hash: c7093ad5e7e025b8dde83439f8370666d49abd978b07121fed4f73ec098bdc02
                                                        • Instruction Fuzzy Hash: 4AE0DF322843182AD21036967C03FDD7F88AF05B29F10042FFB98A55C38AE668A047BD
                                                        APIs
                                                          • Part of subcall function 004BF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,004C0D71,?,?,?,004A100A), ref: 004BF7CE
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,004A100A), ref: 004C0D75
                                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,004A100A), ref: 004C0D84
                                                        Strings
                                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 004C0D7F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                        • API String ID: 55579361-631824599
                                                        • Opcode ID: a941c4d282a3f2eb31d2e52db6036fd0331b337941e6d6e184de53469fd48542
                                                        • Instruction ID: e9aa9510a583e4a0a9d8cffeaeb491989c4659ca4650ccedc4df8788a7ee3714
                                                        • Opcode Fuzzy Hash: a941c4d282a3f2eb31d2e52db6036fd0331b337941e6d6e184de53469fd48542
                                                        • Instruction Fuzzy Hash: 7BE06D782007118BD3B09FB9E8047467FE4BB10744F00896EE886C6751DBB8E4489BA5
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 004BE3D5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: 0%W$8%W
                                                        • API String ID: 1385522511-4035536259
                                                        • Opcode ID: d5d83704f45eb0b0296ac5f539e50b143d622e33f0b70ae5c04beed2dd481f0c
                                                        • Instruction ID: 1f69bc4a2ba9e81a2d14da74906e0ff0a7689039fa3f9033d733b037681f50ca
                                                        • Opcode Fuzzy Hash: d5d83704f45eb0b0296ac5f539e50b143d622e33f0b70ae5c04beed2dd481f0c
                                                        • Instruction Fuzzy Hash: F9E02631400910CBC604972AB854EC833D1FB8432CF1061AFE90A8F2D39B3CA882B76D
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: LocalTime
                                                        • String ID: %.3d$X64
                                                        • API String ID: 481472006-1077770165
                                                        • Opcode ID: 019be8ea0fefb23ae746c606edf065606ec67fc13a0352b348efd956ba905eb4
                                                        • Instruction ID: 0adc0d700385d783fb646e59963dab9290fae29aa48bd804f459f7e765931eef
                                                        • Opcode Fuzzy Hash: 019be8ea0fefb23ae746c606edf065606ec67fc13a0352b348efd956ba905eb4
                                                        • Instruction Fuzzy Hash: 45D01271C0810CEACB5097D0DC458FAB77DBB18301F518493FA06A2040E62CD50AA7AB
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0053236C
                                                        • PostMessageW.USER32(00000000), ref: 00532373
                                                          • Part of subcall function 0050E97B: Sleep.KERNEL32 ref: 0050E9F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 28f81da632ee3243d799927b8233aa0cc388f09cc83f9eb56249acadc09f4b5e
                                                        • Instruction ID: 96c47b905e32137e42beff1c0e1e4dc66f68651a05fa2b8cf7bf9afe6c58e237
                                                        • Opcode Fuzzy Hash: 28f81da632ee3243d799927b8233aa0cc388f09cc83f9eb56249acadc09f4b5e
                                                        • Instruction Fuzzy Hash: 0AD0C9323813107AE664A7709C0FFCA7E14AB55B10F1049167645BA2D0C9A0A8059B54
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0053232C
                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0053233F
                                                          • Part of subcall function 0050E97B: Sleep.KERNEL32 ref: 0050E9F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1688127598.00000000004A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004A0000, based on PE: true
                                                        • Associated: 00000000.00000002.1688105616.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.000000000053C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688265581.0000000000562000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688368382.000000000056C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1688441663.0000000000574000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4a0000_EZZGTmJj4O.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 0c49401e46ef1eb0f32d5b32845ad5d0d8e25733b3302d40be915435d1fe0e14
                                                        • Instruction ID: a1013229b4392ea4bdb0ba0b2109e1855aaa2ae0fbe23ae92f185aa3d08b7db5
                                                        • Opcode Fuzzy Hash: 0c49401e46ef1eb0f32d5b32845ad5d0d8e25733b3302d40be915435d1fe0e14
                                                        • Instruction Fuzzy Hash: F0D0C936394310B6E664A7709C0FFCA7E14AB51B10F1049167645BA2D0C9A0A8059B54