Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SOA NOV. Gateway Freight_MEDWA0577842.exe

Overview

General Information

Sample name:SOA NOV. Gateway Freight_MEDWA0577842.exe
Analysis ID:1586934
MD5:6279973ea55b8bfa39e542a508de961f
SHA1:9af982394d1f6a114071a76cba3bb27fe7d310b6
SHA256:8c5e09a96b5420d6bf8cefaf5465ccc94c69e1849b7aa6ad194d3633d560742f
Tags:exeuser-lowmal3
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SOA NOV. Gateway Freight_MEDWA0577842.exe (PID: 2912 cmdline: "C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exe" MD5: 6279973EA55B8BFA39E542A508DE961F)
    • RegSvcs.exe (PID: 2484 cmdline: "C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "serverche399@gpsamsterdamqroup.com", "Password": "     j4YX(KT7UCZ1      ", "Server": "fiber13.dnsiaas.com", "To": "almightstephen@gmail.com", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xf1a7:$a1: get_encryptedPassword
        • 0xf4cf:$a2: get_encryptedUsername
        • 0xef42:$a3: get_timePasswordChanged
        • 0xf063:$a4: get_passwordField
        • 0xf1bd:$a5: set_encryptedPassword
        • 0x10b19:$a7: get_logins
        • 0x107ca:$a8: GetOutlookPasswords
        • 0x105bc:$a9: StartKeylogger
        • 0x10a69:$a10: KeyLoggerEventArgs
        • 0x10619:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmpMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x141ab:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x136a9:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x139b7:$a4: \Orbitum\User Data\Default\Login Data
        • 0x147af:$a5: \Kometa\User Data\Default\Login Data
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0xd3a7:$a1: get_encryptedPassword
              • 0xd6cf:$a2: get_encryptedUsername
              • 0xd142:$a3: get_timePasswordChanged
              • 0xd263:$a4: get_passwordField
              • 0xd3bd:$a5: set_encryptedPassword
              • 0xed19:$a7: get_logins
              • 0xe9ca:$a8: GetOutlookPasswords
              • 0xe7bc:$a9: StartKeylogger
              • 0xec69:$a10: KeyLoggerEventArgs
              • 0xe819:$a11: KeyLoggerEventArgsEventHandler
              0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x123ab:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x118a9:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x11bb7:$a4: \Orbitum\User Data\Default\Login Data
              • 0x129af:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 10 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-09T19:14:01.045188+010028032742Potentially Bad Traffic192.168.2.449730193.122.130.080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 1.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "serverche399@gpsamsterdamqroup.com", "Password": " j4YX(KT7UCZ1 ", "Server": "fiber13.dnsiaas.com", "To": "almightstephen@gmail.com", "Port": 587}
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeReversingLabs: Detection: 55%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeJoe Sandbox ML: detected

              Location Tracking

              barindex
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49731 version: TLS 1.0
              Source: Binary string: wntdll.pdbUGP source: SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000003.1695256599.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000003.1695650513.0000000003870000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000003.1695256599.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000003.1695650513.0000000003870000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B44696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B44696
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B4C9C7
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4C93C FindFirstFileW,FindClose,0_2_00B4C93C
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4F200
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4F35D
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4F65E
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B43A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B43A2B
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B43D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B43D4E
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4BF27
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 03179731h1_2_03179480
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 03179E5Ah1_2_03179A40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 03179E5Ah1_2_03179A30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 03179E5Ah1_2_03179D87
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
              Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: reallyfreegeoip.org
              Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 193.122.130.0:80
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: unknownHTTPS traffic detected: 104.21.64.1:443 -> 192.168.2.4:49731 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B525E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00B525E2
              Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
              Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
              Source: RegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
              Source: RegSvcs.exe, 00000001.00000002.2939173588.00000000032FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegSvcs.exe, 00000001.00000002.2939173588.0000000003291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: RegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
              Source: RegSvcs.exe, 00000001.00000002.2939173588.000000000332D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000001.00000002.2939173588.000000000332D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
              Source: RegSvcs.exe, 00000001.00000002.2939173588.0000000003291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
              Source: RegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
              Source: RegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B5425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B5425A
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B54458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B54458
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B5425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B5425A
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B40219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00B40219
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B6CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B6CDAC

              System Summary

              barindex
              Source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: SOA NOV. Gateway Freight_MEDWA0577842.exe PID: 2912, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RegSvcs.exe PID: 2484, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: This is a third-party compiled AutoIt script.0_2_00AE3B4C
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f1312ac0-c
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_505d23b4-5
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f0507e13-b
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_8776bcd7-3
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B440B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00B440B1
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B38858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00B38858
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00B4545F
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B0DBB50_2_00B0DBB5
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AEE0600_2_00AEE060
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B6804A0_2_00B6804A
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AF41400_2_00AF4140
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B024050_2_00B02405
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B165220_2_00B16522
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B1267E0_2_00B1267E
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B606650_2_00B60665
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B0283A0_2_00B0283A
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AEE8000_2_00AEE800
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AF68430_2_00AF6843
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B189DF0_2_00B189DF
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B16A940_2_00B16A94
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B60AE20_2_00B60AE2
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AF8A0E0_2_00AF8A0E
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B48B130_2_00B48B13
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B3EB070_2_00B3EB07
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B0CD610_2_00B0CD61
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B170060_2_00B17006
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AF31900_2_00AF3190
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AF710E0_2_00AF710E
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AE12870_2_00AE1287
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B033C70_2_00B033C7
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B0F4190_2_00B0F419
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AF56800_2_00AF5680
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B016C40_2_00B016C4
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B078D30_2_00B078D3
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AF58C00_2_00AF58C0
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B01BB80_2_00B01BB8
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B19D050_2_00B19D05
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AEFE400_2_00AEFE40
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B0BFE60_2_00B0BFE6
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B01FD00_2_00B01FD0
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_0136C2880_2_0136C288
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0317C5301_2_0317C530
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_03172DE01_2_03172DE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_031794801_2_03179480
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0317C5211_2_0317C521
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0317946F1_2_0317946F
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: String function: 00B00D27 appears 70 times
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: String function: 00AE7F41 appears 35 times
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: String function: 00B08B40 appears 42 times
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000003.1694738517.0000000003B3D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SOA NOV. Gateway Freight_MEDWA0577842.exe
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs SOA NOV. Gateway Freight_MEDWA0577842.exe
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000003.1693752543.0000000003993000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SOA NOV. Gateway Freight_MEDWA0577842.exe
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: SOA NOV. Gateway Freight_MEDWA0577842.exe PID: 2912, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RegSvcs.exe PID: 2484, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4A2D5 GetLastError,FormatMessageW,0_2_00B4A2D5
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B38713 AdjustTokenPrivileges,CloseHandle,0_2_00B38713
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B38CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00B38CC3
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00B4B59E
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B5F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00B5F121
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B586D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00B586D0
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AE4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00AE4FE9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeFile created: C:\Users\user\AppData\Local\Temp\autBA34.tmpJump to behavior
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RegSvcs.exe, 00000001.00000002.2939173588.000000000338F000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2939173588.0000000003371000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2939173588.0000000003380000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeReversingLabs: Detection: 55%
              Source: unknownProcess created: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exe "C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exe"
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exe"
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000003.1695256599.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000003.1695650513.0000000003870000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000003.1695256599.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000003.1695650513.0000000003870000.00000004.00001000.00020000.00000000.sdmp
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B5C304 LoadLibraryA,GetProcAddress,0_2_00B5C304
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B48719 push FFFFFF8Bh; iretd 0_2_00B4871B
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B0E94F push edi; ret 0_2_00B0E951
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B0EA68 push esi; ret 0_2_00B0EA6A
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B08B85 push ecx; ret 0_2_00B08B98
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B0EC43 push esi; ret 0_2_00B0EC45
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B0ED2C push edi; ret 0_2_00B0ED2E
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AE4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AE4A35
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B655FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B655FD
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B033C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00B033C7
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeAPI/Special instruction interceptor: Address: 136BEAC
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-99114
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeAPI coverage: 4.5 %
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B44696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B44696
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B4C9C7
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4C93C FindFirstFileW,FindClose,0_2_00B4C93C
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4F200
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4F35D
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4F65E
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B43A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B43A2B
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B43D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B43D4E
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B4BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4BF27
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AE4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AE4AFE
              Source: RegSvcs.exe, 00000001.00000002.2938450686.00000000014ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllg
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B541FD BlockInput,0_2_00B541FD
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AE3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AE3B4C
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B15CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00B15CCC
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B5C304 LoadLibraryA,GetProcAddress,0_2_00B5C304
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_0136C118 mov eax, dword ptr fs:[00000030h]0_2_0136C118
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_0136C178 mov eax, dword ptr fs:[00000030h]0_2_0136C178
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_0136AAE8 mov eax, dword ptr fs:[00000030h]0_2_0136AAE8
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B381F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B381F7
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B0A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B0A395
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B0A364 SetUnhandledExceptionFilter,0_2_00B0A364
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1054008Jump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B38C93 LogonUserW,0_2_00B38C93
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AE3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AE3B4C
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AE4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AE4A35
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B44EF5 mouse_event,0_2_00B44EF5
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B381F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B381F7
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B44C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00B44C03
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B0886B cpuid 0_2_00B0886B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B150D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00B150D7
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B22230 GetUserNameW,0_2_00B22230
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B1418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00B1418A
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00AE4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AE4AFE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SOA NOV. Gateway Freight_MEDWA0577842.exe PID: 2912, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2484, type: MEMORYSTR
              Source: Yara matchFile source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SOA NOV. Gateway Freight_MEDWA0577842.exe PID: 2912, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2484, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeBinary or memory string: WIN_81
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeBinary or memory string: WIN_XP
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeBinary or memory string: WIN_XPe
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeBinary or memory string: WIN_VISTA
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeBinary or memory string: WIN_7
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeBinary or memory string: WIN_8
              Source: SOA NOV. Gateway Freight_MEDWA0577842.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
              Source: Yara matchFile source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2939173588.00000000033B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SOA NOV. Gateway Freight_MEDWA0577842.exe PID: 2912, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2484, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SOA NOV. Gateway Freight_MEDWA0577842.exe PID: 2912, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2484, type: MEMORYSTR
              Source: Yara matchFile source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.SOA NOV. Gateway Freight_MEDWA0577842.exe.ac0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SOA NOV. Gateway Freight_MEDWA0577842.exe PID: 2912, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2484, type: MEMORYSTR
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B56596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00B56596
              Source: C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exeCode function: 0_2_00B56A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00B56A5A
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              2
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job2
              Valid Accounts
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              3
              Obfuscated Files or Information
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS127
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              2
              Valid Accounts
              LSA Secrets131
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
              Access Token Manipulation
              Cached Domain Credentials2
              Process Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items212
              Process Injection
              DCSync1
              Application Window Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
              System Owner/User Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Network Configuration Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              SOA NOV. Gateway Freight_MEDWA0577842.exe55%ReversingLabsWin32.Trojan.AutoitInject
              SOA NOV. Gateway Freight_MEDWA0577842.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              104.21.64.1
              truefalse
                high
                checkip.dyndns.com
                193.122.130.0
                truefalse
                  high
                  checkip.dyndns.org
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/false
                      high
                      https://reallyfreegeoip.org/xml/8.46.123.189false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.org/xml/8.46.123.189lRegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.comdRegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.org/qSOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              http://reallyfreegeoip.orgdRegSvcs.exe, 00000001.00000002.2939173588.000000000332D000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.org/xml/8.46.123.189dRegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.2939173588.000000000332D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.orgdRegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://checkip.dyndns.orgRegSvcs.exe, 00000001.00000002.2939173588.00000000032FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.comRegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.org/dRegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.2939173588.0000000003291000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://api.telegram.org/bot-/sendDocument?chat_id=SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                  high
                                                  https://reallyfreegeoip.org/xml/SOA NOV. Gateway Freight_MEDWA0577842.exe, 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2939173588.0000000003310000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    193.122.130.0
                                                    checkip.dyndns.comUnited States
                                                    31898ORACLE-BMC-31898USfalse
                                                    104.21.64.1
                                                    reallyfreegeoip.orgUnited States
                                                    13335CLOUDFLARENETUSfalse
                                                    Joe Sandbox version:42.0.0 Malachite
                                                    Analysis ID:1586934
                                                    Start date and time:2025-01-09 19:13:06 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 5m 48s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:6
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:SOA NOV. Gateway Freight_MEDWA0577842.exe
                                                    Detection:MAL
                                                    Classification:mal100.troj.spyw.evad.winEXE@3/2@2/2
                                                    EGA Information:
                                                    • Successful, ratio: 50%
                                                    HCA Information:
                                                    • Successful, ratio: 100%
                                                    • Number of executed functions: 50
                                                    • Number of non-executed functions: 276
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                    • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45
                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                    • Execution Graph export aborted for target RegSvcs.exe, PID 2484 because it is empty
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                    • VT rate limit hit for: SOA NOV. Gateway Freight_MEDWA0577842.exe
                                                    No simulations
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    193.122.130.0Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                    • checkip.dyndns.org/
                                                    Nuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • checkip.dyndns.org/
                                                    VSLS SCHEDULE_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                    • checkip.dyndns.org/
                                                    ungziped_file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    • checkip.dyndns.org/
                                                    New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                    • checkip.dyndns.org/
                                                    file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    • checkip.dyndns.org/
                                                    image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                    • checkip.dyndns.org/
                                                    DHL DOC INV 191224.gz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • checkip.dyndns.org/
                                                    PO_KB#67897.cmdGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                    • checkip.dyndns.org/
                                                    MT Eagle Asia 11.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    • checkip.dyndns.org/
                                                    104.21.64.1QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                    • www.mzkd6gp5.top/3u0p/
                                                    Sales Acknowledgement - HES #982323.pdfGet hashmaliciousUnknownBrowse
                                                    • ordrr.statementquo.com/QCbxA/
                                                    SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                    • adsfirm.com/administrator/index.php
                                                    PO2412010.exeGet hashmaliciousFormBookBrowse
                                                    • www.bser101pp.buzz/v89f/
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    reallyfreegeoip.org#U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.96.1
                                                    fiyati_teklif 65TBI20_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.64.1
                                                    fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.112.1
                                                    1C24TDP_000000029.jseGet hashmaliciousMassLogger RATBrowse
                                                    • 104.21.96.1
                                                    jqxrkk.ps1Get hashmaliciousMassLogger RATBrowse
                                                    • 104.21.16.1
                                                    Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 104.21.16.1
                                                    Order_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                    • 104.21.64.1
                                                    Nuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.16.1
                                                    CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 104.21.96.1
                                                    Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.80.1
                                                    checkip.dyndns.com#U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 132.226.247.73
                                                    fiyati_teklif 65TBI20_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 132.226.247.73
                                                    fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 132.226.8.169
                                                    1C24TDP_000000029.jseGet hashmaliciousMassLogger RATBrowse
                                                    • 132.226.247.73
                                                    jqxrkk.ps1Get hashmaliciousMassLogger RATBrowse
                                                    • 132.226.8.169
                                                    Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 193.122.130.0
                                                    Order_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                    • 132.226.8.169
                                                    Nuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 193.122.130.0
                                                    fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                    • 132.226.8.169
                                                    CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 132.226.8.169
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    ORACLE-BMC-31898USTepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 193.122.130.0
                                                    Nuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 193.122.130.0
                                                    Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                    • 193.122.6.168
                                                    December Reconciliation QuanKang.exeGet hashmaliciousUnknownBrowse
                                                    • 193.122.6.168
                                                    PO.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 193.122.6.168
                                                    BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 158.101.44.242
                                                    VSLS SCHEDULE_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 193.122.130.0
                                                    ungziped_file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    • 193.122.130.0
                                                    miori.x86.elfGet hashmaliciousUnknownBrowse
                                                    • 140.204.251.205
                                                    New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                    • 193.122.130.0
                                                    CLOUDFLARENETUSdekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.96.1
                                                    #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.96.1
                                                    fiyati_teklif 65TBI20_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.64.1
                                                    fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.112.1
                                                    1C24TDP_000000029.jseGet hashmaliciousMassLogger RATBrowse
                                                    • 104.21.96.1
                                                    jqxrkk.ps1Get hashmaliciousMassLogger RATBrowse
                                                    • 104.21.16.1
                                                    0V2JsCrGUB.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                    • 104.21.38.84
                                                    https://boutiquedumonde.instawp.xyz/wp-content/themes/twentytwentyfive/envoidoclosa_toutdomaine/wetransfer/index.htmlGet hashmaliciousUnknownBrowse
                                                    • 1.1.1.1
                                                    drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                    • 172.67.74.152
                                                    Fantazy.x86_64.elfGet hashmaliciousUnknownBrowse
                                                    • 1.3.115.13
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    54328bd36c14bd82ddaa0c04b25ed9addekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.64.1
                                                    #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.64.1
                                                    fiyati_teklif 65TBI20_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.64.1
                                                    fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.64.1
                                                    1C24TDP_000000029.jseGet hashmaliciousMassLogger RATBrowse
                                                    • 104.21.64.1
                                                    jqxrkk.ps1Get hashmaliciousMassLogger RATBrowse
                                                    • 104.21.64.1
                                                    Tepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 104.21.64.1
                                                    Order_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                    • 104.21.64.1
                                                    Nuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.21.64.1
                                                    CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                    • 104.21.64.1
                                                    No context
                                                    Process:C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):93696
                                                    Entropy (8bit):6.878346061307491
                                                    Encrypted:false
                                                    SSDEEP:1536:a1gaMA1XCwN/wj0A2m0xN4OZuuJPloT1BH8uQL2LvT4X4tidepRZ3L7XO/SqGXZp:a1mMXCwDA2pUmbReT1BH8uQy4XoLpRZD
                                                    MD5:9D760A2C0601EE707A6E38A753577EAB
                                                    SHA1:4D87910ABBE6EB4EFF60F74CCDA8ED37FF1AFD71
                                                    SHA-256:F22A6E39C9F97E7F35177F3D6E84C61C99D00532301C90C43A401E1542E03281
                                                    SHA-512:19C740A9949FBCEE674811CC02221EBBCAD8303EF3D0E8F0380259498D2AAC810567DC54C1EFE80ABC2BC8E7181195625A098EA74C01C9A85101B83C6E4B2556
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:...N@ZBARU1I..Y0.NH33QVZ.NCZBAVU1IDSY03NH33QVZJNCZBAVU1IDSY0.NH3=N.TJ.J.c.W..h.;0C.>:\T#77j-"4,."uS,d!,^.'&.w..z'!'?lL[_.IDSY03N.v3Q.[IN...VU1IDSY0.NJ28P.ZJ*BZBIVU1IDS.2NH.3QV.KNCZ.AVu1IDQY07NH33QVZLNCZBAVU1.ESY23NH33QTZ*.CZRAVE1IDSI03^H33QVZZNCZBAVU1IDS..2N.33QV.KN._BAVU1IDSY03NH33QVZJ.BZNAVU1IDSY03NH33QVZJNCZBAVU1IDSY03NH33QVZJNCZBAVU1IDSY.3N@33QVZJNCZBA^u1I.SY03NH33QVZd:&"6AVU.+ESY.3NHW2QVXJNCZBAVU1IDSY0.NHS.#%()NCZ.DVU1.ESY63NHU2QVZJNCZBAVU1I.SYp.<-_\2VZFNCZB.WU1KDSY\2NH33QVZJNCZBA.U1.DSY03NH33QVZJNCZ..WU1IDS.03NJ36Q..JNC.BAUU1I.SY6..H3.QVZJNCZBAVU1IDSY03NH33QVZJNCZBAVU1IDSY03NH3.,.U...31.U1IDSY11ML5;YVZJNCZBA(U1I.SY0sNH3.QVZoNCZ/AVU.IDS'03N633Q2ZJN1ZBA7U1I.SY0\NH3]QVZ4NCZ\C~J1INy.01fh33[Vp.=bZBK.T1I@ {03D.13QR)iNCP.BVU5:`SY:.JH37"sZJD._BAR.kIG.O63NS\.QVPJM.ODAVN.oDQq.3NB3.wVY.[EZBZ|w1K.ZY07d.@.QV\b.CZH5_U1K.YY07dV1..VZ@da$QAVQ.Inq'$3NL.3{t$_NC^iA|wO_DS].3djM$QV^aNi\h#V'.ED#Z_RNH5..VZ@f.ZBGV..I:]Y07L'.3Q\|`tCr.AVS1a.SY63d.3MbVZNbD$qAVQ._:bY07.NK3QP).NCPg.eU1Ml.Y09Nb.3y.ZJHCr.AVS
                                                    Process:C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):66122
                                                    Entropy (8bit):7.89875108073959
                                                    Encrypted:false
                                                    SSDEEP:1536:n8jt3R9pvGLBtSyLEYK0wsHKrQqQOduVANg+PJInzEvzEzPNUeGEy:8jJR9xCCYzwoKrQzANvInMcPOMy
                                                    MD5:12D70184ED3F6855904BD1018B7AE8B3
                                                    SHA1:D38136BAF49DE3D4E26D28F2F96D9EF73AA07591
                                                    SHA-256:1B1163F9E33C9F4C884061D28B1D2B50E6A213426AE2FE0F8F1E84284CB912F9
                                                    SHA-512:26ECFB7A9392D18FFC844384C88A9B475F92E575FE52A7AB711D969C885DECE823985203613C8E93BC0BB6A296DB36D89B44232C0075CD2AD0C022DEAC74E1A7
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:EA06..n...;T..j.A.Uf4...0...9.F.Z.S.`..X.X.T.3....i@.....X...JW...j..!;.P.s..r.#...R...Y..]jr.$.Y^....;.z.z..d..e2._..,f1v..cU.M;#..o..5.R.S....J.P.T*H..8.).:....?T..B.A.]@...fa7...0.kZ.-N.2...R.*...U*.Z....f.:..f+@...,.....0.../..B.S.B? .o.!3.P...^..!....N..)..a...@.*E^eQ.V..>..:.S...H..........l.XUf@.....Y.Gg...reV.Q....^.1..!........a`.....W.n. ..*g6......A..........L.`._.....j..O.g1.j@..1..i.Y.d..R..b..X\... ..o..%..@..'.B&..........p....XW.....a4.,+.;.*cI.^o.....3.....$..Z.R..I.&. ..&tND.gQ.Jm4..C.B.Uf...N.:...9...Z.Q8`<.J.k........\..j..U7{O.Pj....Q..ft...3w.Vv..-j.Z.].4.%h...G...Z.b.P.T..|...V@....7..V..K...A.TcT.u.O$.......$..u.M..w...:.ngd.Sd...z.N..-.:...E.H.U..:.5.....4..B...L...S$...F.|.](w(...S..b.?M..3...u..$..75.....S.s:.BS...,..-VcM.x.3..:....a..U".r..!P..&......k...C.P.0..D....:E"7...l.......htJ.j...R&.....J.Q..J.R]...*....N..o9....p..-.1..F..6v..........M.....!b2...(5M\..D...S..rg3..$........)u)t>a3.X....n.J.P......a..1.....-......B.i
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):6.8795971453801315
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:SOA NOV. Gateway Freight_MEDWA0577842.exe
                                                    File size:1'004'032 bytes
                                                    MD5:6279973ea55b8bfa39e542a508de961f
                                                    SHA1:9af982394d1f6a114071a76cba3bb27fe7d310b6
                                                    SHA256:8c5e09a96b5420d6bf8cefaf5465ccc94c69e1849b7aa6ad194d3633d560742f
                                                    SHA512:c7ad4b4a406efa225572782c30a04b760b9e3fee744b6ed8fd51e0ddd0ffc0fd2c566157926ae2c800874b14f2c0f41d74afc2a8db366b4919a4c6ad95d2b1a2
                                                    SSDEEP:24576:gAHnh+eWsN3skA4RV1Hom2KXMmHaZ8aAa9j5:Xh+ZkldoPK8YaZ3Bn
                                                    TLSH:B5259C0273D1C036FFABA2739B6AF24556BC79254133852F13981DB9BD701B2227E663
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                                                    Icon Hash:aaf3e3e3938382a0
                                                    Entrypoint:0x42800a
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x6769F882 [Mon Dec 23 23:55:46 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:1
                                                    File Version Major:5
                                                    File Version Minor:1
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:1
                                                    Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                    Instruction
                                                    call 00007FCF5086AE3Dh
                                                    jmp 00007FCF5085DBF4h
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    push edi
                                                    push esi
                                                    mov esi, dword ptr [esp+10h]
                                                    mov ecx, dword ptr [esp+14h]
                                                    mov edi, dword ptr [esp+0Ch]
                                                    mov eax, ecx
                                                    mov edx, ecx
                                                    add eax, esi
                                                    cmp edi, esi
                                                    jbe 00007FCF5085DD7Ah
                                                    cmp edi, eax
                                                    jc 00007FCF5085E0DEh
                                                    bt dword ptr [004C41FCh], 01h
                                                    jnc 00007FCF5085DD79h
                                                    rep movsb
                                                    jmp 00007FCF5085E08Ch
                                                    cmp ecx, 00000080h
                                                    jc 00007FCF5085DF44h
                                                    mov eax, edi
                                                    xor eax, esi
                                                    test eax, 0000000Fh
                                                    jne 00007FCF5085DD80h
                                                    bt dword ptr [004BF324h], 01h
                                                    jc 00007FCF5085E250h
                                                    bt dword ptr [004C41FCh], 00000000h
                                                    jnc 00007FCF5085DF1Dh
                                                    test edi, 00000003h
                                                    jne 00007FCF5085DF2Eh
                                                    test esi, 00000003h
                                                    jne 00007FCF5085DF0Dh
                                                    bt edi, 02h
                                                    jnc 00007FCF5085DD7Fh
                                                    mov eax, dword ptr [esi]
                                                    sub ecx, 04h
                                                    lea esi, dword ptr [esi+04h]
                                                    mov dword ptr [edi], eax
                                                    lea edi, dword ptr [edi+04h]
                                                    bt edi, 03h
                                                    jnc 00007FCF5085DD83h
                                                    movq xmm1, qword ptr [esi]
                                                    sub ecx, 08h
                                                    lea esi, dword ptr [esi+08h]
                                                    movq qword ptr [edi], xmm1
                                                    lea edi, dword ptr [edi+08h]
                                                    test esi, 00000007h
                                                    je 00007FCF5085DDD5h
                                                    bt esi, 03h
                                                    Programming Language:
                                                    • [ASM] VS2013 build 21005
                                                    • [ C ] VS2013 build 21005
                                                    • [C++] VS2013 build 21005
                                                    • [ C ] VS2008 SP1 build 30729
                                                    • [IMP] VS2008 SP1 build 30729
                                                    • [ASM] VS2013 UPD5 build 40629
                                                    • [RES] VS2013 build 21005
                                                    • [LNK] VS2013 UPD5 build 40629
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x2aa80.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xf30000x7134.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0xc80000x2aa800x2ac00c5757d85e6cd8b911f0331f380e4b65eFalse0.8451834338450293data7.67847607125333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0xf30000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                    RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                    RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                    RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                    RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                    RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                    RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                    RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                    RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                    RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                    RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                    RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                                                    RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                                                    RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                                                    RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                                                    RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                    RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                    RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                                                    RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                    RT_RCDATA0xd07b80x21d45data1.0003680583119836
                                                    RT_GROUP_ICON0xf25000x76dataEnglishGreat Britain0.6610169491525424
                                                    RT_GROUP_ICON0xf25780x14dataEnglishGreat Britain1.25
                                                    RT_GROUP_ICON0xf258c0x14dataEnglishGreat Britain1.15
                                                    RT_GROUP_ICON0xf25a00x14dataEnglishGreat Britain1.25
                                                    RT_VERSION0xf25b40xdcdataEnglishGreat Britain0.6181818181818182
                                                    RT_MANIFEST0xf26900x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                    DLLImport
                                                    WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                    VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                    MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                    WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                    PSAPI.DLLGetProcessMemoryInfo
                                                    IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                    USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                    UxTheme.dllIsThemeActive
                                                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                    USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                    GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                    COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                    SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                    OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishGreat Britain
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2025-01-09T19:14:01.045188+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730193.122.130.080TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jan 9, 2025 19:14:00.424076080 CET4973080192.168.2.4193.122.130.0
                                                    Jan 9, 2025 19:14:00.428972006 CET8049730193.122.130.0192.168.2.4
                                                    Jan 9, 2025 19:14:00.429063082 CET4973080192.168.2.4193.122.130.0
                                                    Jan 9, 2025 19:14:00.429289103 CET4973080192.168.2.4193.122.130.0
                                                    Jan 9, 2025 19:14:00.434114933 CET8049730193.122.130.0192.168.2.4
                                                    Jan 9, 2025 19:14:00.893805027 CET8049730193.122.130.0192.168.2.4
                                                    Jan 9, 2025 19:14:00.898442030 CET4973080192.168.2.4193.122.130.0
                                                    Jan 9, 2025 19:14:00.903909922 CET8049730193.122.130.0192.168.2.4
                                                    Jan 9, 2025 19:14:01.000241041 CET8049730193.122.130.0192.168.2.4
                                                    Jan 9, 2025 19:14:01.045187950 CET4973080192.168.2.4193.122.130.0
                                                    Jan 9, 2025 19:14:01.232527971 CET8049730193.122.130.0192.168.2.4
                                                    Jan 9, 2025 19:14:01.232633114 CET4973080192.168.2.4193.122.130.0
                                                    Jan 9, 2025 19:14:01.246692896 CET49731443192.168.2.4104.21.64.1
                                                    Jan 9, 2025 19:14:01.246762991 CET44349731104.21.64.1192.168.2.4
                                                    Jan 9, 2025 19:14:01.246870041 CET49731443192.168.2.4104.21.64.1
                                                    Jan 9, 2025 19:14:01.462377071 CET49731443192.168.2.4104.21.64.1
                                                    Jan 9, 2025 19:14:01.462466955 CET44349731104.21.64.1192.168.2.4
                                                    Jan 9, 2025 19:14:01.958148956 CET44349731104.21.64.1192.168.2.4
                                                    Jan 9, 2025 19:14:01.958379030 CET49731443192.168.2.4104.21.64.1
                                                    Jan 9, 2025 19:14:01.964106083 CET49731443192.168.2.4104.21.64.1
                                                    Jan 9, 2025 19:14:01.964137077 CET44349731104.21.64.1192.168.2.4
                                                    Jan 9, 2025 19:14:01.964529037 CET44349731104.21.64.1192.168.2.4
                                                    Jan 9, 2025 19:14:02.013947964 CET49731443192.168.2.4104.21.64.1
                                                    Jan 9, 2025 19:14:02.041275024 CET49731443192.168.2.4104.21.64.1
                                                    Jan 9, 2025 19:14:02.083328962 CET44349731104.21.64.1192.168.2.4
                                                    Jan 9, 2025 19:14:02.180468082 CET44349731104.21.64.1192.168.2.4
                                                    Jan 9, 2025 19:14:02.180538893 CET44349731104.21.64.1192.168.2.4
                                                    Jan 9, 2025 19:14:02.180740118 CET49731443192.168.2.4104.21.64.1
                                                    Jan 9, 2025 19:14:02.186505079 CET49731443192.168.2.4104.21.64.1
                                                    Jan 9, 2025 19:15:06.000657082 CET8049730193.122.130.0192.168.2.4
                                                    Jan 9, 2025 19:15:06.000773907 CET4973080192.168.2.4193.122.130.0
                                                    Jan 9, 2025 19:15:41.014679909 CET4973080192.168.2.4193.122.130.0
                                                    Jan 9, 2025 19:15:41.019448042 CET8049730193.122.130.0192.168.2.4
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jan 9, 2025 19:14:00.411550045 CET5750653192.168.2.41.1.1.1
                                                    Jan 9, 2025 19:14:00.418905020 CET53575061.1.1.1192.168.2.4
                                                    Jan 9, 2025 19:14:01.066099882 CET5776753192.168.2.41.1.1.1
                                                    Jan 9, 2025 19:14:01.234746933 CET53577671.1.1.1192.168.2.4
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Jan 9, 2025 19:14:00.411550045 CET192.168.2.41.1.1.10x42aeStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                    Jan 9, 2025 19:14:01.066099882 CET192.168.2.41.1.1.10x748dStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Jan 9, 2025 19:14:00.418905020 CET1.1.1.1192.168.2.40x42aeNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                    Jan 9, 2025 19:14:00.418905020 CET1.1.1.1192.168.2.40x42aeNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                    Jan 9, 2025 19:14:00.418905020 CET1.1.1.1192.168.2.40x42aeNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                    Jan 9, 2025 19:14:00.418905020 CET1.1.1.1192.168.2.40x42aeNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                    Jan 9, 2025 19:14:00.418905020 CET1.1.1.1192.168.2.40x42aeNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                    Jan 9, 2025 19:14:00.418905020 CET1.1.1.1192.168.2.40x42aeNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                    Jan 9, 2025 19:14:01.234746933 CET1.1.1.1192.168.2.40x748dNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                    Jan 9, 2025 19:14:01.234746933 CET1.1.1.1192.168.2.40x748dNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                    Jan 9, 2025 19:14:01.234746933 CET1.1.1.1192.168.2.40x748dNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                    Jan 9, 2025 19:14:01.234746933 CET1.1.1.1192.168.2.40x748dNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                    Jan 9, 2025 19:14:01.234746933 CET1.1.1.1192.168.2.40x748dNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                    Jan 9, 2025 19:14:01.234746933 CET1.1.1.1192.168.2.40x748dNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                    Jan 9, 2025 19:14:01.234746933 CET1.1.1.1192.168.2.40x748dNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                    • reallyfreegeoip.org
                                                    • checkip.dyndns.org
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.449730193.122.130.0802484C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 9, 2025 19:14:00.429289103 CET151OUTGET / HTTP/1.1
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                    Host: checkip.dyndns.org
                                                    Connection: Keep-Alive
                                                    Jan 9, 2025 19:14:00.893805027 CET321INHTTP/1.1 200 OK
                                                    Date: Thu, 09 Jan 2025 18:14:00 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 104
                                                    Connection: keep-alive
                                                    Cache-Control: no-cache
                                                    Pragma: no-cache
                                                    X-Request-ID: 12b7caddab91dfc42702de7310146115
                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                    Jan 9, 2025 19:14:00.898442030 CET127OUTGET / HTTP/1.1
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                    Host: checkip.dyndns.org
                                                    Jan 9, 2025 19:14:01.000241041 CET321INHTTP/1.1 200 OK
                                                    Date: Thu, 09 Jan 2025 18:14:00 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 104
                                                    Connection: keep-alive
                                                    Cache-Control: no-cache
                                                    Pragma: no-cache
                                                    X-Request-ID: e6ceb906b4b4744c5be3667e21ea630e
                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                    Jan 9, 2025 19:14:01.232527971 CET321INHTTP/1.1 200 OK
                                                    Date: Thu, 09 Jan 2025 18:14:00 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 104
                                                    Connection: keep-alive
                                                    Cache-Control: no-cache
                                                    Pragma: no-cache
                                                    X-Request-ID: e6ceb906b4b4744c5be3667e21ea630e
                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.449731104.21.64.14432484C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    TimestampBytes transferredDirectionData
                                                    2025-01-09 18:14:02 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                    Host: reallyfreegeoip.org
                                                    Connection: Keep-Alive
                                                    2025-01-09 18:14:02 UTC863INHTTP/1.1 200 OK
                                                    Date: Thu, 09 Jan 2025 18:14:02 GMT
                                                    Content-Type: text/xml
                                                    Content-Length: 362
                                                    Connection: close
                                                    Age: 1761231
                                                    Cache-Control: max-age=31536000
                                                    cf-cache-status: HIT
                                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ikC5EsO%2BlK7AAlvNI6A6vJ9Ft9VDVG4%2BJ%2BZBrM0DFuw%2FnQvqu2vCcdT12iJHZzFu4hz899NZILIztIfk4HWCPlcrWA6%2F94pobbvReZsgGhAb93kD4Con%2BB%2BFV8PNKG50B9q3oubm"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8ff6679718f17c6a-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1972&min_rtt=1970&rtt_var=742&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1470292&cwnd=218&unsent_bytes=0&cid=1799af35224cb5c1&ts=237&x=0"
                                                    2025-01-09 18:14:02 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:13:13:58
                                                    Start date:09/01/2025
                                                    Path:C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exe"
                                                    Imagebase:0xae0000
                                                    File size:1'004'032 bytes
                                                    MD5 hash:6279973EA55B8BFA39E542A508DE961F
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.1697274138.0000000000AC0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:13:13:59
                                                    Start date:09/01/2025
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\SOA NOV. Gateway Freight_MEDWA0577842.exe"
                                                    Imagebase:0xf60000
                                                    File size:45'984 bytes
                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.2938177205.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2939173588.00000000033B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:high
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:3.6%
                                                      Dynamic/Decrypted Code Coverage:0.4%
                                                      Signature Coverage:7.7%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:190
                                                      execution_graph 97855 b07e93 97856 b07e9f _fprintf 97855->97856 97892 b0a048 GetStartupInfoW 97856->97892 97858 b07ea4 97894 b08dbc GetProcessHeap 97858->97894 97860 b07efc 97861 b07f07 97860->97861 97977 b07fe3 58 API calls 3 library calls 97860->97977 97895 b09d26 97861->97895 97864 b07f0d 97865 b07f18 __RTC_Initialize 97864->97865 97978 b07fe3 58 API calls 3 library calls 97864->97978 97916 b0d812 97865->97916 97868 b07f27 97869 b07f33 GetCommandLineW 97868->97869 97979 b07fe3 58 API calls 3 library calls 97868->97979 97935 b15173 GetEnvironmentStringsW 97869->97935 97872 b07f32 97872->97869 97875 b07f4d 97876 b07f58 97875->97876 97980 b032f5 58 API calls 3 library calls 97875->97980 97945 b14fa8 97876->97945 97879 b07f5e 97880 b07f69 97879->97880 97981 b032f5 58 API calls 3 library calls 97879->97981 97959 b0332f 97880->97959 97883 b07f71 97884 b07f7c __wwincmdln 97883->97884 97982 b032f5 58 API calls 3 library calls 97883->97982 97965 ae492e 97884->97965 97887 b07f90 97888 b07f9f 97887->97888 97983 b03598 58 API calls _doexit 97887->97983 97984 b03320 58 API calls _doexit 97888->97984 97891 b07fa4 _fprintf 97893 b0a05e 97892->97893 97893->97858 97894->97860 97985 b033c7 36 API calls 2 library calls 97895->97985 97897 b09d2b 97986 b09f7c InitializeCriticalSectionAndSpinCount __alloc_osfhnd 97897->97986 97899 b09d30 97900 b09d34 97899->97900 97988 b09fca TlsAlloc 97899->97988 97987 b09d9c 61 API calls 2 library calls 97900->97987 97903 b09d39 97903->97864 97904 b09d46 97904->97900 97905 b09d51 97904->97905 97989 b08a15 97905->97989 97908 b09d93 97997 b09d9c 61 API calls 2 library calls 97908->97997 97911 b09d98 97911->97864 97912 b09d72 97912->97908 97913 b09d78 97912->97913 97996 b09c73 58 API calls 4 library calls 97913->97996 97915 b09d80 GetCurrentThreadId 97915->97864 97917 b0d81e _fprintf 97916->97917 98009 b09e4b 97917->98009 97919 b0d825 97920 b08a15 __calloc_crt 58 API calls 97919->97920 97922 b0d836 97920->97922 97921 b0d841 @_EH4_CallFilterFunc@8 _fprintf 97921->97868 97922->97921 97923 b0d8a1 GetStartupInfoW 97922->97923 97928 b0d8b6 97923->97928 97930 b0d9e5 97923->97930 97924 b0daad 98018 b0dabd LeaveCriticalSection _doexit 97924->98018 97926 b08a15 __calloc_crt 58 API calls 97926->97928 97927 b0da32 GetStdHandle 97927->97930 97928->97926 97928->97930 97931 b0d904 97928->97931 97929 b0da45 GetFileType 97929->97930 97930->97924 97930->97927 97930->97929 98017 b0a06b InitializeCriticalSectionAndSpinCount 97930->98017 97931->97930 97932 b0d938 GetFileType 97931->97932 98016 b0a06b InitializeCriticalSectionAndSpinCount 97931->98016 97932->97931 97936 b15184 97935->97936 97937 b07f43 97935->97937 98058 b08a5d 58 API calls 2 library calls 97936->98058 97941 b14d6b GetModuleFileNameW 97937->97941 97939 b151aa _memmove 97940 b151c0 FreeEnvironmentStringsW 97939->97940 97940->97937 97942 b14d9f _wparse_cmdline 97941->97942 97944 b14ddf _wparse_cmdline 97942->97944 98059 b08a5d 58 API calls 2 library calls 97942->98059 97944->97875 97946 b14fc1 __NMSG_WRITE 97945->97946 97950 b14fb9 97945->97950 97947 b08a15 __calloc_crt 58 API calls 97946->97947 97955 b14fea __NMSG_WRITE 97947->97955 97948 b15041 97949 b02f95 _free 58 API calls 97948->97949 97949->97950 97950->97879 97951 b08a15 __calloc_crt 58 API calls 97951->97955 97952 b15066 97954 b02f95 _free 58 API calls 97952->97954 97954->97950 97955->97948 97955->97950 97955->97951 97955->97952 97956 b1507d 97955->97956 98060 b14857 58 API calls __cftoe_l 97955->98060 98061 b09006 IsProcessorFeaturePresent 97956->98061 97958 b15089 97958->97879 97960 b0333b __IsNonwritableInCurrentImage 97959->97960 98084 b0a711 97960->98084 97962 b03359 __initterm_e 97964 b03378 __cinit __IsNonwritableInCurrentImage 97962->97964 98087 b02f80 97962->98087 97964->97883 97966 ae4948 97965->97966 97976 ae49e7 97965->97976 97967 ae4982 IsThemeActive 97966->97967 98122 b035ac 97967->98122 97971 ae49ae 98134 ae4a5b SystemParametersInfoW SystemParametersInfoW 97971->98134 97973 ae49ba 98135 ae3b4c 97973->98135 97975 ae49c2 SystemParametersInfoW 97975->97976 97976->97887 97977->97861 97978->97865 97979->97872 97983->97888 97984->97891 97985->97897 97986->97899 97987->97903 97988->97904 97990 b08a1c 97989->97990 97992 b08a57 97990->97992 97994 b08a3a 97990->97994 97998 b15446 97990->97998 97992->97908 97995 b0a026 TlsSetValue 97992->97995 97994->97990 97994->97992 98006 b0a372 Sleep 97994->98006 97995->97912 97996->97915 97997->97911 97999 b15451 97998->97999 98004 b1546c 97998->98004 98000 b1545d 97999->98000 97999->98004 98007 b08d68 58 API calls __getptd_noexit 98000->98007 98002 b1547c RtlAllocateHeap 98003 b15462 98002->98003 98002->98004 98003->97990 98004->98002 98004->98003 98008 b035e1 DecodePointer 98004->98008 98006->97994 98007->98003 98008->98004 98010 b09e5c 98009->98010 98011 b09e6f EnterCriticalSection 98009->98011 98019 b09ed3 98010->98019 98011->97919 98013 b09e62 98013->98011 98043 b032f5 58 API calls 3 library calls 98013->98043 98016->97931 98017->97930 98018->97921 98020 b09edf _fprintf 98019->98020 98021 b09f00 98020->98021 98022 b09ee8 98020->98022 98030 b09f21 _fprintf 98021->98030 98047 b08a5d 58 API calls 2 library calls 98021->98047 98044 b0a3ab 58 API calls __NMSG_WRITE 98022->98044 98024 b09eed 98045 b0a408 58 API calls 6 library calls 98024->98045 98027 b09f15 98028 b09f2b 98027->98028 98029 b09f1c 98027->98029 98033 b09e4b __lock 58 API calls 98028->98033 98048 b08d68 58 API calls __getptd_noexit 98029->98048 98030->98013 98031 b09ef4 98046 b032df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98031->98046 98035 b09f32 98033->98035 98037 b09f57 98035->98037 98038 b09f3f 98035->98038 98050 b02f95 98037->98050 98049 b0a06b InitializeCriticalSectionAndSpinCount 98038->98049 98041 b09f4b 98056 b09f73 LeaveCriticalSection _doexit 98041->98056 98044->98024 98045->98031 98047->98027 98048->98030 98049->98041 98051 b02fc7 _free 98050->98051 98052 b02f9e RtlFreeHeap 98050->98052 98051->98041 98052->98051 98053 b02fb3 98052->98053 98057 b08d68 58 API calls __getptd_noexit 98053->98057 98055 b02fb9 GetLastError 98055->98051 98056->98030 98057->98055 98058->97939 98059->97944 98060->97955 98062 b09011 98061->98062 98067 b08e99 98062->98067 98066 b0902c 98066->97958 98068 b08eb3 _memset __call_reportfault 98067->98068 98069 b08ed3 IsDebuggerPresent 98068->98069 98075 b0a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 98069->98075 98071 b08f97 __call_reportfault 98076 b0c836 98071->98076 98073 b08fba 98074 b0a380 GetCurrentProcess TerminateProcess 98073->98074 98074->98066 98075->98071 98077 b0c840 IsProcessorFeaturePresent 98076->98077 98078 b0c83e 98076->98078 98080 b15b5a 98077->98080 98078->98073 98083 b15b09 5 API calls 2 library calls 98080->98083 98082 b15c3d 98082->98073 98083->98082 98085 b0a714 EncodePointer 98084->98085 98085->98085 98086 b0a72e 98085->98086 98086->97962 98090 b02e84 98087->98090 98089 b02f8b 98089->97964 98091 b02e90 _fprintf 98090->98091 98098 b03457 98091->98098 98097 b02eb7 _fprintf 98097->98089 98099 b09e4b __lock 58 API calls 98098->98099 98100 b02e99 98099->98100 98101 b02ec8 DecodePointer DecodePointer 98100->98101 98102 b02ef5 98101->98102 98103 b02ea5 98101->98103 98102->98103 98115 b089e4 59 API calls __cftoe_l 98102->98115 98112 b02ec2 98103->98112 98105 b02f58 EncodePointer EncodePointer 98105->98103 98106 b02f2c 98106->98103 98111 b02f46 EncodePointer 98106->98111 98117 b08aa4 61 API calls 2 library calls 98106->98117 98107 b02f07 98107->98105 98107->98106 98116 b08aa4 61 API calls 2 library calls 98107->98116 98110 b02f40 98110->98103 98110->98111 98111->98105 98118 b03460 98112->98118 98115->98107 98116->98106 98117->98110 98121 b09fb5 LeaveCriticalSection 98118->98121 98120 b02ec7 98120->98097 98121->98120 98123 b09e4b __lock 58 API calls 98122->98123 98124 b035b7 DecodePointer EncodePointer 98123->98124 98187 b09fb5 LeaveCriticalSection 98124->98187 98126 ae49a7 98127 b03614 98126->98127 98128 b03638 98127->98128 98129 b0361e 98127->98129 98128->97971 98129->98128 98188 b08d68 58 API calls __getptd_noexit 98129->98188 98131 b03628 98189 b08ff6 9 API calls __cftoe_l 98131->98189 98133 b03633 98133->97971 98134->97973 98136 ae3b59 __ftell_nolock 98135->98136 98190 ae77c7 98136->98190 98140 ae3b8c IsDebuggerPresent 98141 ae3b9a 98140->98141 98142 b1d4ad MessageBoxA 98140->98142 98144 b1d4c7 98141->98144 98145 ae3bb7 98141->98145 98173 ae3c73 98141->98173 98142->98144 98143 ae3c7a SetCurrentDirectoryW 98146 ae3c87 Mailbox 98143->98146 98414 ae7373 59 API calls Mailbox 98144->98414 98276 ae73e5 98145->98276 98146->97975 98149 b1d4d7 98154 b1d4ed SetCurrentDirectoryW 98149->98154 98151 ae3bd5 GetFullPathNameW 98292 ae7d2c 98151->98292 98153 ae3c10 98301 af0a8d 98153->98301 98154->98146 98157 ae3c2e 98158 ae3c38 98157->98158 98415 b44c03 AllocateAndInitializeSid CheckTokenMembership FreeSid 98157->98415 98317 ae3a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 98158->98317 98161 b1d50a 98161->98158 98164 b1d51b 98161->98164 98416 ae4864 98164->98416 98165 ae3c42 98167 ae3c55 98165->98167 98325 ae43db 98165->98325 98336 af0b30 98167->98336 98168 b1d523 98423 ae7f41 98168->98423 98172 ae3c60 98172->98173 98413 ae44cb Shell_NotifyIconW _memset 98172->98413 98173->98143 98174 b1d530 98176 b1d53a 98174->98176 98177 b1d55f 98174->98177 98427 ae7e0b 98176->98427 98178 ae7e0b 59 API calls 98177->98178 98186 b1d55b GetForegroundWindow ShellExecuteW 98178->98186 98184 b1d58f Mailbox 98184->98173 98186->98184 98187->98126 98188->98131 98189->98133 98443 b00ff6 98190->98443 98192 ae77e8 98193 b00ff6 Mailbox 59 API calls 98192->98193 98194 ae3b63 GetCurrentDirectoryW 98193->98194 98195 ae3778 98194->98195 98196 ae77c7 59 API calls 98195->98196 98197 ae378e 98196->98197 98481 ae3d43 98197->98481 98199 ae37ac 98200 ae4864 61 API calls 98199->98200 98201 ae37c0 98200->98201 98202 ae7f41 59 API calls 98201->98202 98203 ae37cd 98202->98203 98495 ae4f3d 98203->98495 98206 ae37ee Mailbox 98519 ae81a7 98206->98519 98207 b1d3ae 98566 b497e5 98207->98566 98210 b1d3cd 98213 b02f95 _free 58 API calls 98210->98213 98215 b1d3da 98213->98215 98217 ae4faa 84 API calls 98215->98217 98221 b1d3e3 98217->98221 98219 ae7f41 59 API calls 98220 ae381a 98219->98220 98526 ae8620 98220->98526 98223 ae3ee2 59 API calls 98221->98223 98225 b1d3fe 98223->98225 98224 ae382c Mailbox 98226 ae7f41 59 API calls 98224->98226 98227 ae3ee2 59 API calls 98225->98227 98228 ae3852 98226->98228 98229 b1d41a 98227->98229 98230 ae8620 69 API calls 98228->98230 98231 ae4864 61 API calls 98229->98231 98233 ae3861 Mailbox 98230->98233 98232 b1d43f 98231->98232 98234 ae3ee2 59 API calls 98232->98234 98236 ae77c7 59 API calls 98233->98236 98235 b1d44b 98234->98235 98237 ae81a7 59 API calls 98235->98237 98238 ae387f 98236->98238 98239 b1d459 98237->98239 98530 ae3ee2 98238->98530 98242 ae3ee2 59 API calls 98239->98242 98243 b1d468 98242->98243 98249 ae81a7 59 API calls 98243->98249 98245 ae3899 98245->98221 98246 ae38a3 98245->98246 98247 b0313d _W_store_winword 60 API calls 98246->98247 98248 ae38ae 98247->98248 98248->98225 98250 ae38b8 98248->98250 98251 b1d48a 98249->98251 98252 b0313d _W_store_winword 60 API calls 98250->98252 98253 ae3ee2 59 API calls 98251->98253 98254 ae38c3 98252->98254 98255 b1d497 98253->98255 98254->98229 98256 ae38cd 98254->98256 98255->98255 98257 b0313d _W_store_winword 60 API calls 98256->98257 98258 ae38d8 98257->98258 98258->98243 98259 ae3919 98258->98259 98261 ae3ee2 59 API calls 98258->98261 98259->98243 98260 ae3926 98259->98260 98546 ae942e 98260->98546 98263 ae38fc 98261->98263 98264 ae81a7 59 API calls 98263->98264 98266 ae390a 98264->98266 98268 ae3ee2 59 API calls 98266->98268 98268->98259 98271 ae93ea 59 API calls 98273 ae3961 98271->98273 98272 ae9040 60 API calls 98272->98273 98273->98271 98273->98272 98274 ae3ee2 59 API calls 98273->98274 98275 ae39a7 Mailbox 98273->98275 98274->98273 98275->98140 98277 ae73f2 __ftell_nolock 98276->98277 98278 ae740b 98277->98278 98279 b1ee4b _memset 98277->98279 99450 ae48ae 98278->99450 98281 b1ee67 GetOpenFileNameW 98279->98281 98283 b1eeb6 98281->98283 98285 ae7d2c 59 API calls 98283->98285 98287 b1eecb 98285->98287 98287->98287 98289 ae7429 99478 ae69ca 98289->99478 98293 ae7d38 __NMSG_WRITE 98292->98293 98294 ae7da5 98292->98294 98296 ae7d4e 98293->98296 98297 ae7d73 98293->98297 98295 ae7e8c 59 API calls 98294->98295 98300 ae7d56 _memmove 98295->98300 99747 ae8087 59 API calls Mailbox 98296->99747 98298 ae8189 59 API calls 98297->98298 98298->98300 98300->98153 98302 af0a9a __ftell_nolock 98301->98302 99748 ae6ee0 98302->99748 98304 af0a9f 98316 ae3c26 98304->98316 99759 af12fe 89 API calls 98304->99759 98306 af0aac 98306->98316 99760 af4047 91 API calls Mailbox 98306->99760 98308 af0ab5 98309 af0ab9 GetFullPathNameW 98308->98309 98308->98316 98310 ae7d2c 59 API calls 98309->98310 98311 af0ae5 98310->98311 98312 ae7d2c 59 API calls 98311->98312 98313 af0af2 98312->98313 98314 ae7d2c 59 API calls 98313->98314 98315 b250d5 _wcscat 98313->98315 98314->98316 98316->98149 98316->98157 98318 ae3ac2 LoadImageW RegisterClassExW 98317->98318 98319 b1d49c 98317->98319 99798 ae3041 7 API calls 98318->99798 99799 ae48fe LoadImageW EnumResourceNamesW 98319->99799 98322 b1d4a5 98323 ae3b46 98324 ae39e7 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98323->98324 98324->98165 98326 ae4406 _memset 98325->98326 99800 ae4213 98326->99800 98329 ae448b 98331 ae44a5 Shell_NotifyIconW 98329->98331 98332 ae44c1 Shell_NotifyIconW 98329->98332 98333 ae44b3 98331->98333 98332->98333 99804 ae410d 98333->99804 98335 ae44ba 98335->98167 98337 b250ed 98336->98337 98349 af0b55 98336->98349 99883 b4a0b5 89 API calls 4 library calls 98337->99883 98339 af0e44 98340 af0e5a 98339->98340 99880 af11d0 10 API calls Mailbox 98339->99880 98340->98172 98342 af1044 98342->98340 98344 af1051 98342->98344 99881 af11f3 331 API calls Mailbox 98344->99881 98345 af0bab PeekMessageW 98365 af0b65 Mailbox 98345->98365 98347 af1058 LockWindowUpdate DestroyWindow GetMessageW 98347->98340 98351 af108a 98347->98351 98349->98365 99884 ae9fbd 60 API calls 98349->99884 99885 b368bf 331 API calls 98349->99885 98350 b252ab Sleep 98350->98365 98353 b26082 TranslateMessage DispatchMessageW GetMessageW 98351->98353 98353->98353 98354 b260b2 98353->98354 98354->98340 98355 af0fbf TranslateMessage DispatchMessageW 98356 af0fa3 PeekMessageW 98355->98356 98356->98365 98357 b2517a TranslateAcceleratorW 98357->98356 98357->98365 98358 ae9fbd 60 API calls 98358->98365 98359 af0e73 timeGetTime 98359->98365 98360 b25c49 WaitForSingleObject 98363 b25c66 GetExitCodeProcess CloseHandle 98360->98363 98360->98365 98362 b00ff6 59 API calls Mailbox 98362->98365 98376 af10f5 98363->98376 98364 af0fdd Sleep 98370 af0fee Mailbox 98364->98370 98365->98339 98365->98345 98365->98350 98365->98355 98365->98356 98365->98357 98365->98358 98365->98359 98365->98360 98365->98362 98365->98364 98366 ae81a7 59 API calls 98365->98366 98368 b25f22 Sleep 98365->98368 98365->98370 98373 af10ae timeGetTime 98365->98373 98365->98376 98399 b4a0b5 89 API calls 98365->98399 98400 ae8b13 69 API calls 98365->98400 98401 ae9df0 59 API calls Mailbox 98365->98401 98402 aea000 304 API calls 98365->98402 98404 ae8620 69 API calls 98365->98404 98405 b366f4 59 API calls Mailbox 98365->98405 98406 ae7f41 59 API calls 98365->98406 98407 b259ff VariantClear 98365->98407 98408 b25a95 VariantClear 98365->98408 98409 ae8e34 59 API calls Mailbox 98365->98409 98410 b25843 VariantClear 98365->98410 98411 b37405 59 API calls 98365->98411 98412 aeb89c 304 API calls 98365->98412 99827 aee800 98365->99827 99858 aef5c0 98365->99858 99877 aee580 331 API calls 98365->99877 99878 aefe40 331 API calls 2 library calls 98365->99878 99879 ae31ce IsDialogMessageW GetClassLongW 98365->99879 99886 b6629f 59 API calls 98365->99886 99887 b49c9f 59 API calls Mailbox 98365->99887 99888 b3d9e3 59 API calls 98365->99888 99889 ae9997 98365->99889 99907 b36665 59 API calls 2 library calls 98365->99907 99908 ae8561 59 API calls 98365->99908 99909 ae843f 59 API calls Mailbox 98365->99909 98366->98365 98367 ae77c7 59 API calls 98367->98370 98368->98370 98370->98365 98370->98367 98371 b00719 timeGetTime 98370->98371 98370->98376 98377 b25fb9 GetExitCodeProcess 98370->98377 98379 b661ac 110 API calls 98370->98379 98380 aeb93d 109 API calls 98370->98380 98385 b25c9e 98370->98385 98386 b254a2 Sleep 98370->98386 98387 b26041 Sleep 98370->98387 98389 ae7f41 59 API calls 98370->98389 99910 b428f7 60 API calls 98370->99910 99911 ae9fbd 60 API calls 98370->99911 99912 ae8b13 69 API calls Mailbox 98370->99912 99913 aeb89c 331 API calls 98370->99913 99914 b36a50 60 API calls 98370->99914 99915 b454e6 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98370->99915 99916 b43e91 66 API calls Mailbox 98370->99916 98371->98370 99882 ae9fbd 60 API calls 98373->99882 98376->98172 98381 b25fe5 CloseHandle 98377->98381 98382 b25fcf WaitForSingleObject 98377->98382 98379->98370 98380->98370 98381->98370 98382->98365 98382->98381 98385->98376 98386->98365 98387->98365 98389->98370 98399->98365 98400->98365 98401->98365 98402->98365 98404->98365 98405->98365 98406->98365 98407->98365 98408->98365 98409->98365 98410->98365 98411->98365 98412->98365 98413->98173 98414->98149 98415->98161 98417 b11b90 __ftell_nolock 98416->98417 98418 ae4871 GetModuleFileNameW 98417->98418 98419 ae7f41 59 API calls 98418->98419 98420 ae4897 98419->98420 98421 ae48ae 60 API calls 98420->98421 98422 ae48a1 Mailbox 98421->98422 98422->98168 98424 ae7f50 __NMSG_WRITE _memmove 98423->98424 98425 b00ff6 Mailbox 59 API calls 98424->98425 98426 ae7f8e 98425->98426 98426->98174 98428 ae7e1f 98427->98428 98429 b1f173 98427->98429 100178 ae7db0 98428->100178 98431 ae8189 59 API calls 98429->98431 98433 b1f17e __NMSG_WRITE _memmove 98431->98433 98446 b00ffe 98443->98446 98445 b01018 98445->98192 98446->98445 98448 b0101c std::exception::exception 98446->98448 98453 b0594c 98446->98453 98470 b035e1 DecodePointer 98446->98470 98471 b087db RaiseException 98448->98471 98450 b01046 98472 b08711 58 API calls _free 98450->98472 98452 b01058 98452->98192 98454 b059c7 98453->98454 98463 b05958 98453->98463 98479 b035e1 DecodePointer 98454->98479 98456 b059cd 98480 b08d68 58 API calls __getptd_noexit 98456->98480 98459 b0598b RtlAllocateHeap 98460 b059bf 98459->98460 98459->98463 98460->98446 98462 b059b3 98477 b08d68 58 API calls __getptd_noexit 98462->98477 98463->98459 98463->98462 98464 b05963 98463->98464 98468 b059b1 98463->98468 98476 b035e1 DecodePointer 98463->98476 98464->98463 98473 b0a3ab 58 API calls __NMSG_WRITE 98464->98473 98474 b0a408 58 API calls 6 library calls 98464->98474 98475 b032df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98464->98475 98478 b08d68 58 API calls __getptd_noexit 98468->98478 98470->98446 98471->98450 98472->98452 98473->98464 98474->98464 98476->98463 98477->98468 98478->98460 98479->98456 98480->98460 98482 ae3d50 __ftell_nolock 98481->98482 98483 ae7d2c 59 API calls 98482->98483 98489 ae3eb6 Mailbox 98482->98489 98485 ae3d82 98483->98485 98494 ae3db8 Mailbox 98485->98494 98607 ae7b52 98485->98607 98486 ae7b52 59 API calls 98486->98494 98487 ae3e89 98488 ae7f41 59 API calls 98487->98488 98487->98489 98491 ae3eaa 98488->98491 98489->98199 98490 ae7f41 59 API calls 98490->98494 98492 ae3f84 59 API calls 98491->98492 98492->98489 98494->98486 98494->98487 98494->98489 98494->98490 98610 ae3f84 98494->98610 98620 ae4d13 98495->98620 98500 ae4f68 LoadLibraryExW 98630 ae4cc8 98500->98630 98501 b1dd0f 98502 ae4faa 84 API calls 98501->98502 98504 b1dd16 98502->98504 98506 ae4cc8 3 API calls 98504->98506 98508 b1dd1e 98506->98508 98656 ae506b 98508->98656 98509 ae4f8f 98509->98508 98510 ae4f9b 98509->98510 98512 ae4faa 84 API calls 98510->98512 98514 ae37e6 98512->98514 98514->98206 98514->98207 98516 b1dd45 98664 ae5027 98516->98664 98518 b1dd52 98520 ae3801 98519->98520 98521 ae81b2 98519->98521 98523 ae93ea 98520->98523 99094 ae80d7 59 API calls 2 library calls 98521->99094 98524 b00ff6 Mailbox 59 API calls 98523->98524 98525 ae380d 98524->98525 98525->98219 98527 ae862b 98526->98527 98529 ae8652 98527->98529 99095 ae8b13 69 API calls Mailbox 98527->99095 98529->98224 98531 ae3eec 98530->98531 98532 ae3f05 98530->98532 98533 ae81a7 59 API calls 98531->98533 98534 ae7d2c 59 API calls 98532->98534 98535 ae388b 98533->98535 98534->98535 98536 b0313d 98535->98536 98537 b03149 98536->98537 98538 b031be 98536->98538 98545 b0316e 98537->98545 99096 b08d68 58 API calls __getptd_noexit 98537->99096 99098 b031d0 60 API calls 3 library calls 98538->99098 98540 b031cb 98540->98245 98542 b03155 99097 b08ff6 9 API calls __cftoe_l 98542->99097 98544 b03160 98544->98245 98545->98245 98547 ae9436 98546->98547 98548 b00ff6 Mailbox 59 API calls 98547->98548 98549 ae9444 98548->98549 98550 ae3936 98549->98550 99099 ae935c 59 API calls Mailbox 98549->99099 98552 ae91b0 98550->98552 99100 ae92c0 98552->99100 98554 ae91bf 98555 b00ff6 Mailbox 59 API calls 98554->98555 98556 ae3944 98554->98556 98555->98556 98557 ae9040 98556->98557 98558 b1f5a5 98557->98558 98560 ae9057 98557->98560 98558->98560 99110 ae8d3b 59 API calls Mailbox 98558->99110 98561 ae915f 98560->98561 98562 ae9158 98560->98562 98563 ae91a0 98560->98563 98561->98273 98565 b00ff6 Mailbox 59 API calls 98562->98565 99109 ae9e9c 60 API calls Mailbox 98563->99109 98565->98561 98567 ae5045 85 API calls 98566->98567 98568 b49854 98567->98568 99111 b499be 98568->99111 98571 ae506b 74 API calls 98572 b49881 98571->98572 98573 ae506b 74 API calls 98572->98573 98574 b49891 98573->98574 98575 ae506b 74 API calls 98574->98575 98576 b498ac 98575->98576 98577 ae506b 74 API calls 98576->98577 98578 b498c7 98577->98578 98579 ae5045 85 API calls 98578->98579 98580 b498de 98579->98580 98581 b0594c __crtGetStringTypeA_stat 58 API calls 98580->98581 98582 b498e5 98581->98582 98583 b0594c __crtGetStringTypeA_stat 58 API calls 98582->98583 98584 b498ef 98583->98584 98585 ae506b 74 API calls 98584->98585 98586 b49903 98585->98586 98587 b49393 GetSystemTimeAsFileTime 98586->98587 98588 b49916 98587->98588 98589 b49940 98588->98589 98590 b4992b 98588->98590 98592 b499a5 98589->98592 98593 b49946 98589->98593 98591 b02f95 _free 58 API calls 98590->98591 98594 b49931 98591->98594 98596 b02f95 _free 58 API calls 98592->98596 99117 b48d90 98593->99117 98597 b02f95 _free 58 API calls 98594->98597 98599 b1d3c1 98596->98599 98597->98599 98599->98210 98601 ae4faa 98599->98601 98600 b02f95 _free 58 API calls 98600->98599 98602 ae4fb4 98601->98602 98603 ae4fbb 98601->98603 98604 b055d6 __fcloseall 83 API calls 98602->98604 98605 ae4fca 98603->98605 98606 ae4fdb FreeLibrary 98603->98606 98604->98603 98605->98210 98606->98605 98616 ae7faf 98607->98616 98609 ae7b5d 98609->98485 98611 ae3f92 98610->98611 98612 ae3fb4 _memmove 98610->98612 98614 b00ff6 Mailbox 59 API calls 98611->98614 98613 b00ff6 Mailbox 59 API calls 98612->98613 98615 ae3fc8 98613->98615 98614->98612 98615->98494 98617 ae7fc2 98616->98617 98619 ae7fbf _memmove 98616->98619 98618 b00ff6 Mailbox 59 API calls 98617->98618 98618->98619 98619->98609 98669 ae4d61 98620->98669 98623 ae4d61 2 API calls 98626 ae4d3a 98623->98626 98624 ae4d4a FreeLibrary 98625 ae4d53 98624->98625 98627 b0548b 98625->98627 98626->98624 98626->98625 98673 b054a0 98627->98673 98629 ae4f5c 98629->98500 98629->98501 98831 ae4d94 98630->98831 98633 ae4ced 98635 ae4cff FreeLibrary 98633->98635 98636 ae4d08 98633->98636 98634 ae4d94 2 API calls 98634->98633 98635->98636 98637 ae4dd0 98636->98637 98638 b00ff6 Mailbox 59 API calls 98637->98638 98639 ae4de5 98638->98639 98835 ae538e 98639->98835 98641 ae4df1 _memmove 98642 ae4e2c 98641->98642 98643 ae4ee9 98641->98643 98644 ae4f21 98641->98644 98645 ae5027 69 API calls 98642->98645 98838 ae4fe9 CreateStreamOnHGlobal 98643->98838 98849 b49ba5 95 API calls 98644->98849 98649 ae4e35 98645->98649 98648 ae506b 74 API calls 98648->98649 98649->98648 98650 ae4ec9 98649->98650 98652 b1dcd0 98649->98652 98844 ae5045 98649->98844 98650->98509 98653 ae5045 85 API calls 98652->98653 98654 b1dce4 98653->98654 98655 ae506b 74 API calls 98654->98655 98655->98650 98657 ae507d 98656->98657 98660 b1ddf6 98656->98660 98873 b05812 98657->98873 98661 b49393 99071 b491e9 98661->99071 98663 b493a9 98663->98516 98665 b1ddb9 98664->98665 98666 ae5036 98664->98666 99076 b05e90 98666->99076 98668 ae503e 98668->98518 98670 ae4d2e 98669->98670 98671 ae4d6a LoadLibraryA 98669->98671 98670->98623 98670->98626 98671->98670 98672 ae4d7b GetProcAddress 98671->98672 98672->98670 98676 b054ac _fprintf 98673->98676 98674 b054bf 98722 b08d68 58 API calls __getptd_noexit 98674->98722 98676->98674 98678 b054f0 98676->98678 98677 b054c4 98723 b08ff6 9 API calls __cftoe_l 98677->98723 98692 b10738 98678->98692 98681 b054f5 98682 b0550b 98681->98682 98683 b054fe 98681->98683 98685 b05535 98682->98685 98686 b05515 98682->98686 98724 b08d68 58 API calls __getptd_noexit 98683->98724 98707 b10857 98685->98707 98725 b08d68 58 API calls __getptd_noexit 98686->98725 98689 b054cf @_EH4_CallFilterFunc@8 _fprintf 98689->98629 98693 b10744 _fprintf 98692->98693 98694 b09e4b __lock 58 API calls 98693->98694 98701 b10752 98694->98701 98695 b107c6 98727 b1084e 98695->98727 98696 b107cd 98732 b08a5d 58 API calls 2 library calls 98696->98732 98699 b107d4 98699->98695 98733 b0a06b InitializeCriticalSectionAndSpinCount 98699->98733 98700 b10843 _fprintf 98700->98681 98701->98695 98701->98696 98703 b09ed3 __mtinitlocknum 58 API calls 98701->98703 98730 b06e8d 59 API calls __lock 98701->98730 98731 b06ef7 LeaveCriticalSection LeaveCriticalSection _doexit 98701->98731 98703->98701 98705 b107fa EnterCriticalSection 98705->98695 98715 b10877 __wopenfile 98707->98715 98708 b10891 98738 b08d68 58 API calls __getptd_noexit 98708->98738 98710 b10896 98739 b08ff6 9 API calls __cftoe_l 98710->98739 98712 b10aaf 98735 b187f1 98712->98735 98713 b05540 98726 b05562 LeaveCriticalSection LeaveCriticalSection _fseek 98713->98726 98715->98708 98721 b10a4c 98715->98721 98740 b03a0b 60 API calls 2 library calls 98715->98740 98717 b10a45 98717->98721 98741 b03a0b 60 API calls 2 library calls 98717->98741 98719 b10a64 98719->98721 98742 b03a0b 60 API calls 2 library calls 98719->98742 98721->98708 98721->98712 98722->98677 98723->98689 98724->98689 98725->98689 98726->98689 98734 b09fb5 LeaveCriticalSection 98727->98734 98729 b10855 98729->98700 98730->98701 98731->98701 98732->98699 98733->98705 98734->98729 98743 b17fd5 98735->98743 98737 b1880a 98737->98713 98738->98710 98739->98713 98740->98717 98741->98719 98742->98721 98744 b17fe1 _fprintf 98743->98744 98745 b17ff7 98744->98745 98748 b1802d 98744->98748 98828 b08d68 58 API calls __getptd_noexit 98745->98828 98747 b17ffc 98829 b08ff6 9 API calls __cftoe_l 98747->98829 98754 b1809e 98748->98754 98751 b18049 98830 b18072 LeaveCriticalSection __unlock_fhandle 98751->98830 98753 b18006 _fprintf 98753->98737 98755 b180be 98754->98755 98756 b0471a __wsopen_nolock 58 API calls 98755->98756 98759 b180da 98756->98759 98757 b09006 __invoke_watson 8 API calls 98758 b187f0 98757->98758 98761 b17fd5 __wsopen_helper 103 API calls 98758->98761 98760 b18114 98759->98760 98771 b18137 98759->98771 98827 b18211 98759->98827 98762 b08d34 __write_nolock 58 API calls 98760->98762 98763 b1880a 98761->98763 98764 b18119 98762->98764 98763->98751 98765 b08d68 __cftoe_l 58 API calls 98764->98765 98766 b18126 98765->98766 98768 b08ff6 __cftoe_l 9 API calls 98766->98768 98767 b181f5 98769 b08d34 __write_nolock 58 API calls 98767->98769 98770 b18130 98768->98770 98772 b181fa 98769->98772 98770->98751 98771->98767 98776 b181d3 98771->98776 98773 b08d68 __cftoe_l 58 API calls 98772->98773 98774 b18207 98773->98774 98775 b08ff6 __cftoe_l 9 API calls 98774->98775 98775->98827 98777 b0d4d4 __alloc_osfhnd 61 API calls 98776->98777 98778 b182a1 98777->98778 98779 b182ab 98778->98779 98780 b182ce 98778->98780 98781 b08d34 __write_nolock 58 API calls 98779->98781 98782 b17f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98780->98782 98783 b182b0 98781->98783 98790 b182f0 98782->98790 98785 b08d68 __cftoe_l 58 API calls 98783->98785 98784 b1836e GetFileType 98788 b18379 GetLastError 98784->98788 98789 b183bb 98784->98789 98787 b182ba 98785->98787 98786 b1833c GetLastError 98791 b08d47 __dosmaperr 58 API calls 98786->98791 98792 b08d68 __cftoe_l 58 API calls 98787->98792 98793 b08d47 __dosmaperr 58 API calls 98788->98793 98798 b0d76a __set_osfhnd 59 API calls 98789->98798 98790->98784 98790->98786 98794 b17f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98790->98794 98795 b18361 98791->98795 98792->98770 98796 b183a0 CloseHandle 98793->98796 98797 b18331 98794->98797 98802 b08d68 __cftoe_l 58 API calls 98795->98802 98796->98795 98799 b183ae 98796->98799 98797->98784 98797->98786 98801 b183d9 98798->98801 98800 b08d68 __cftoe_l 58 API calls 98799->98800 98803 b183b3 98800->98803 98804 b18594 98801->98804 98805 b11b11 __lseeki64_nolock 60 API calls 98801->98805 98824 b1845a 98801->98824 98802->98827 98803->98795 98806 b18767 CloseHandle 98804->98806 98804->98827 98807 b18443 98805->98807 98808 b17f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98806->98808 98810 b08d34 __write_nolock 58 API calls 98807->98810 98807->98824 98809 b1878e 98808->98809 98811 b18796 GetLastError 98809->98811 98812 b187c2 98809->98812 98810->98824 98813 b08d47 __dosmaperr 58 API calls 98811->98813 98812->98827 98814 b187a2 98813->98814 98818 b0d67d __free_osfhnd 59 API calls 98814->98818 98815 b10d2d __close_nolock 61 API calls 98815->98824 98816 b110ab 70 API calls __read_nolock 98816->98824 98817 b1848c 98819 b199f2 __chsize_nolock 82 API calls 98817->98819 98817->98824 98818->98812 98819->98817 98820 b0dac6 __write 78 API calls 98820->98824 98821 b18611 98822 b10d2d __close_nolock 61 API calls 98821->98822 98823 b18618 98822->98823 98825 b08d68 __cftoe_l 58 API calls 98823->98825 98824->98804 98824->98815 98824->98816 98824->98817 98824->98820 98824->98821 98826 b11b11 60 API calls __lseeki64_nolock 98824->98826 98825->98827 98826->98824 98827->98757 98828->98747 98829->98753 98830->98753 98832 ae4ce1 98831->98832 98833 ae4d9d LoadLibraryA 98831->98833 98832->98633 98832->98634 98833->98832 98834 ae4dae GetProcAddress 98833->98834 98834->98832 98836 b00ff6 Mailbox 59 API calls 98835->98836 98837 ae53a0 98836->98837 98837->98641 98839 ae5003 FindResourceExW 98838->98839 98840 ae5020 98838->98840 98839->98840 98841 b1dd5c LoadResource 98839->98841 98840->98642 98841->98840 98842 b1dd71 SizeofResource 98841->98842 98842->98840 98843 b1dd85 LockResource 98842->98843 98843->98840 98845 ae5054 98844->98845 98848 b1ddd4 98844->98848 98850 b05a7d 98845->98850 98847 ae5062 98847->98649 98849->98642 98851 b05a89 _fprintf 98850->98851 98852 b05a9b 98851->98852 98854 b05ac1 98851->98854 98863 b08d68 58 API calls __getptd_noexit 98852->98863 98865 b06e4e 98854->98865 98855 b05aa0 98864 b08ff6 9 API calls __cftoe_l 98855->98864 98858 b05ac7 98871 b059ee 83 API calls 4 library calls 98858->98871 98860 b05ad6 98872 b05af8 LeaveCriticalSection LeaveCriticalSection _fseek 98860->98872 98862 b05aab _fprintf 98862->98847 98863->98855 98864->98862 98866 b06e80 EnterCriticalSection 98865->98866 98867 b06e5e 98865->98867 98869 b06e76 98866->98869 98867->98866 98868 b06e66 98867->98868 98870 b09e4b __lock 58 API calls 98868->98870 98869->98858 98870->98869 98871->98860 98872->98862 98876 b0582d 98873->98876 98875 ae508e 98875->98661 98877 b05839 _fprintf 98876->98877 98878 b0587c 98877->98878 98879 b05874 _fprintf 98877->98879 98884 b0584f _memset 98877->98884 98880 b06e4e __lock_file 59 API calls 98878->98880 98879->98875 98881 b05882 98880->98881 98889 b0564d 98881->98889 98903 b08d68 58 API calls __getptd_noexit 98884->98903 98885 b05869 98904 b08ff6 9 API calls __cftoe_l 98885->98904 98893 b05668 _memset 98889->98893 98896 b05683 98889->98896 98890 b05673 99001 b08d68 58 API calls __getptd_noexit 98890->99001 98892 b05678 99002 b08ff6 9 API calls __cftoe_l 98892->99002 98893->98890 98893->98896 98898 b056c3 98893->98898 98905 b058b6 LeaveCriticalSection LeaveCriticalSection _fseek 98896->98905 98897 b057d4 _memset 99004 b08d68 58 API calls __getptd_noexit 98897->99004 98898->98896 98898->98897 98906 b04916 98898->98906 98913 b110ab 98898->98913 98981 b10df7 98898->98981 99003 b10f18 58 API calls 3 library calls 98898->99003 98903->98885 98904->98879 98905->98879 98907 b04920 98906->98907 98908 b04935 98906->98908 99005 b08d68 58 API calls __getptd_noexit 98907->99005 98908->98898 98910 b04925 99006 b08ff6 9 API calls __cftoe_l 98910->99006 98912 b04930 98912->98898 98914 b110e3 98913->98914 98915 b110cc 98913->98915 98917 b1181b 98914->98917 98921 b1111d 98914->98921 99016 b08d34 58 API calls __getptd_noexit 98915->99016 99032 b08d34 58 API calls __getptd_noexit 98917->99032 98918 b110d1 99017 b08d68 58 API calls __getptd_noexit 98918->99017 98923 b11125 98921->98923 98931 b1113c 98921->98931 98922 b11820 99033 b08d68 58 API calls __getptd_noexit 98922->99033 99018 b08d34 58 API calls __getptd_noexit 98923->99018 98926 b11131 99034 b08ff6 9 API calls __cftoe_l 98926->99034 98927 b110d8 98927->98898 98928 b1112a 99019 b08d68 58 API calls __getptd_noexit 98928->99019 98930 b11151 99020 b08d34 58 API calls __getptd_noexit 98930->99020 98931->98927 98931->98930 98933 b1116b 98931->98933 98936 b11189 98931->98936 98933->98930 98935 b11176 98933->98935 99007 b15ebb 98935->99007 99021 b08a5d 58 API calls 2 library calls 98936->99021 98939 b11199 98941 b111a1 98939->98941 98942 b111bc 98939->98942 98940 b1128a 98944 b11303 ReadFile 98940->98944 98949 b112a0 GetConsoleMode 98940->98949 99022 b08d68 58 API calls __getptd_noexit 98941->99022 99024 b11b11 60 API calls 3 library calls 98942->99024 98947 b117e3 GetLastError 98944->98947 98948 b11325 98944->98948 98946 b111a6 99023 b08d34 58 API calls __getptd_noexit 98946->99023 98951 b117f0 98947->98951 98956 b112e3 98947->98956 98948->98947 98958 b112f5 98948->98958 98952 b11300 98949->98952 98953 b112b4 98949->98953 99030 b08d68 58 API calls __getptd_noexit 98951->99030 98952->98944 98953->98952 98955 b112ba ReadConsoleW 98953->98955 98955->98958 98959 b112dd GetLastError 98955->98959 98963 b112e9 98956->98963 99025 b08d47 58 API calls 3 library calls 98956->99025 98957 b117f5 99031 b08d34 58 API calls __getptd_noexit 98957->99031 98958->98963 98964 b115c7 98958->98964 98965 b1135a 98958->98965 98959->98956 98962 b02f95 _free 58 API calls 98962->98927 98963->98927 98963->98962 98964->98963 98968 b116cd ReadFile 98964->98968 98967 b113c6 ReadFile 98965->98967 98972 b11447 98965->98972 98969 b113e7 GetLastError 98967->98969 98979 b113f1 98967->98979 98974 b116f0 GetLastError 98968->98974 98980 b116fe 98968->98980 98969->98979 98970 b11504 98975 b114b4 MultiByteToWideChar 98970->98975 99028 b11b11 60 API calls 3 library calls 98970->99028 98971 b114f4 99027 b08d68 58 API calls __getptd_noexit 98971->99027 98972->98963 98972->98970 98972->98971 98972->98975 98974->98980 98975->98959 98975->98963 98979->98965 99026 b11b11 60 API calls 3 library calls 98979->99026 98980->98964 99029 b11b11 60 API calls 3 library calls 98980->99029 98982 b10e02 98981->98982 98986 b10e17 98981->98986 99068 b08d68 58 API calls __getptd_noexit 98982->99068 98984 b10e07 99069 b08ff6 9 API calls __cftoe_l 98984->99069 98988 b10e4c 98986->98988 98992 b10e12 98986->98992 99070 b16234 58 API calls __malloc_crt 98986->99070 98989 b04916 __flush 58 API calls 98988->98989 98990 b10e60 98989->98990 99035 b10f97 98990->99035 98992->98898 98993 b10e67 98993->98992 98994 b04916 __flush 58 API calls 98993->98994 98995 b10e8a 98994->98995 98995->98992 98996 b04916 __flush 58 API calls 98995->98996 98997 b10e96 98996->98997 98997->98992 98998 b04916 __flush 58 API calls 98997->98998 98999 b10ea3 98998->98999 99000 b04916 __flush 58 API calls 98999->99000 99000->98992 99001->98892 99002->98896 99003->98898 99004->98892 99005->98910 99006->98912 99008 b15ed3 99007->99008 99009 b15ec6 99007->99009 99011 b15edf 99008->99011 99012 b08d68 __cftoe_l 58 API calls 99008->99012 99010 b08d68 __cftoe_l 58 API calls 99009->99010 99013 b15ecb 99010->99013 99011->98940 99014 b15f00 99012->99014 99013->98940 99015 b08ff6 __cftoe_l 9 API calls 99014->99015 99015->99013 99016->98918 99017->98927 99018->98928 99019->98926 99020->98928 99021->98939 99022->98946 99023->98927 99024->98935 99025->98963 99026->98979 99027->98963 99028->98975 99029->98980 99030->98957 99031->98963 99032->98922 99033->98926 99034->98927 99036 b10fa3 _fprintf 99035->99036 99037 b10fb0 99036->99037 99038 b10fc7 99036->99038 99039 b08d34 __write_nolock 58 API calls 99037->99039 99040 b1108b 99038->99040 99043 b10fdb 99038->99043 99042 b10fb5 99039->99042 99041 b08d34 __write_nolock 58 API calls 99040->99041 99046 b10ffe 99041->99046 99047 b08d68 __cftoe_l 58 API calls 99042->99047 99044 b11006 99043->99044 99045 b10ff9 99043->99045 99049 b11013 99044->99049 99050 b11028 99044->99050 99048 b08d34 __write_nolock 58 API calls 99045->99048 99053 b08d68 __cftoe_l 58 API calls 99046->99053 99061 b10fbc _fprintf 99047->99061 99048->99046 99051 b08d34 __write_nolock 58 API calls 99049->99051 99052 b0d446 ___lock_fhandle 59 API calls 99050->99052 99054 b11018 99051->99054 99055 b1102e 99052->99055 99056 b11020 99053->99056 99057 b08d68 __cftoe_l 58 API calls 99054->99057 99058 b11041 99055->99058 99059 b11054 99055->99059 99063 b08ff6 __cftoe_l 9 API calls 99056->99063 99057->99056 99062 b110ab __read_nolock 70 API calls 99058->99062 99060 b08d68 __cftoe_l 58 API calls 99059->99060 99064 b11059 99060->99064 99061->98993 99065 b1104d 99062->99065 99063->99061 99066 b08d34 __write_nolock 58 API calls 99064->99066 99067 b11083 __read LeaveCriticalSection 99065->99067 99066->99065 99067->99061 99068->98984 99069->98992 99070->98988 99074 b0543a GetSystemTimeAsFileTime 99071->99074 99073 b491f8 99073->98663 99075 b05468 __aulldiv 99074->99075 99075->99073 99077 b05e9c _fprintf 99076->99077 99078 b05ec3 99077->99078 99079 b05eae 99077->99079 99081 b06e4e __lock_file 59 API calls 99078->99081 99090 b08d68 58 API calls __getptd_noexit 99079->99090 99083 b05ec9 99081->99083 99082 b05eb3 99091 b08ff6 9 API calls __cftoe_l 99082->99091 99092 b05b00 67 API calls 5 library calls 99083->99092 99086 b05ed4 99093 b05ef4 LeaveCriticalSection LeaveCriticalSection _fseek 99086->99093 99088 b05ee6 99089 b05ebe _fprintf 99088->99089 99089->98668 99090->99082 99091->99089 99092->99086 99093->99088 99094->98520 99095->98529 99096->98542 99097->98544 99098->98540 99099->98550 99101 ae92c9 Mailbox 99100->99101 99102 b1f5c8 99101->99102 99106 ae92d3 99101->99106 99103 b00ff6 Mailbox 59 API calls 99102->99103 99105 b1f5d4 99103->99105 99104 ae92da 99104->98554 99106->99104 99108 ae9df0 59 API calls Mailbox 99106->99108 99108->99106 99109->98561 99110->98560 99116 b499d2 __tzset_nolock _wcscmp 99111->99116 99112 ae506b 74 API calls 99112->99116 99113 b49866 99113->98571 99113->98599 99114 b49393 GetSystemTimeAsFileTime 99114->99116 99115 ae5045 85 API calls 99115->99116 99116->99112 99116->99113 99116->99114 99116->99115 99118 b48da9 99117->99118 99119 b48d9b 99117->99119 99121 b48dee 99118->99121 99122 b0548b 115 API calls 99118->99122 99147 b48db2 99118->99147 99120 b0548b 115 API calls 99119->99120 99120->99118 99148 b4901b 99121->99148 99123 b48dd3 99122->99123 99123->99121 99128 b48ddc 99123->99128 99125 b48e32 99126 b48e36 99125->99126 99127 b48e57 99125->99127 99129 b48e43 99126->99129 99132 b055d6 __fcloseall 83 API calls 99126->99132 99152 b48c33 99127->99152 99130 b055d6 __fcloseall 83 API calls 99128->99130 99128->99147 99134 b055d6 __fcloseall 83 API calls 99129->99134 99129->99147 99130->99147 99132->99129 99134->99147 99135 b48e85 99161 b48eb5 99135->99161 99136 b48e65 99138 b48e72 99136->99138 99140 b055d6 __fcloseall 83 API calls 99136->99140 99141 b055d6 __fcloseall 83 API calls 99138->99141 99138->99147 99140->99138 99141->99147 99144 b48ea0 99146 b055d6 __fcloseall 83 API calls 99144->99146 99144->99147 99146->99147 99147->98600 99149 b49040 99148->99149 99150 b49029 __tzset_nolock _memmove 99148->99150 99151 b05812 __fread_nolock 74 API calls 99149->99151 99150->99125 99151->99150 99153 b0594c __crtGetStringTypeA_stat 58 API calls 99152->99153 99154 b48c42 99153->99154 99155 b0594c __crtGetStringTypeA_stat 58 API calls 99154->99155 99156 b48c56 99155->99156 99157 b0594c __crtGetStringTypeA_stat 58 API calls 99156->99157 99158 b48c6a 99157->99158 99159 b48f97 58 API calls 99158->99159 99160 b48c7d 99158->99160 99159->99160 99160->99135 99160->99136 99165 b48eca 99161->99165 99162 b48f82 99205 b491bf 99162->99205 99163 b48c8f 74 API calls 99163->99165 99165->99162 99165->99163 99168 b48e8c 99165->99168 99190 b48d2b 99165->99190 99201 b4909c 99165->99201 99169 b48f97 99168->99169 99170 b48fa4 99169->99170 99171 b48faa 99169->99171 99173 b02f95 _free 58 API calls 99170->99173 99172 b48fbb 99171->99172 99174 b02f95 _free 58 API calls 99171->99174 99175 b02f95 _free 58 API calls 99172->99175 99176 b48e93 99172->99176 99173->99171 99174->99172 99175->99176 99176->99144 99177 b055d6 99176->99177 99178 b055e2 _fprintf 99177->99178 99179 b055f6 99178->99179 99180 b0560e 99178->99180 99261 b08d68 58 API calls __getptd_noexit 99179->99261 99183 b06e4e __lock_file 59 API calls 99180->99183 99186 b05606 _fprintf 99180->99186 99182 b055fb 99262 b08ff6 9 API calls __cftoe_l 99182->99262 99185 b05620 99183->99185 99245 b0556a 99185->99245 99186->99144 99209 b48c8f 99190->99209 99193 b48d87 99193->99165 99194 b48c8f 74 API calls 99195 b48d47 99194->99195 99195->99193 99196 b48c8f 74 API calls 99195->99196 99197 b48d58 99196->99197 99197->99193 99198 b48c8f 74 API calls 99197->99198 99200 b48d6a 99198->99200 99199 b48c8f 74 API calls 99199->99200 99200->99193 99200->99199 99203 b490ab 99201->99203 99204 b490eb 99201->99204 99203->99165 99204->99203 99213 b49172 99204->99213 99206 b491dd 99205->99206 99207 b491cc 99205->99207 99206->99168 99208 b04a93 80 API calls 99207->99208 99208->99206 99212 b48ca2 99209->99212 99210 b48d22 99210->99193 99210->99194 99211 b49129 74 API calls 99211->99212 99212->99210 99212->99211 99214 b4919e 99213->99214 99215 b491af 99213->99215 99217 b04a93 99214->99217 99215->99204 99218 b04a9f _fprintf 99217->99218 99219 b04ad5 99218->99219 99220 b04abd 99218->99220 99222 b04acd _fprintf 99218->99222 99223 b06e4e __lock_file 59 API calls 99219->99223 99242 b08d68 58 API calls __getptd_noexit 99220->99242 99222->99215 99225 b04adb 99223->99225 99224 b04ac2 99243 b08ff6 9 API calls __cftoe_l 99224->99243 99230 b0493a 99225->99230 99233 b04949 99230->99233 99236 b04967 99230->99236 99231 b04957 99232 b08d68 __cftoe_l 58 API calls 99231->99232 99234 b0495c 99232->99234 99233->99231 99233->99236 99240 b04981 _memmove 99233->99240 99235 b08ff6 __cftoe_l 9 API calls 99234->99235 99235->99236 99244 b04b0d LeaveCriticalSection LeaveCriticalSection _fseek 99236->99244 99237 b0b05e __flsbuf 78 API calls 99237->99240 99238 b04c6d __flush 78 API calls 99238->99240 99239 b04916 __flush 58 API calls 99239->99240 99240->99236 99240->99237 99240->99238 99240->99239 99241 b0dac6 __write 78 API calls 99240->99241 99241->99240 99242->99224 99243->99222 99244->99222 99246 b05579 99245->99246 99247 b0558d 99245->99247 99300 b08d68 58 API calls __getptd_noexit 99246->99300 99249 b05589 99247->99249 99264 b04c6d 99247->99264 99263 b05645 LeaveCriticalSection LeaveCriticalSection _fseek 99249->99263 99251 b0557e 99301 b08ff6 9 API calls __cftoe_l 99251->99301 99256 b04916 __flush 58 API calls 99257 b055a7 99256->99257 99274 b10c52 99257->99274 99259 b055ad 99259->99249 99260 b02f95 _free 58 API calls 99259->99260 99260->99249 99261->99182 99262->99186 99263->99186 99265 b04c80 99264->99265 99269 b04ca4 99264->99269 99266 b04916 __flush 58 API calls 99265->99266 99265->99269 99267 b04c9d 99266->99267 99302 b0dac6 99267->99302 99270 b10dc7 99269->99270 99271 b055a1 99270->99271 99272 b10dd4 99270->99272 99271->99256 99272->99271 99273 b02f95 _free 58 API calls 99272->99273 99273->99271 99275 b10c5e _fprintf 99274->99275 99276 b10c82 99275->99276 99277 b10c6b 99275->99277 99278 b10d0d 99276->99278 99280 b10c92 99276->99280 99427 b08d34 58 API calls __getptd_noexit 99277->99427 99432 b08d34 58 API calls __getptd_noexit 99278->99432 99283 b10cb0 99280->99283 99284 b10cba 99280->99284 99282 b10c70 99428 b08d68 58 API calls __getptd_noexit 99282->99428 99429 b08d34 58 API calls __getptd_noexit 99283->99429 99288 b0d446 ___lock_fhandle 59 API calls 99284->99288 99285 b10cb5 99433 b08d68 58 API calls __getptd_noexit 99285->99433 99290 b10cc0 99288->99290 99292 b10cd3 99290->99292 99293 b10cde 99290->99293 99291 b10d19 99434 b08ff6 9 API calls __cftoe_l 99291->99434 99412 b10d2d 99292->99412 99430 b08d68 58 API calls __getptd_noexit 99293->99430 99294 b10c77 _fprintf 99294->99259 99298 b10cd9 99431 b10d05 LeaveCriticalSection __unlock_fhandle 99298->99431 99300->99251 99301->99249 99303 b0dad2 _fprintf 99302->99303 99304 b0daf6 99303->99304 99305 b0dadf 99303->99305 99306 b0db95 99304->99306 99308 b0db0a 99304->99308 99403 b08d34 58 API calls __getptd_noexit 99305->99403 99409 b08d34 58 API calls __getptd_noexit 99306->99409 99312 b0db32 99308->99312 99313 b0db28 99308->99313 99310 b0dae4 99404 b08d68 58 API calls __getptd_noexit 99310->99404 99330 b0d446 99312->99330 99405 b08d34 58 API calls __getptd_noexit 99313->99405 99314 b0db2d 99410 b08d68 58 API calls __getptd_noexit 99314->99410 99317 b0db38 99319 b0db4b 99317->99319 99320 b0db5e 99317->99320 99339 b0dbb5 99319->99339 99406 b08d68 58 API calls __getptd_noexit 99320->99406 99321 b0dba1 99411 b08ff6 9 API calls __cftoe_l 99321->99411 99325 b0daeb _fprintf 99325->99269 99326 b0db63 99407 b08d34 58 API calls __getptd_noexit 99326->99407 99327 b0db57 99408 b0db8d LeaveCriticalSection __unlock_fhandle 99327->99408 99331 b0d452 _fprintf 99330->99331 99332 b0d4a1 EnterCriticalSection 99331->99332 99334 b09e4b __lock 58 API calls 99331->99334 99333 b0d4c7 _fprintf 99332->99333 99333->99317 99335 b0d477 99334->99335 99336 b0d48f 99335->99336 99337 b0a06b __alloc_osfhnd InitializeCriticalSectionAndSpinCount 99335->99337 99338 b0d4cb ___lock_fhandle LeaveCriticalSection 99336->99338 99337->99336 99338->99332 99340 b0dbc2 __ftell_nolock 99339->99340 99341 b0dc20 99340->99341 99342 b0dc01 99340->99342 99385 b0dbf6 99340->99385 99346 b0dc78 99341->99346 99347 b0dc5c 99341->99347 99344 b08d34 __write_nolock 58 API calls 99342->99344 99343 b0c836 __cftoe_l 6 API calls 99348 b0e416 99343->99348 99345 b0dc06 99344->99345 99349 b08d68 __cftoe_l 58 API calls 99345->99349 99350 b0dc91 99346->99350 99353 b11b11 __lseeki64_nolock 60 API calls 99346->99353 99351 b08d34 __write_nolock 58 API calls 99347->99351 99348->99327 99352 b0dc0d 99349->99352 99354 b15ebb __write_nolock 58 API calls 99350->99354 99355 b0dc61 99351->99355 99356 b08ff6 __cftoe_l 9 API calls 99352->99356 99353->99350 99357 b0dc9f 99354->99357 99358 b08d68 __cftoe_l 58 API calls 99355->99358 99356->99385 99359 b0dff8 99357->99359 99364 b09bec __write_nolock 58 API calls 99357->99364 99360 b0dc68 99358->99360 99361 b0e016 99359->99361 99362 b0e38b WriteFile 99359->99362 99363 b08ff6 __cftoe_l 9 API calls 99360->99363 99365 b0e13a 99361->99365 99368 b0e02c 99361->99368 99366 b0dfeb GetLastError 99362->99366 99396 b0dfb8 99362->99396 99363->99385 99367 b0dccb GetConsoleMode 99364->99367 99383 b0e145 99365->99383 99388 b0e22f 99365->99388 99366->99396 99367->99359 99370 b0dd0a 99367->99370 99372 b0e09b WriteFile 99368->99372 99375 b0e3c4 99368->99375 99369 b08d68 __cftoe_l 58 API calls 99374 b0e3f2 99369->99374 99370->99359 99371 b0dd1a GetConsoleCP 99370->99371 99371->99375 99401 b0dd49 99371->99401 99372->99366 99373 b0e0d8 99372->99373 99373->99368 99378 b0e0fc 99373->99378 99379 b08d34 __write_nolock 58 API calls 99374->99379 99375->99369 99375->99385 99376 b0e118 99380 b0e123 99376->99380 99381 b0e3bb 99376->99381 99377 b0e1aa WriteFile 99377->99366 99384 b0e1f9 99377->99384 99378->99396 99379->99385 99386 b08d68 __cftoe_l 58 API calls 99380->99386 99387 b08d47 __dosmaperr 58 API calls 99381->99387 99382 b0e2a4 WideCharToMultiByte 99382->99366 99394 b0e2eb 99382->99394 99383->99375 99383->99377 99384->99378 99384->99383 99384->99396 99385->99343 99390 b0e128 99386->99390 99387->99385 99388->99375 99388->99382 99389 b0e2f3 WriteFile 99392 b0e346 GetLastError 99389->99392 99389->99394 99393 b08d34 __write_nolock 58 API calls 99390->99393 99391 b03835 __write_nolock 58 API calls 99391->99401 99392->99394 99393->99385 99394->99378 99394->99388 99394->99389 99394->99396 99395 b17cae WriteConsoleW CreateFileW __putwch_nolock 99400 b0de9f 99395->99400 99396->99375 99396->99376 99396->99385 99397 b1650a 60 API calls __write_nolock 99397->99401 99398 b0de32 WideCharToMultiByte 99398->99396 99399 b0de6d WriteFile 99398->99399 99399->99366 99399->99400 99400->99366 99400->99395 99400->99396 99400->99401 99402 b0dec7 WriteFile 99400->99402 99401->99391 99401->99396 99401->99397 99401->99398 99401->99400 99402->99366 99402->99400 99403->99310 99404->99325 99405->99314 99406->99326 99407->99327 99408->99325 99409->99314 99410->99321 99411->99325 99435 b0d703 99412->99435 99414 b10d91 99448 b0d67d 59 API calls 2 library calls 99414->99448 99415 b10d3b 99415->99414 99417 b10d6f 99415->99417 99420 b0d703 __close_nolock 58 API calls 99415->99420 99417->99414 99418 b0d703 __close_nolock 58 API calls 99417->99418 99421 b10d7b CloseHandle 99418->99421 99419 b10d99 99422 b10dbb 99419->99422 99449 b08d47 58 API calls 3 library calls 99419->99449 99423 b10d66 99420->99423 99421->99414 99424 b10d87 GetLastError 99421->99424 99422->99298 99426 b0d703 __close_nolock 58 API calls 99423->99426 99424->99414 99426->99417 99427->99282 99428->99294 99429->99285 99430->99298 99431->99294 99432->99285 99433->99291 99434->99294 99436 b0d70e 99435->99436 99438 b0d723 99435->99438 99437 b08d34 __write_nolock 58 API calls 99436->99437 99440 b0d713 99437->99440 99439 b08d34 __write_nolock 58 API calls 99438->99439 99441 b0d748 99438->99441 99442 b0d752 99439->99442 99443 b08d68 __cftoe_l 58 API calls 99440->99443 99441->99415 99444 b08d68 __cftoe_l 58 API calls 99442->99444 99445 b0d71b 99443->99445 99446 b0d75a 99444->99446 99445->99415 99447 b08ff6 __cftoe_l 9 API calls 99446->99447 99447->99445 99448->99419 99449->99422 99512 b11b90 99450->99512 99453 ae48da 99455 ae7d2c 59 API calls 99453->99455 99454 ae48f7 99518 ae7eec 99454->99518 99457 ae48e6 99455->99457 99514 ae7886 99457->99514 99460 b009d5 99461 b11b90 __ftell_nolock 99460->99461 99462 b009e2 GetLongPathNameW 99461->99462 99463 ae7d2c 59 API calls 99462->99463 99464 ae741d 99463->99464 99465 ae716b 99464->99465 99466 ae77c7 59 API calls 99465->99466 99467 ae717d 99466->99467 99468 ae48ae 60 API calls 99467->99468 99469 ae7188 99468->99469 99470 ae7193 99469->99470 99473 b1ecae 99469->99473 99472 ae3f84 59 API calls 99470->99472 99474 ae719f 99472->99474 99476 b1ecc8 99473->99476 99532 ae7a68 61 API calls 99473->99532 99526 ae34c2 99474->99526 99477 ae71b2 Mailbox 99477->98289 99479 ae4f3d 136 API calls 99478->99479 99480 ae69ef 99479->99480 99481 b1e45a 99480->99481 99482 ae4f3d 136 API calls 99480->99482 99483 b497e5 122 API calls 99481->99483 99484 ae6a03 99482->99484 99485 b1e46f 99483->99485 99484->99481 99486 ae6a0b 99484->99486 99487 b1e490 99485->99487 99488 b1e473 99485->99488 99491 ae6a17 99486->99491 99492 b1e47b 99486->99492 99490 b00ff6 Mailbox 59 API calls 99487->99490 99489 ae4faa 84 API calls 99488->99489 99489->99492 99511 b1e4d5 Mailbox 99490->99511 99533 ae6bec 99491->99533 99640 b44534 90 API calls _wprintf 99492->99640 99495 b1e489 99495->99487 99497 b1e689 99498 b02f95 _free 58 API calls 99497->99498 99499 b1e691 99498->99499 99500 ae4faa 84 API calls 99499->99500 99505 b1e69a 99500->99505 99504 b02f95 _free 58 API calls 99504->99505 99505->99504 99507 ae4faa 84 API calls 99505->99507 99644 b3fcb1 89 API calls 4 library calls 99505->99644 99507->99505 99508 ae7f41 59 API calls 99508->99511 99511->99497 99511->99505 99511->99508 99626 ae766f 99511->99626 99634 ae74bd 99511->99634 99641 b3fc4d 59 API calls 2 library calls 99511->99641 99642 b3fb6e 61 API calls 2 library calls 99511->99642 99643 b47621 59 API calls Mailbox 99511->99643 99513 ae48bb GetFullPathNameW 99512->99513 99513->99453 99513->99454 99515 ae7894 99514->99515 99522 ae7e8c 99515->99522 99517 ae48f2 99517->99460 99519 ae7ef9 99518->99519 99520 ae7f06 99518->99520 99519->99457 99521 b00ff6 Mailbox 59 API calls 99520->99521 99521->99519 99523 ae7e9a 99522->99523 99524 ae7ea3 _memmove 99522->99524 99523->99524 99525 ae7faf 59 API calls 99523->99525 99524->99517 99525->99524 99527 ae34d4 99526->99527 99531 ae34f3 _memmove 99526->99531 99529 b00ff6 Mailbox 59 API calls 99527->99529 99528 b00ff6 Mailbox 59 API calls 99530 ae350a 99528->99530 99529->99531 99530->99477 99531->99528 99532->99473 99534 b1e847 99533->99534 99535 ae6c15 99533->99535 99717 b3fcb1 89 API calls 4 library calls 99534->99717 99650 ae5906 60 API calls Mailbox 99535->99650 99538 ae6c37 99651 ae5956 67 API calls 99538->99651 99539 b1e85a 99718 b3fcb1 89 API calls 4 library calls 99539->99718 99541 ae6c4c 99541->99539 99542 ae6c54 99541->99542 99544 ae77c7 59 API calls 99542->99544 99546 ae6c60 99544->99546 99545 b1e876 99548 ae6cc1 99545->99548 99652 b00b9b 60 API calls __ftell_nolock 99546->99652 99549 ae6ccf 99548->99549 99550 b1e889 99548->99550 99553 ae77c7 59 API calls 99549->99553 99552 ae5dcf CloseHandle 99550->99552 99551 ae6c6c 99554 ae77c7 59 API calls 99551->99554 99555 b1e895 99552->99555 99556 ae6cd8 99553->99556 99557 ae6c78 99554->99557 99558 ae4f3d 136 API calls 99555->99558 99559 ae77c7 59 API calls 99556->99559 99560 ae48ae 60 API calls 99557->99560 99561 b1e8b1 99558->99561 99562 ae6ce1 99559->99562 99563 ae6c86 99560->99563 99564 b1e8da 99561->99564 99568 b497e5 122 API calls 99561->99568 99655 ae46f9 99562->99655 99653 ae59b0 ReadFile SetFilePointerEx 99563->99653 99719 b3fcb1 89 API calls 4 library calls 99564->99719 99567 ae6cb2 99654 ae5c4e SetFilePointerEx SetFilePointerEx 99567->99654 99572 b1e8cd 99568->99572 99569 ae6cf8 99573 ae7c8e 59 API calls 99569->99573 99575 b1e8d5 99572->99575 99576 b1e8f6 99572->99576 99577 ae6d09 SetCurrentDirectoryW 99573->99577 99574 b1e8f1 99603 ae6e6c Mailbox 99574->99603 99578 ae4faa 84 API calls 99575->99578 99579 ae4faa 84 API calls 99576->99579 99582 ae6d1c Mailbox 99577->99582 99578->99564 99580 b1e8fb 99579->99580 99581 b00ff6 Mailbox 59 API calls 99580->99581 99588 b1e92f 99581->99588 99583 b00ff6 Mailbox 59 API calls 99582->99583 99586 ae6d2f 99583->99586 99585 ae3bcd 99585->98151 99585->98173 99587 ae538e 59 API calls 99586->99587 99615 ae6d3a Mailbox __NMSG_WRITE 99587->99615 99589 ae766f 59 API calls 99588->99589 99621 b1e978 Mailbox 99589->99621 99590 ae6e47 99713 ae5dcf 99590->99713 99593 b1eb69 99724 b47581 59 API calls Mailbox 99593->99724 99594 ae6e53 SetCurrentDirectoryW 99594->99603 99597 b1eb8b 99725 b4f835 59 API calls 2 library calls 99597->99725 99600 b1eb98 99602 b02f95 _free 58 API calls 99600->99602 99601 b1ec02 99728 b3fcb1 89 API calls 4 library calls 99601->99728 99602->99603 99645 ae5934 99603->99645 99606 b1ec1b 99606->99590 99607 ae766f 59 API calls 99607->99621 99609 b1ebfa 99727 b3fb07 59 API calls 4 library calls 99609->99727 99611 ae7f41 59 API calls 99611->99615 99615->99590 99615->99601 99615->99609 99615->99611 99706 ae59cd 67 API calls _wcscpy 99615->99706 99707 ae70bd GetStringTypeW 99615->99707 99708 ae702c 60 API calls __wcsnicmp 99615->99708 99709 ae710a GetStringTypeW __NMSG_WRITE 99615->99709 99710 b0387d GetStringTypeW _iswctype 99615->99710 99711 ae6a3c 165 API calls 3 library calls 99615->99711 99712 ae7373 59 API calls Mailbox 99615->99712 99616 ae7f41 59 API calls 99616->99621 99620 b1ebbb 99726 b3fcb1 89 API calls 4 library calls 99620->99726 99621->99593 99621->99607 99621->99616 99621->99620 99720 b3fc4d 59 API calls 2 library calls 99621->99720 99721 b3fb6e 61 API calls 2 library calls 99621->99721 99722 b47621 59 API calls Mailbox 99621->99722 99723 ae7373 59 API calls Mailbox 99621->99723 99623 b1ebd4 99624 b02f95 _free 58 API calls 99623->99624 99625 b1ebe7 99624->99625 99625->99603 99627 ae770f 99626->99627 99631 ae7682 _memmove 99626->99631 99629 b00ff6 Mailbox 59 API calls 99627->99629 99628 b00ff6 Mailbox 59 API calls 99630 ae7689 99628->99630 99629->99631 99632 b00ff6 Mailbox 59 API calls 99630->99632 99633 ae76b2 99630->99633 99631->99628 99632->99633 99633->99511 99635 ae74d0 99634->99635 99637 ae757e 99634->99637 99636 b00ff6 Mailbox 59 API calls 99635->99636 99639 ae7502 99635->99639 99636->99639 99637->99511 99638 b00ff6 59 API calls Mailbox 99638->99639 99639->99637 99639->99638 99640->99495 99641->99511 99642->99511 99643->99511 99644->99505 99646 ae5dcf CloseHandle 99645->99646 99647 ae593c Mailbox 99646->99647 99648 ae5dcf CloseHandle 99647->99648 99649 ae594b 99648->99649 99649->99585 99650->99538 99651->99541 99652->99551 99653->99567 99654->99548 99656 ae77c7 59 API calls 99655->99656 99657 ae470f 99656->99657 99658 ae77c7 59 API calls 99657->99658 99659 ae4717 99658->99659 99660 ae77c7 59 API calls 99659->99660 99661 ae471f 99660->99661 99662 ae77c7 59 API calls 99661->99662 99663 ae4727 99662->99663 99664 ae475b 99663->99664 99665 b1d8fb 99663->99665 99666 ae79ab 59 API calls 99664->99666 99667 ae81a7 59 API calls 99665->99667 99668 ae4769 99666->99668 99669 b1d904 99667->99669 99670 ae7e8c 59 API calls 99668->99670 99671 ae7eec 59 API calls 99669->99671 99672 ae4773 99670->99672 99674 ae479e 99671->99674 99673 ae79ab 59 API calls 99672->99673 99672->99674 99677 ae4794 99673->99677 99675 ae47de 99674->99675 99678 ae47bd 99674->99678 99688 b1d924 99674->99688 99729 ae79ab 99675->99729 99681 ae7e8c 59 API calls 99677->99681 99679 ae7b52 59 API calls 99678->99679 99683 ae47c7 99679->99683 99680 ae47ef 99684 ae4801 99680->99684 99686 ae81a7 59 API calls 99680->99686 99681->99674 99682 b1d9f4 99685 ae7d2c 59 API calls 99682->99685 99683->99675 99689 ae79ab 59 API calls 99683->99689 99687 ae4811 99684->99687 99690 ae81a7 59 API calls 99684->99690 99701 b1d9b1 99685->99701 99686->99684 99692 ae4818 99687->99692 99693 ae81a7 59 API calls 99687->99693 99688->99682 99691 b1d9dd 99688->99691 99700 b1d95b 99688->99700 99689->99675 99690->99687 99691->99682 99697 b1d9c8 99691->99697 99694 ae81a7 59 API calls 99692->99694 99703 ae481f Mailbox 99692->99703 99693->99692 99694->99703 99695 ae7b52 59 API calls 99695->99701 99696 b1d9b9 99698 ae7d2c 59 API calls 99696->99698 99699 ae7d2c 59 API calls 99697->99699 99698->99701 99699->99701 99700->99696 99704 b1d9a4 99700->99704 99701->99675 99701->99695 99742 ae7a84 59 API calls 2 library calls 99701->99742 99703->99569 99705 ae7d2c 59 API calls 99704->99705 99705->99701 99706->99615 99707->99615 99708->99615 99709->99615 99710->99615 99711->99615 99712->99615 99714 ae5de8 99713->99714 99715 ae5dd9 99713->99715 99714->99715 99716 ae5ded CloseHandle 99714->99716 99715->99594 99716->99715 99717->99539 99718->99545 99719->99574 99720->99621 99721->99621 99722->99621 99723->99621 99724->99597 99725->99600 99726->99623 99727->99601 99728->99606 99730 ae79ba 99729->99730 99731 ae7a17 99729->99731 99730->99731 99732 ae79c5 99730->99732 99733 ae7e8c 59 API calls 99731->99733 99735 b1ef32 99732->99735 99736 ae79e0 99732->99736 99734 ae79e8 _memmove 99733->99734 99734->99680 99744 ae8189 99735->99744 99743 ae8087 59 API calls Mailbox 99736->99743 99739 b1ef3c 99740 b00ff6 Mailbox 59 API calls 99739->99740 99741 b1ef5c 99740->99741 99742->99701 99743->99734 99745 b00ff6 Mailbox 59 API calls 99744->99745 99746 ae8193 99745->99746 99746->99739 99747->98300 99749 ae6ef5 99748->99749 99753 ae7009 99748->99753 99750 b00ff6 Mailbox 59 API calls 99749->99750 99749->99753 99752 ae6f1c 99750->99752 99751 b00ff6 Mailbox 59 API calls 99757 ae6f91 99751->99757 99752->99751 99753->98304 99756 ae74bd 59 API calls 99756->99757 99757->99753 99757->99756 99758 ae766f 59 API calls 99757->99758 99761 ae63a0 99757->99761 99786 b36ac9 59 API calls Mailbox 99757->99786 99758->99757 99759->98306 99760->98308 99787 ae7b76 99761->99787 99763 ae65ca 99764 ae766f 59 API calls 99763->99764 99765 ae65e4 Mailbox 99764->99765 99765->99757 99768 ae7eec 59 API calls 99782 ae63c5 99768->99782 99769 ae766f 59 API calls 99769->99782 99770 b1e41f 99796 b3fdba 91 API calls 4 library calls 99770->99796 99774 b1e42d 99775 ae766f 59 API calls 99774->99775 99777 b1e443 99775->99777 99776 ae68f9 _memmove 99797 b3fdba 91 API calls 4 library calls 99776->99797 99777->99765 99778 b1e3bb 99779 ae8189 59 API calls 99778->99779 99781 b1e3c6 99779->99781 99785 b00ff6 Mailbox 59 API calls 99781->99785 99782->99763 99782->99768 99782->99769 99782->99770 99782->99776 99782->99778 99783 ae7faf 59 API calls 99782->99783 99792 ae60cc 60 API calls 99782->99792 99793 ae5ea1 59 API calls Mailbox 99782->99793 99794 ae5fd2 60 API calls 99782->99794 99795 ae7a84 59 API calls 2 library calls 99782->99795 99784 ae659b CharUpperBuffW 99783->99784 99784->99782 99785->99776 99786->99757 99788 b00ff6 Mailbox 59 API calls 99787->99788 99789 ae7b9b 99788->99789 99790 ae8189 59 API calls 99789->99790 99791 ae7baa 99790->99791 99791->99782 99792->99782 99793->99782 99794->99782 99795->99782 99796->99774 99797->99765 99798->98323 99799->98322 99801 b1d638 99800->99801 99802 ae4227 99800->99802 99801->99802 99803 b1d641 DestroyIcon 99801->99803 99802->98329 99826 b43226 62 API calls _W_store_winword 99802->99826 99803->99802 99805 ae4129 99804->99805 99825 ae4200 Mailbox 99804->99825 99806 ae7b76 59 API calls 99805->99806 99807 ae4137 99806->99807 99808 ae4144 99807->99808 99809 b1d5dd LoadStringW 99807->99809 99810 ae7d2c 59 API calls 99808->99810 99811 b1d5f7 99809->99811 99812 ae4159 99810->99812 99814 ae7c8e 59 API calls 99811->99814 99812->99811 99813 ae416a 99812->99813 99819 b1d601 99814->99819 99825->98335 99826->98329 99828 aee835 99827->99828 99829 b23ed3 99828->99829 99832 aee89f 99828->99832 99841 aee8f9 99828->99841 99918 aea000 99829->99918 99831 b23ee8 99856 aeead0 Mailbox 99831->99856 99941 b4a0b5 89 API calls 4 library calls 99831->99941 99835 ae77c7 59 API calls 99832->99835 99832->99841 99833 ae77c7 59 API calls 99833->99841 99836 b23f2e 99835->99836 99838 b02f80 __cinit 67 API calls 99836->99838 99837 b02f80 __cinit 67 API calls 99837->99841 99838->99841 99839 b23f50 99839->98365 99840 ae8620 69 API calls 99840->99856 99841->99833 99841->99837 99841->99839 99843 aeeaba 99841->99843 99841->99856 99843->99856 99942 b4a0b5 89 API calls 4 library calls 99843->99942 99844 ae8ea0 59 API calls 99844->99856 99847 aef2fc 99946 b4a0b5 89 API calls 4 library calls 99847->99946 99848 aea000 331 API calls 99848->99856 99850 b2424f 99850->98365 99852 b4a0b5 89 API calls 99852->99856 99856->99840 99856->99844 99856->99847 99856->99848 99856->99852 99857 aeebd8 99856->99857 99917 ae80d7 59 API calls 2 library calls 99856->99917 99943 b37405 59 API calls 99856->99943 99944 b5c8d7 331 API calls 99856->99944 99945 b5b851 331 API calls Mailbox 99856->99945 99947 ae9df0 59 API calls Mailbox 99856->99947 99948 b596db 331 API calls Mailbox 99856->99948 99857->98365 99859 aef61a 99858->99859 99860 aef7b0 99858->99860 99861 aef626 99859->99861 99862 b24848 99859->99862 99863 ae7f41 59 API calls 99860->99863 100047 aef3f0 331 API calls 2 library calls 99861->100047 100049 b5bf80 331 API calls Mailbox 99862->100049 99869 aef6ec Mailbox 99863->99869 99866 b24856 99870 aef790 99866->99870 100050 b4a0b5 89 API calls 4 library calls 99866->100050 99868 aef65d 99868->99866 99868->99869 99868->99870 99874 ae4faa 84 API calls 99869->99874 99955 b4cde5 99869->99955 100035 b43e73 99869->100035 100038 b5474d 99869->100038 99870->98365 99872 aef743 99872->99870 100048 ae9df0 59 API calls Mailbox 99872->100048 99874->99872 99877->98365 99878->98365 99879->98365 99880->98342 99881->98347 99882->98365 99883->98349 99884->98349 99885->98349 99886->98365 99887->98365 99888->98365 99890 ae99ab 99889->99890 99891 ae99b1 99889->99891 99890->98365 99892 b1f9fc __i64tow 99891->99892 99893 ae99f9 99891->99893 99894 ae99b7 __itow 99891->99894 99898 b1f903 99891->99898 100176 b038d8 83 API calls 3 library calls 99893->100176 99896 b00ff6 Mailbox 59 API calls 99894->99896 99899 ae99d1 99896->99899 99900 b00ff6 Mailbox 59 API calls 99898->99900 99902 b1f97b Mailbox _wcscpy 99898->99902 99899->99890 99901 ae7f41 59 API calls 99899->99901 99903 b1f948 99900->99903 99901->99890 100177 b038d8 83 API calls 3 library calls 99902->100177 99904 b00ff6 Mailbox 59 API calls 99903->99904 99905 b1f96e 99904->99905 99905->99902 99906 ae7f41 59 API calls 99905->99906 99906->99902 99907->98365 99908->98365 99909->98365 99910->98370 99911->98370 99912->98370 99913->98370 99914->98370 99915->98370 99916->98370 99917->99856 99919 aea01f 99918->99919 99936 aea04d Mailbox 99918->99936 99920 b00ff6 Mailbox 59 API calls 99919->99920 99920->99936 99921 aeb5d5 99922 ae81a7 59 API calls 99921->99922 99934 aea1b7 99922->99934 99923 b00ff6 59 API calls Mailbox 99923->99936 99924 ae77c7 59 API calls 99924->99936 99928 b2047f 99951 b4a0b5 89 API calls 4 library calls 99928->99951 99930 ae81a7 59 API calls 99930->99936 99932 b2048e 99932->99831 99933 b02f80 67 API calls __cinit 99933->99936 99934->99831 99935 b37405 59 API calls 99935->99936 99936->99921 99936->99923 99936->99924 99936->99928 99936->99930 99936->99933 99936->99934 99936->99935 99937 b20e00 99936->99937 99939 aeb5da 99936->99939 99940 aea6ba 99936->99940 99949 aeca20 331 API calls 2 library calls 99936->99949 99950 aeba60 60 API calls Mailbox 99936->99950 99953 b4a0b5 89 API calls 4 library calls 99937->99953 99954 b4a0b5 89 API calls 4 library calls 99939->99954 99952 b4a0b5 89 API calls 4 library calls 99940->99952 99941->99856 99942->99856 99943->99856 99944->99856 99945->99856 99946->99850 99947->99856 99948->99856 99949->99936 99950->99936 99951->99932 99952->99934 99953->99939 99954->99934 99956 ae77c7 59 API calls 99955->99956 99957 b4ce1a 99956->99957 99958 ae77c7 59 API calls 99957->99958 99959 b4ce23 99958->99959 99960 b4ce37 99959->99960 100160 ae9c9c 59 API calls 99959->100160 99962 ae9997 84 API calls 99960->99962 100171 b44696 GetFileAttributesW 100035->100171 100039 ae9997 84 API calls 100038->100039 100040 b54787 100039->100040 100041 ae63a0 94 API calls 100040->100041 100043 b54797 100041->100043 100042 b547bc 100046 b547c0 100042->100046 100175 ae9bf8 59 API calls Mailbox 100042->100175 100043->100042 100044 aea000 331 API calls 100043->100044 100044->100042 100046->99872 100047->99868 100048->99872 100049->99866 100050->99870 100160->99960 100172 b43e7a 100171->100172 100173 b446b1 FindFirstFileW 100171->100173 100172->99872 100173->100172 100174 b446c6 FindClose 100173->100174 100174->100172 100175->100046 100176->99894 100177->99892 100179 ae7dbf __NMSG_WRITE 100178->100179 100180 ae8189 59 API calls 100179->100180 100181 ae7dd0 _memmove 100179->100181 100190 ae107d 100195 ae71eb 100190->100195 100192 ae108c 100193 b02f80 __cinit 67 API calls 100192->100193 100194 ae1096 100193->100194 100196 ae71fb __ftell_nolock 100195->100196 100197 ae77c7 59 API calls 100196->100197 100198 ae72b1 100197->100198 100199 ae4864 61 API calls 100198->100199 100200 ae72ba 100199->100200 100226 b0074f 100200->100226 100203 ae7e0b 59 API calls 100204 ae72d3 100203->100204 100205 ae3f84 59 API calls 100204->100205 100206 ae72e2 100205->100206 100207 ae77c7 59 API calls 100206->100207 100208 ae72eb 100207->100208 100209 ae7eec 59 API calls 100208->100209 100210 ae72f4 RegOpenKeyExW 100209->100210 100211 b1ecda RegQueryValueExW 100210->100211 100215 ae7316 Mailbox 100210->100215 100212 b1ecf7 100211->100212 100213 b1ed6c RegCloseKey 100211->100213 100214 b00ff6 Mailbox 59 API calls 100212->100214 100213->100215 100225 b1ed7e _wcscat Mailbox __NMSG_WRITE 100213->100225 100216 b1ed10 100214->100216 100215->100192 100218 ae538e 59 API calls 100216->100218 100217 ae7b52 59 API calls 100217->100225 100219 b1ed1b RegQueryValueExW 100218->100219 100220 b1ed38 100219->100220 100222 b1ed52 100219->100222 100221 ae7d2c 59 API calls 100220->100221 100221->100222 100222->100213 100223 ae7f41 59 API calls 100223->100225 100224 ae3f84 59 API calls 100224->100225 100225->100215 100225->100217 100225->100223 100225->100224 100227 b11b90 __ftell_nolock 100226->100227 100228 b0075c GetFullPathNameW 100227->100228 100229 b0077e 100228->100229 100230 ae7d2c 59 API calls 100229->100230 100231 ae72c5 100230->100231 100231->100203 100232 b20226 100233 aeade2 Mailbox 100232->100233 100235 b20c86 100233->100235 100237 b20c8f 100233->100237 100239 b200e0 VariantClear 100233->100239 100240 aeb6c1 100233->100240 100243 b5e237 100233->100243 100246 ae9df0 59 API calls Mailbox 100233->100246 100247 b37405 59 API calls 100233->100247 100249 b366f4 59 API calls Mailbox 100235->100249 100239->100233 100248 b4a0b5 89 API calls 4 library calls 100240->100248 100250 b5cdf1 100243->100250 100245 b5e247 100245->100233 100246->100233 100247->100233 100248->100235 100249->100237 100251 ae9997 84 API calls 100250->100251 100252 b5ce2e 100251->100252 100276 b5ce75 Mailbox 100252->100276 100288 b5dab9 100252->100288 100254 b5d0cd 100255 b5d242 100254->100255 100259 b5d0db 100254->100259 100327 b5dbdc 92 API calls Mailbox 100255->100327 100258 b5d251 100258->100259 100260 b5d25d 100258->100260 100301 b5cc82 100259->100301 100260->100276 100261 ae9997 84 API calls 100278 b5cec6 Mailbox 100261->100278 100266 b5d114 100316 b00e48 100266->100316 100269 b5d147 100272 ae942e 59 API calls 100269->100272 100270 b5d12e 100322 b4a0b5 89 API calls 4 library calls 100270->100322 100274 b5d153 100272->100274 100273 b5d139 GetCurrentProcess TerminateProcess 100273->100269 100275 ae91b0 59 API calls 100274->100275 100277 b5d169 100275->100277 100276->100245 100287 b5d190 100277->100287 100323 ae8ea0 59 API calls Mailbox 100277->100323 100278->100254 100278->100261 100278->100276 100320 b4f835 59 API calls 2 library calls 100278->100320 100321 b5d2f3 61 API calls 2 library calls 100278->100321 100280 b5d2b8 100280->100276 100282 b5d2cc FreeLibrary 100280->100282 100281 b5d17f 100324 b5d95d 107 API calls _free 100281->100324 100282->100276 100287->100280 100325 ae8ea0 59 API calls Mailbox 100287->100325 100326 ae9e9c 60 API calls Mailbox 100287->100326 100328 b5d95d 107 API calls _free 100287->100328 100289 ae7faf 59 API calls 100288->100289 100290 b5dad4 CharLowerBuffW 100289->100290 100329 b3f658 100290->100329 100294 ae77c7 59 API calls 100295 b5db0d 100294->100295 100296 ae79ab 59 API calls 100295->100296 100297 b5db24 100296->100297 100299 ae7e8c 59 API calls 100297->100299 100298 b5db6c Mailbox 100298->100278 100300 b5db30 Mailbox 100299->100300 100300->100298 100336 b5d2f3 61 API calls 2 library calls 100300->100336 100302 b5cc9d 100301->100302 100303 b5ccf2 100301->100303 100304 b00ff6 Mailbox 59 API calls 100302->100304 100307 b5dd64 100303->100307 100306 b5ccbf 100304->100306 100305 b00ff6 Mailbox 59 API calls 100305->100306 100306->100303 100306->100305 100308 b5df8d Mailbox 100307->100308 100315 b5dd87 _strcat _wcscpy __NMSG_WRITE 100307->100315 100308->100266 100309 ae9d46 59 API calls 100309->100315 100310 ae9c9c 59 API calls 100310->100315 100311 ae9cf8 59 API calls 100311->100315 100312 ae9997 84 API calls 100312->100315 100313 b0594c 58 API calls __crtGetStringTypeA_stat 100313->100315 100315->100308 100315->100309 100315->100310 100315->100311 100315->100312 100315->100313 100339 b45b29 61 API calls 2 library calls 100315->100339 100318 b00e5d 100316->100318 100317 b00ef5 VirtualProtect 100319 b00ec3 100317->100319 100318->100317 100318->100319 100319->100269 100319->100270 100320->100278 100321->100278 100322->100273 100323->100281 100324->100287 100325->100287 100326->100287 100327->100258 100328->100287 100331 b3f683 __NMSG_WRITE 100329->100331 100330 b3f6c2 100330->100294 100330->100300 100331->100330 100332 b3f769 100331->100332 100333 b3f6b8 100331->100333 100332->100330 100338 ae7a24 61 API calls 100332->100338 100333->100330 100337 ae7a24 61 API calls 100333->100337 100336->100298 100337->100333 100338->100332 100339->100315 100340 ae1016 100345 ae4ad2 100340->100345 100343 b02f80 __cinit 67 API calls 100344 ae1025 100343->100344 100346 b00ff6 Mailbox 59 API calls 100345->100346 100347 ae4ada 100346->100347 100348 ae101b 100347->100348 100352 ae4a94 100347->100352 100348->100343 100353 ae4a9d 100352->100353 100354 ae4aaf 100352->100354 100355 b02f80 __cinit 67 API calls 100353->100355 100356 ae4afe 100354->100356 100355->100354 100357 ae77c7 59 API calls 100356->100357 100358 ae4b16 GetVersionExW 100357->100358 100359 ae7d2c 59 API calls 100358->100359 100360 ae4b59 100359->100360 100361 ae7e8c 59 API calls 100360->100361 100364 ae4b86 100360->100364 100362 ae4b7a 100361->100362 100363 ae7886 59 API calls 100362->100363 100363->100364 100365 b1dc8d 100364->100365 100366 ae4bf1 GetCurrentProcess IsWow64Process 100364->100366 100367 ae4c0a 100366->100367 100368 ae4c89 GetSystemInfo 100367->100368 100369 ae4c20 100367->100369 100370 ae4c56 100368->100370 100380 ae4c95 100369->100380 100370->100348 100373 ae4c7d GetSystemInfo 100375 ae4c47 100373->100375 100374 ae4c32 100376 ae4c95 2 API calls 100374->100376 100375->100370 100377 ae4c4d FreeLibrary 100375->100377 100378 ae4c3a GetNativeSystemInfo 100376->100378 100377->100370 100378->100375 100381 ae4c2e 100380->100381 100382 ae4c9e LoadLibraryA 100380->100382 100381->100373 100381->100374 100382->100381 100383 ae4caf GetProcAddress 100382->100383 100383->100381 100384 ae1066 100389 aef8cf 100384->100389 100386 ae106c 100387 b02f80 __cinit 67 API calls 100386->100387 100388 ae1076 100387->100388 100390 aef8f0 100389->100390 100422 b00143 100390->100422 100394 aef937 100395 ae77c7 59 API calls 100394->100395 100396 aef941 100395->100396 100397 ae77c7 59 API calls 100396->100397 100398 aef94b 100397->100398 100399 ae77c7 59 API calls 100398->100399 100400 aef955 100399->100400 100401 ae77c7 59 API calls 100400->100401 100402 aef993 100401->100402 100403 ae77c7 59 API calls 100402->100403 100404 aefa5e 100403->100404 100432 af60e7 100404->100432 100408 aefa90 100409 ae77c7 59 API calls 100408->100409 100410 aefa9a 100409->100410 100460 afffde 100410->100460 100412 aefae1 100413 aefaf1 GetStdHandle 100412->100413 100414 aefb3d 100413->100414 100415 b249d5 100413->100415 100417 aefb45 OleInitialize 100414->100417 100415->100414 100416 b249de 100415->100416 100467 b46dda 64 API calls Mailbox 100416->100467 100417->100386 100419 b249e5 100468 b474a9 CreateThread 100419->100468 100421 b249f1 CloseHandle 100421->100417 100469 b0021c 100422->100469 100425 b0021c 59 API calls 100426 b00185 100425->100426 100427 ae77c7 59 API calls 100426->100427 100428 b00191 100427->100428 100429 ae7d2c 59 API calls 100428->100429 100430 aef8f6 100429->100430 100431 b003a2 6 API calls 100430->100431 100431->100394 100433 ae77c7 59 API calls 100432->100433 100434 af60f7 100433->100434 100435 ae77c7 59 API calls 100434->100435 100436 af60ff 100435->100436 100476 af5bfd 100436->100476 100439 af5bfd 59 API calls 100440 af610f 100439->100440 100441 ae77c7 59 API calls 100440->100441 100442 af611a 100441->100442 100443 b00ff6 Mailbox 59 API calls 100442->100443 100444 aefa68 100443->100444 100445 af6259 100444->100445 100446 af6267 100445->100446 100447 ae77c7 59 API calls 100446->100447 100448 af6272 100447->100448 100449 ae77c7 59 API calls 100448->100449 100450 af627d 100449->100450 100451 ae77c7 59 API calls 100450->100451 100452 af6288 100451->100452 100453 ae77c7 59 API calls 100452->100453 100454 af6293 100453->100454 100455 af5bfd 59 API calls 100454->100455 100456 af629e 100455->100456 100457 b00ff6 Mailbox 59 API calls 100456->100457 100458 af62a5 RegisterWindowMessageW 100457->100458 100458->100408 100461 b35cc3 100460->100461 100462 afffee 100460->100462 100479 b49d71 60 API calls 100461->100479 100464 b00ff6 Mailbox 59 API calls 100462->100464 100465 affff6 100464->100465 100465->100412 100466 b35cce 100467->100419 100468->100421 100480 b4748f 65 API calls 100468->100480 100470 ae77c7 59 API calls 100469->100470 100471 b00227 100470->100471 100472 ae77c7 59 API calls 100471->100472 100473 b0022f 100472->100473 100474 ae77c7 59 API calls 100473->100474 100475 b0017b 100474->100475 100475->100425 100477 ae77c7 59 API calls 100476->100477 100478 af5c05 100477->100478 100478->100439 100479->100466 100481 ae1055 100486 ae2649 100481->100486 100484 b02f80 __cinit 67 API calls 100485 ae1064 100484->100485 100487 ae77c7 59 API calls 100486->100487 100488 ae26b7 100487->100488 100493 ae3582 100488->100493 100491 ae2754 100492 ae105a 100491->100492 100496 ae3416 59 API calls 2 library calls 100491->100496 100492->100484 100497 ae35b0 100493->100497 100496->100491 100498 ae35a1 100497->100498 100499 ae35bd 100497->100499 100498->100491 100499->100498 100500 ae35c4 RegOpenKeyExW 100499->100500 100500->100498 100501 ae35de RegQueryValueExW 100500->100501 100502 ae35ff 100501->100502 100503 ae3614 RegCloseKey 100501->100503 100502->100503 100503->100498 100504 b24599 100508 b3655c 100504->100508 100506 b245a4 100507 b3655c 85 API calls 100506->100507 100507->100506 100514 b36569 100508->100514 100515 b36596 100508->100515 100509 b36598 100520 ae9488 84 API calls Mailbox 100509->100520 100511 b3659d 100512 ae9997 84 API calls 100511->100512 100513 b365a4 100512->100513 100516 ae7c8e 59 API calls 100513->100516 100514->100509 100514->100511 100514->100515 100517 b36590 100514->100517 100515->100506 100516->100515 100519 ae9700 59 API calls _wcsstr 100517->100519 100519->100515 100520->100511 100521 ae3633 100522 ae366a 100521->100522 100523 ae36e5 100522->100523 100524 ae3688 100522->100524 100525 ae36e7 100522->100525 100526 ae36ca DefWindowProcW 100523->100526 100529 ae375d PostQuitMessage 100524->100529 100530 ae3695 100524->100530 100527 ae36ed 100525->100527 100528 b1d31c 100525->100528 100532 ae36d8 100526->100532 100533 ae3715 SetTimer RegisterWindowMessageW 100527->100533 100534 ae36f2 100527->100534 100571 af11d0 10 API calls Mailbox 100528->100571 100529->100532 100535 b1d38f 100530->100535 100536 ae36a0 100530->100536 100533->100532 100537 ae373e CreatePopupMenu 100533->100537 100542 ae36f9 KillTimer 100534->100542 100543 b1d2bf 100534->100543 100575 b42a16 71 API calls _memset 100535->100575 100538 ae36a8 100536->100538 100539 ae3767 100536->100539 100537->100532 100544 b1d374 100538->100544 100545 ae36b3 100538->100545 100569 ae4531 64 API calls _memset 100539->100569 100541 b1d343 100572 af11f3 331 API calls Mailbox 100541->100572 100566 ae44cb Shell_NotifyIconW _memset 100542->100566 100549 b1d2c4 100543->100549 100550 b1d2f8 MoveWindow 100543->100550 100544->100526 100574 b3817e 59 API calls Mailbox 100544->100574 100552 ae36be 100545->100552 100553 ae374b 100545->100553 100546 b1d3a1 100546->100526 100546->100532 100555 b1d2e7 SetFocus 100549->100555 100556 b1d2c8 100549->100556 100550->100532 100552->100526 100573 ae44cb Shell_NotifyIconW _memset 100552->100573 100568 ae45df 81 API calls _memset 100553->100568 100554 ae375b 100554->100532 100555->100532 100556->100552 100559 b1d2d1 100556->100559 100557 ae370c 100567 ae3114 DeleteObject DestroyWindow Mailbox 100557->100567 100570 af11d0 10 API calls Mailbox 100559->100570 100564 b1d368 100565 ae43db 68 API calls 100564->100565 100565->100523 100566->100557 100567->100532 100568->100554 100569->100554 100570->100532 100571->100541 100572->100552 100573->100564 100574->100523 100575->100546 100576 136b028 100590 1368c78 100576->100590 100578 136b0ec 100593 136af18 100578->100593 100596 136c118 GetPEB 100590->100596 100592 1369303 100592->100578 100594 136af21 Sleep 100593->100594 100595 136af2f 100594->100595 100597 136c142 100596->100597 100597->100592

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AE3B7A
                                                      • IsDebuggerPresent.KERNEL32 ref: 00AE3B8C
                                                      • GetFullPathNameW.KERNEL32(00007FFF,?,?,00BA62F8,00BA62E0,?,?), ref: 00AE3BFD
                                                        • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                                                        • Part of subcall function 00AF0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00AE3C26,00BA62F8,?,?,?), ref: 00AF0ACE
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00AE3C81
                                                      • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00B993F0,00000010), ref: 00B1D4BC
                                                      • SetCurrentDirectoryW.KERNEL32(?,00BA62F8,?,?,?), ref: 00B1D4F4
                                                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00B95D40,00BA62F8,?,?,?), ref: 00B1D57A
                                                      • ShellExecuteW.SHELL32(00000000,?,?), ref: 00B1D581
                                                        • Part of subcall function 00AE3A58: GetSysColorBrush.USER32(0000000F), ref: 00AE3A62
                                                        • Part of subcall function 00AE3A58: LoadCursorW.USER32(00000000,00007F00), ref: 00AE3A71
                                                        • Part of subcall function 00AE3A58: LoadIconW.USER32(00000063), ref: 00AE3A88
                                                        • Part of subcall function 00AE3A58: LoadIconW.USER32(000000A4), ref: 00AE3A9A
                                                        • Part of subcall function 00AE3A58: LoadIconW.USER32(000000A2), ref: 00AE3AAC
                                                        • Part of subcall function 00AE3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00AE3AD2
                                                        • Part of subcall function 00AE3A58: RegisterClassExW.USER32(?), ref: 00AE3B28
                                                        • Part of subcall function 00AE39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00AE3A15
                                                        • Part of subcall function 00AE39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00AE3A36
                                                        • Part of subcall function 00AE39E7: ShowWindow.USER32(00000000,?,?), ref: 00AE3A4A
                                                        • Part of subcall function 00AE39E7: ShowWindow.USER32(00000000,?,?), ref: 00AE3A53
                                                        • Part of subcall function 00AE43DB: _memset.LIBCMT ref: 00AE4401
                                                        • Part of subcall function 00AE43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AE44A6
                                                      Strings
                                                      • This is a third-party compiled AutoIt script., xrefs: 00B1D4B4
                                                      • runas, xrefs: 00B1D575
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                      • String ID: This is a third-party compiled AutoIt script.$runas
                                                      • API String ID: 529118366-3287110873
                                                      • Opcode ID: 095452eb5ef423bb2c39559df0da5d945f1fa7a314acf39f79010c86f9e8c14f
                                                      • Instruction ID: fe877d00a576eb7d778dd24520ed0ba6763f577f24761c19c94a3c84fc78befa
                                                      • Opcode Fuzzy Hash: 095452eb5ef423bb2c39559df0da5d945f1fa7a314acf39f79010c86f9e8c14f
                                                      • Instruction Fuzzy Hash: 62510A72908389AECF11EBB5DD1AEFD7BB8AF46300F1440B5F411631A1DE749A45CB21

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 996 ae4afe-ae4b5e call ae77c7 GetVersionExW call ae7d2c 1001 ae4c69-ae4c6b 996->1001 1002 ae4b64 996->1002 1003 b1db90-b1db9c 1001->1003 1004 ae4b67-ae4b6c 1002->1004 1005 b1db9d-b1dba1 1003->1005 1006 ae4b72 1004->1006 1007 ae4c70-ae4c71 1004->1007 1009 b1dba3 1005->1009 1010 b1dba4-b1dbb0 1005->1010 1008 ae4b73-ae4baa call ae7e8c call ae7886 1006->1008 1007->1008 1018 b1dc8d-b1dc90 1008->1018 1019 ae4bb0-ae4bb1 1008->1019 1009->1010 1010->1005 1012 b1dbb2-b1dbb7 1010->1012 1012->1004 1014 b1dbbd-b1dbc4 1012->1014 1014->1003 1016 b1dbc6 1014->1016 1020 b1dbcb-b1dbce 1016->1020 1021 b1dc92 1018->1021 1022 b1dca9-b1dcad 1018->1022 1019->1020 1023 ae4bb7-ae4bc2 1019->1023 1024 b1dbd4-b1dbf2 1020->1024 1025 ae4bf1-ae4c08 GetCurrentProcess IsWow64Process 1020->1025 1026 b1dc95 1021->1026 1030 b1dc98-b1dca1 1022->1030 1031 b1dcaf-b1dcb8 1022->1031 1027 b1dc13-b1dc19 1023->1027 1028 ae4bc8-ae4bca 1023->1028 1024->1025 1029 b1dbf8-b1dbfe 1024->1029 1032 ae4c0d-ae4c1e 1025->1032 1033 ae4c0a 1025->1033 1026->1030 1038 b1dc23-b1dc29 1027->1038 1039 b1dc1b-b1dc1e 1027->1039 1034 ae4bd0-ae4bd3 1028->1034 1035 b1dc2e-b1dc3a 1028->1035 1036 b1dc00-b1dc03 1029->1036 1037 b1dc08-b1dc0e 1029->1037 1030->1022 1031->1026 1040 b1dcba-b1dcbd 1031->1040 1041 ae4c89-ae4c93 GetSystemInfo 1032->1041 1042 ae4c20-ae4c30 call ae4c95 1032->1042 1033->1032 1043 ae4bd9-ae4be8 1034->1043 1044 b1dc5a-b1dc5d 1034->1044 1046 b1dc44-b1dc4a 1035->1046 1047 b1dc3c-b1dc3f 1035->1047 1036->1025 1037->1025 1038->1025 1039->1025 1040->1030 1045 ae4c56-ae4c66 1041->1045 1053 ae4c7d-ae4c87 GetSystemInfo 1042->1053 1054 ae4c32-ae4c3f call ae4c95 1042->1054 1049 ae4bee 1043->1049 1050 b1dc4f-b1dc55 1043->1050 1044->1025 1052 b1dc63-b1dc78 1044->1052 1046->1025 1047->1025 1049->1025 1050->1025 1055 b1dc82-b1dc88 1052->1055 1056 b1dc7a-b1dc7d 1052->1056 1057 ae4c47-ae4c4b 1053->1057 1061 ae4c76-ae4c7b 1054->1061 1062 ae4c41-ae4c45 GetNativeSystemInfo 1054->1062 1055->1025 1056->1025 1057->1045 1059 ae4c4d-ae4c50 FreeLibrary 1057->1059 1059->1045 1061->1062 1062->1057
                                                      APIs
                                                      • GetVersionExW.KERNEL32(?), ref: 00AE4B2B
                                                        • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                                                      • GetCurrentProcess.KERNEL32(?,00B6FAEC,00000000,00000000,?), ref: 00AE4BF8
                                                      • IsWow64Process.KERNEL32(00000000), ref: 00AE4BFF
                                                      • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00AE4C45
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00AE4C50
                                                      • GetSystemInfo.KERNEL32(00000000), ref: 00AE4C81
                                                      • GetSystemInfo.KERNEL32(00000000), ref: 00AE4C8D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                      • String ID:
                                                      • API String ID: 1986165174-0
                                                      • Opcode ID: 2c644495badf0b6f69a1e29bc716d345d43cc11f38f3fb946d89eb621b1abf40
                                                      • Instruction ID: b306ceb8a456f2545113f96d30abebfb87744dd9b294227a45e6c6009b05bc68
                                                      • Opcode Fuzzy Hash: 2c644495badf0b6f69a1e29bc716d345d43cc11f38f3fb946d89eb621b1abf40
                                                      • Instruction Fuzzy Hash: A091E43154A7C0DEC731CB7995512ABBFF8AF6A300B584D9DE0CB93A41D224F948C759

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1063 ae4fe9-ae5001 CreateStreamOnHGlobal 1064 ae5003-ae501a FindResourceExW 1063->1064 1065 ae5021-ae5026 1063->1065 1066 b1dd5c-b1dd6b LoadResource 1064->1066 1067 ae5020 1064->1067 1066->1067 1068 b1dd71-b1dd7f SizeofResource 1066->1068 1067->1065 1068->1067 1069 b1dd85-b1dd90 LockResource 1068->1069 1069->1067 1070 b1dd96-b1ddb4 1069->1070 1070->1067
                                                      APIs
                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00AE4EEE,?,?,00000000,00000000), ref: 00AE4FF9
                                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00AE4EEE,?,?,00000000,00000000), ref: 00AE5010
                                                      • LoadResource.KERNEL32(?,00000000,?,?,00AE4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00AE4F8F), ref: 00B1DD60
                                                      • SizeofResource.KERNEL32(?,00000000,?,?,00AE4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00AE4F8F), ref: 00B1DD75
                                                      • LockResource.KERNEL32(00AE4EEE,?,?,00AE4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00AE4F8F,00000000), ref: 00B1DD88
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                      • String ID: SCRIPT
                                                      • API String ID: 3051347437-3967369404
                                                      • Opcode ID: 4d3c3d6e8abcd4fc1cc4606575e152cafafc8e942378317c62246e35f926808c
                                                      • Instruction ID: 1efaeaaa9df4c95c93e5424176e2a3b6a69304650ede566c6bdc95acc81d3eb9
                                                      • Opcode Fuzzy Hash: 4d3c3d6e8abcd4fc1cc4606575e152cafafc8e942378317c62246e35f926808c
                                                      • Instruction Fuzzy Hash: AF112A75640741AFD7218B6AEC58F677BB9EBC9B55F204168F406D72A0DBA1E8008A60
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(?,00B1E7C1), ref: 00B446A6
                                                      • FindFirstFileW.KERNELBASE(?,?), ref: 00B446B7
                                                      • FindClose.KERNEL32(00000000), ref: 00B446C7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: FileFind$AttributesCloseFirst
                                                      • String ID:
                                                      • API String ID: 48322524-0
                                                      • Opcode ID: f33717810903b23ccd47e840271e9ba916cad8a3058e91a0aad01bad859b0e32
                                                      • Instruction ID: a01893eca31fd70ba8f763629df25bb15301c148dc095277eeaa4f43e180b94d
                                                      • Opcode Fuzzy Hash: f33717810903b23ccd47e840271e9ba916cad8a3058e91a0aad01bad859b0e32
                                                      • Instruction Fuzzy Hash: 02E0D8314104015B42106B38FC4D4FA779CDE06335F100796F835C21E0EBF45A60A999
                                                      APIs
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AF0BBB
                                                      • timeGetTime.WINMM ref: 00AF0E76
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AF0FB3
                                                      • TranslateMessage.USER32(?), ref: 00AF0FC7
                                                      • DispatchMessageW.USER32(?), ref: 00AF0FD5
                                                      • Sleep.KERNEL32(0000000A), ref: 00AF0FDF
                                                      • LockWindowUpdate.USER32(00000000,?,?), ref: 00AF105A
                                                      • DestroyWindow.USER32 ref: 00AF1066
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00AF1080
                                                      • Sleep.KERNEL32(0000000A,?,?), ref: 00B252AD
                                                      • TranslateMessage.USER32(?), ref: 00B2608A
                                                      • DispatchMessageW.USER32(?), ref: 00B26098
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B260AC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                                                      • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                      • API String ID: 4003667617-3242690629
                                                      • Opcode ID: 61dea685fd70fbf6bba37f442334c542e36b9e8eb3f5e71850d3120e64291e95
                                                      • Instruction ID: df7f69e498b230528fa117e4d8e3ae7d2e0e0196f804e5d788768c731ffc4230
                                                      • Opcode Fuzzy Hash: 61dea685fd70fbf6bba37f442334c542e36b9e8eb3f5e71850d3120e64291e95
                                                      • Instruction Fuzzy Hash: CAB2AC70608751DFD738DB24D885BAABBE5FF84304F14499DF58A872A2DB74E844CB82

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00B491E9: __time64.LIBCMT ref: 00B491F3
                                                        • Part of subcall function 00AE5045: _fseek.LIBCMT ref: 00AE505D
                                                      • __wsplitpath.LIBCMT ref: 00B494BE
                                                        • Part of subcall function 00B0432E: __wsplitpath_helper.LIBCMT ref: 00B0436E
                                                      • _wcscpy.LIBCMT ref: 00B494D1
                                                      • _wcscat.LIBCMT ref: 00B494E4
                                                      • __wsplitpath.LIBCMT ref: 00B49509
                                                      • _wcscat.LIBCMT ref: 00B4951F
                                                      • _wcscat.LIBCMT ref: 00B49532
                                                        • Part of subcall function 00B4922F: _memmove.LIBCMT ref: 00B49268
                                                        • Part of subcall function 00B4922F: _memmove.LIBCMT ref: 00B49277
                                                      • _wcscmp.LIBCMT ref: 00B49479
                                                        • Part of subcall function 00B499BE: _wcscmp.LIBCMT ref: 00B49AAE
                                                        • Part of subcall function 00B499BE: _wcscmp.LIBCMT ref: 00B49AC1
                                                      • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00B496DC
                                                      • _wcsncpy.LIBCMT ref: 00B4974F
                                                      • DeleteFileW.KERNEL32(?,?), ref: 00B49785
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00B4979B
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B497AC
                                                      • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B497BE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                      • String ID:
                                                      • API String ID: 1500180987-0
                                                      • Opcode ID: 06fcde29e83cac97259dda4b42df02a2279e19f741702f7ba817bac1d6d412d9
                                                      • Instruction ID: 62a9b54801b8c6903e1b67dbfc32ca74416fd69295888e6527573d6eb83c3378
                                                      • Opcode Fuzzy Hash: 06fcde29e83cac97259dda4b42df02a2279e19f741702f7ba817bac1d6d412d9
                                                      • Instruction Fuzzy Hash: 9CC128B1D00229AEDF21DFA5CD85ADFBBBDEF44304F0040AAF609E6151DB709A849F65

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00AE3074
                                                      • RegisterClassExW.USER32(00000030), ref: 00AE309E
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AE30AF
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00AE30CC
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AE30DC
                                                      • LoadIconW.USER32(000000A9), ref: 00AE30F2
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AE3101
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-1005189915
                                                      • Opcode ID: a407fa877b9cc8cb200a1e0aad7c664c8e77afa0e236e8a9cfd0d7842575fbd2
                                                      • Instruction ID: cb1639e5e73f78303296d3910f70fc6dc19f1fb34b3d34941bdc2596e04e5183
                                                      • Opcode Fuzzy Hash: a407fa877b9cc8cb200a1e0aad7c664c8e77afa0e236e8a9cfd0d7842575fbd2
                                                      • Instruction Fuzzy Hash: 0E3149B184430AAFDB40CFA4EC85AD9BBF4FB09310F14456AE590E72A0DBB94585CF90

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00AE3074
                                                      • RegisterClassExW.USER32(00000030), ref: 00AE309E
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AE30AF
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00AE30CC
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AE30DC
                                                      • LoadIconW.USER32(000000A9), ref: 00AE30F2
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AE3101
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-1005189915
                                                      • Opcode ID: b982f4324f2caab1612db1e7838ced15e89f07631f0bebbb7d6db0afb9a2241d
                                                      • Instruction ID: 3fbe224ed6a060633ae53ed8ead6c64317253c115442da12921ea22679480b51
                                                      • Opcode Fuzzy Hash: b982f4324f2caab1612db1e7838ced15e89f07631f0bebbb7d6db0afb9a2241d
                                                      • Instruction Fuzzy Hash: FC21C5B1D01219AFDB00DFA4EC49BADBBF8FB09700F04412AF510A72A0DBB945448F91

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00AE4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00BA62F8,?,00AE37C0,?), ref: 00AE4882
                                                        • Part of subcall function 00B0074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00AE72C5), ref: 00B00771
                                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00AE7308
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00B1ECF1
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00B1ED32
                                                      • RegCloseKey.ADVAPI32(?), ref: 00B1ED70
                                                      • _wcscat.LIBCMT ref: 00B1EDC9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                      • API String ID: 2673923337-2727554177
                                                      • Opcode ID: b2b3f2e6c44fc9253992dc08b83d31c8a63c854acf196e7d60461fd7b284f159
                                                      • Instruction ID: 1ece123bc27126dc49425729f11dafb193e593ebb6359b7b8d3aa8ec86ea1fc5
                                                      • Opcode Fuzzy Hash: b2b3f2e6c44fc9253992dc08b83d31c8a63c854acf196e7d60461fd7b284f159
                                                      • Instruction Fuzzy Hash: 89714A7254C3419EC314EF66EC86AABBBE8FF9A340F40446EF455871A1EF709948CB51

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00AE3A62
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00AE3A71
                                                      • LoadIconW.USER32(00000063), ref: 00AE3A88
                                                      • LoadIconW.USER32(000000A4), ref: 00AE3A9A
                                                      • LoadIconW.USER32(000000A2), ref: 00AE3AAC
                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00AE3AD2
                                                      • RegisterClassExW.USER32(?), ref: 00AE3B28
                                                        • Part of subcall function 00AE3041: GetSysColorBrush.USER32(0000000F), ref: 00AE3074
                                                        • Part of subcall function 00AE3041: RegisterClassExW.USER32(00000030), ref: 00AE309E
                                                        • Part of subcall function 00AE3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AE30AF
                                                        • Part of subcall function 00AE3041: InitCommonControlsEx.COMCTL32(?), ref: 00AE30CC
                                                        • Part of subcall function 00AE3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AE30DC
                                                        • Part of subcall function 00AE3041: LoadIconW.USER32(000000A9), ref: 00AE30F2
                                                        • Part of subcall function 00AE3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AE3101
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                      • String ID: #$0$AutoIt v3
                                                      • API String ID: 423443420-4155596026
                                                      • Opcode ID: d03bb6e96dd0b6263990b0b1aa3c3ecb5ddafc3413375c427970c1acaeb269ab
                                                      • Instruction ID: 45ef3f40d9bef6863bb1bd6355e4d42e79d3f418ab4ca6c217a5074082fb6701
                                                      • Opcode Fuzzy Hash: d03bb6e96dd0b6263990b0b1aa3c3ecb5ddafc3413375c427970c1acaeb269ab
                                                      • Instruction Fuzzy Hash: 06215EB1D00305AFEB149FA5EC0ABAD7BB4FB09711F040129F504A72E0DBBA59549F84

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 767 ae3633-ae3681 769 ae3683-ae3686 767->769 770 ae36e1-ae36e3 767->770 772 ae3688-ae368f 769->772 773 ae36e7 769->773 770->769 771 ae36e5 770->771 774 ae36ca-ae36d2 DefWindowProcW 771->774 777 ae375d-ae3765 PostQuitMessage 772->777 778 ae3695-ae369a 772->778 775 ae36ed-ae36f0 773->775 776 b1d31c-b1d34a call af11d0 call af11f3 773->776 780 ae36d8-ae36de 774->780 782 ae3715-ae373c SetTimer RegisterWindowMessageW 775->782 783 ae36f2-ae36f3 775->783 811 b1d34f-b1d356 776->811 781 ae3711-ae3713 777->781 784 b1d38f-b1d3a3 call b42a16 778->784 785 ae36a0-ae36a2 778->785 781->780 782->781 786 ae373e-ae3749 CreatePopupMenu 782->786 791 ae36f9-ae370c KillTimer call ae44cb call ae3114 783->791 792 b1d2bf-b1d2c2 783->792 784->781 803 b1d3a9 784->803 787 ae36a8-ae36ad 785->787 788 ae3767-ae3776 call ae4531 785->788 786->781 793 b1d374-b1d37b 787->793 794 ae36b3-ae36b8 787->794 788->781 791->781 798 b1d2c4-b1d2c6 792->798 799 b1d2f8-b1d317 MoveWindow 792->799 793->774 809 b1d381-b1d38a call b3817e 793->809 801 ae36be-ae36c4 794->801 802 ae374b-ae375b call ae45df 794->802 806 b1d2e7-b1d2f3 SetFocus 798->806 807 b1d2c8-b1d2cb 798->807 799->781 801->774 801->811 802->781 803->774 806->781 807->801 812 b1d2d1-b1d2e2 call af11d0 807->812 809->774 811->774 816 b1d35c-b1d36f call ae44cb call ae43db 811->816 812->781 816->774
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?), ref: 00AE36D2
                                                      • KillTimer.USER32(?,00000001), ref: 00AE36FC
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00AE371F
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AE372A
                                                      • CreatePopupMenu.USER32 ref: 00AE373E
                                                      • PostQuitMessage.USER32(00000000), ref: 00AE375F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                      • String ID: TaskbarCreated
                                                      • API String ID: 129472671-2362178303
                                                      • Opcode ID: 5b629f42794f22481a4afe42e524c653024220b83ea38ab7455d3b67028c417f
                                                      • Instruction ID: cf9344fb3cf363c9be94581576fd880f438f07ce31ae81ae4b7cc24b8e451a18
                                                      • Opcode Fuzzy Hash: 5b629f42794f22481a4afe42e524c653024220b83ea38ab7455d3b67028c417f
                                                      • Instruction Fuzzy Hash: 4F412AF3204285BBDF149F75EC0EB7E37A8EB05300F180129F612872E1DEA59E509765

                                                      Control-flow Graph

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                      • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                                      • API String ID: 1825951767-3513169116
                                                      • Opcode ID: f17b4abfd9a5beb1a95489981d64f0f54e761f9777e6624383c79f76a1eb7077
                                                      • Instruction ID: 5b101cd57a193264afaab47536d287f5ec973032bdbbe4806a2798c24748d7ed
                                                      • Opcode Fuzzy Hash: f17b4abfd9a5beb1a95489981d64f0f54e761f9777e6624383c79f76a1eb7077
                                                      • Instruction Fuzzy Hash: 3BA151B2C102699ACF04EFA6DD95EEEB7B8BF14300F440569F416B7191EF745A09CB60

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 942 136b268-136b316 call 1368c78 945 136b31d-136b343 call 136c178 CreateFileW 942->945 948 136b345 945->948 949 136b34a-136b35a 945->949 950 136b495-136b499 948->950 954 136b361-136b37b VirtualAlloc 949->954 955 136b35c 949->955 952 136b4db-136b4de 950->952 953 136b49b-136b49f 950->953 956 136b4e1-136b4e8 952->956 957 136b4a1-136b4a4 953->957 958 136b4ab-136b4af 953->958 959 136b382-136b399 ReadFile 954->959 960 136b37d 954->960 955->950 961 136b53d-136b552 956->961 962 136b4ea-136b4f5 956->962 957->958 963 136b4b1-136b4bb 958->963 964 136b4bf-136b4c3 958->964 969 136b3a0-136b3e0 VirtualAlloc 959->969 970 136b39b 959->970 960->950 965 136b554-136b55f VirtualFree 961->965 966 136b562-136b56a 961->966 971 136b4f7 962->971 972 136b4f9-136b505 962->972 963->964 967 136b4c5-136b4cf 964->967 968 136b4d3 964->968 965->966 967->968 968->952 973 136b3e7-136b402 call 136c3c8 969->973 974 136b3e2 969->974 970->950 971->961 975 136b507-136b517 972->975 976 136b519-136b525 972->976 982 136b40d-136b417 973->982 974->950 978 136b53b 975->978 979 136b527-136b530 976->979 980 136b532-136b538 976->980 978->956 979->978 980->978 983 136b44a-136b45e call 136c1d8 982->983 984 136b419-136b448 call 136c3c8 982->984 990 136b462-136b466 983->990 991 136b460 983->991 984->982 992 136b472-136b476 990->992 993 136b468-136b46c CloseHandle 990->993 991->950 994 136b486-136b48f 992->994 995 136b478-136b483 VirtualFree 992->995 993->992 994->945 994->950 995->994
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0136B339
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0136B55F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1698283062.0000000001368000.00000040.00000020.00020000.00000000.sdmp, Offset: 01368000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1368000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CreateFileFreeVirtual
                                                      • String ID:
                                                      • API String ID: 204039940-0
                                                      • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                      • Instruction ID: 6b34d614187a65311435b09c72229dece69df9a2123ccbf46313baaac2404a89
                                                      • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                      • Instruction Fuzzy Hash: 6EA1F870E00209EBDB14CFA4C894BEEFBB9BF48309F208559E605BB289D7759A41CF55

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1073 ae39e7-ae3a57 CreateWindowExW * 2 ShowWindow * 2
                                                      APIs
                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00AE3A15
                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00AE3A36
                                                      • ShowWindow.USER32(00000000,?,?), ref: 00AE3A4A
                                                      • ShowWindow.USER32(00000000,?,?), ref: 00AE3A53
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateShow
                                                      • String ID: AutoIt v3$edit
                                                      • API String ID: 1584632944-3779509399
                                                      • Opcode ID: 070fb7670884fcf7f909935987cf392759704de4df585b88d7daa2be79ac23f4
                                                      • Instruction ID: 7ea3b6dd881b4355be674c34c0ee8e554147336f83d2310a5cbe1ffa0ec606e4
                                                      • Opcode Fuzzy Hash: 070fb7670884fcf7f909935987cf392759704de4df585b88d7daa2be79ac23f4
                                                      • Instruction Fuzzy Hash: BAF0DAB16413907EEA315B677C4AF772F7DE7C7F50B04412AB904E31B0CAA91851DAB0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1074 136b028-136b162 call 1368c78 call 136af18 CreateFileW 1081 136b164 1074->1081 1082 136b169-136b179 1074->1082 1083 136b219-136b21e 1081->1083 1085 136b180-136b19a VirtualAlloc 1082->1085 1086 136b17b 1082->1086 1087 136b19e-136b1b5 ReadFile 1085->1087 1088 136b19c 1085->1088 1086->1083 1089 136b1b7 1087->1089 1090 136b1b9-136b1f3 call 136af58 call 1369f18 1087->1090 1088->1083 1089->1083 1095 136b1f5-136b20a call 136afa8 1090->1095 1096 136b20f-136b217 ExitProcess 1090->1096 1095->1096 1096->1083
                                                      APIs
                                                        • Part of subcall function 0136AF18: Sleep.KERNELBASE(000001F4), ref: 0136AF29
                                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0136B158
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1698283062.0000000001368000.00000040.00000020.00020000.00000000.sdmp, Offset: 01368000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1368000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CreateFileSleep
                                                      • String ID: VZJNCZBAVU1IDSY03NH33Q
                                                      • API String ID: 2694422964-2900533316
                                                      • Opcode ID: bd501cac51cb61e025e970eeef2770f9fdb914403e7a59566dfcf3a52e4709d5
                                                      • Instruction ID: 99c87146bc5dc1a272a89c5ebf61dbfbaf69d2f26fefc7483f611c94488cae21
                                                      • Opcode Fuzzy Hash: bd501cac51cb61e025e970eeef2770f9fdb914403e7a59566dfcf3a52e4709d5
                                                      • Instruction Fuzzy Hash: 4A518670E0424CEBEF11DBA8C854BDEBBB8AF15304F044199E248BB2C5D6B91B45CBA5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1098 ae410d-ae4123 1099 ae4129-ae413e call ae7b76 1098->1099 1100 ae4200-ae4204 1098->1100 1103 ae4144-ae4164 call ae7d2c 1099->1103 1104 b1d5dd-b1d5ec LoadStringW 1099->1104 1106 b1d5f7-b1d60f call ae7c8e call ae7143 1103->1106 1108 ae416a-ae416e 1103->1108 1104->1106 1116 ae417e-ae41fb call b03020 call ae463e call b02ffc Shell_NotifyIconW call ae5a64 1106->1116 1120 b1d615-b1d633 call ae7e0b call ae7143 call ae7e0b 1106->1120 1110 ae4174-ae4179 call ae7c8e 1108->1110 1111 ae4205-ae420e call ae81a7 1108->1111 1110->1116 1111->1116 1116->1100 1120->1116
                                                      APIs
                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00B1D5EC
                                                        • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                                                      • _memset.LIBCMT ref: 00AE418D
                                                      • _wcscpy.LIBCMT ref: 00AE41E1
                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00AE41F1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                      • String ID: Line:
                                                      • API String ID: 3942752672-1585850449
                                                      • Opcode ID: f001840f4b771b0769eb123263b38d726c71be0ebcadca88d1bddfd8655f6f69
                                                      • Instruction ID: 31dc9c11c0470bcf4bb9e9f45b157daf92640aee04aaa00483feed44b331dbeb
                                                      • Opcode Fuzzy Hash: f001840f4b771b0769eb123263b38d726c71be0ebcadca88d1bddfd8655f6f69
                                                      • Instruction Fuzzy Hash: 1B31E0B1008385AAD721EB61DD46FEF77ECAF59300F14461EF185930A1EF74AA48CB92

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1133 b0564d-b05666 1134 b05683 1133->1134 1135 b05668-b0566d 1133->1135 1137 b05685-b0568b 1134->1137 1135->1134 1136 b0566f-b05671 1135->1136 1138 b05673-b05678 call b08d68 1136->1138 1139 b0568c-b05691 1136->1139 1151 b0567e call b08ff6 1138->1151 1141 b05693-b0569d 1139->1141 1142 b0569f-b056a3 1139->1142 1141->1142 1144 b056c3-b056d2 1141->1144 1145 b056b3-b056b5 1142->1145 1146 b056a5-b056b0 call b03020 1142->1146 1149 b056d4-b056d7 1144->1149 1150 b056d9 1144->1150 1145->1138 1148 b056b7-b056c1 1145->1148 1146->1145 1148->1138 1148->1144 1153 b056de-b056e3 1149->1153 1150->1153 1151->1134 1155 b056e9-b056f0 1153->1155 1156 b057cc-b057cf 1153->1156 1157 b05731-b05733 1155->1157 1158 b056f2-b056fa 1155->1158 1156->1137 1159 b05735-b05737 1157->1159 1160 b0579d-b0579e call b10df7 1157->1160 1158->1157 1161 b056fc 1158->1161 1162 b05739-b05741 1159->1162 1163 b0575b-b05766 1159->1163 1170 b057a3-b057a7 1160->1170 1165 b05702-b05704 1161->1165 1166 b057fa 1161->1166 1168 b05751-b05755 1162->1168 1169 b05743-b0574f 1162->1169 1171 b05768 1163->1171 1172 b0576a-b0576d 1163->1172 1173 b05706-b05708 1165->1173 1174 b0570b-b05710 1165->1174 1167 b057fe-b05807 1166->1167 1167->1137 1175 b05757-b05759 1168->1175 1169->1175 1170->1167 1176 b057a9-b057ae 1170->1176 1171->1172 1177 b057d4-b057d8 1172->1177 1178 b0576f-b0577b call b04916 call b110ab 1172->1178 1173->1174 1174->1177 1179 b05716-b0572f call b10f18 1174->1179 1175->1172 1176->1177 1180 b057b0-b057c1 1176->1180 1181 b057ea-b057f5 call b08d68 1177->1181 1182 b057da-b057e7 call b03020 1177->1182 1194 b05780-b05785 1178->1194 1190 b05792-b0579b 1179->1190 1186 b057c4-b057c6 1180->1186 1181->1151 1182->1181 1186->1155 1186->1156 1190->1186 1195 b0578b-b0578e 1194->1195 1196 b0580c-b05810 1194->1196 1195->1166 1197 b05790 1195->1197 1196->1167 1197->1190
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                      • String ID:
                                                      • API String ID: 1559183368-0
                                                      • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                                      • Instruction ID: 73eee4d5567ce86c4afb21f56c771010cc6aac9564621d55a4b7618a692be49f
                                                      • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                                                      • Instruction Fuzzy Hash: 06519070A00B05DFDB349FA988846AF7FE5EF40320F6487A9E82596AD0D7719E50AF50
                                                      APIs
                                                        • Part of subcall function 00AE4F3D: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00BA62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AE4F6F
                                                      • _free.LIBCMT ref: 00B1E68C
                                                      • _free.LIBCMT ref: 00B1E6D3
                                                        • Part of subcall function 00AE6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00AE6D0D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _free$CurrentDirectoryLibraryLoad
                                                      • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                      • API String ID: 2861923089-1757145024
                                                      • Opcode ID: 0aa6c94e1710c8d04648e7e2f287aac7bb40e74922607dcd43afd5cd02e8d621
                                                      • Instruction ID: 2c6eaff6341afb2c9f458208abba8f064a9fba5107d67199de9ca6fa7c155ca3
                                                      • Opcode Fuzzy Hash: 0aa6c94e1710c8d04648e7e2f287aac7bb40e74922607dcd43afd5cd02e8d621
                                                      • Instruction Fuzzy Hash: 7C918B71910259AFCF04EFA5C8919EDB7F5FF18304F9444A9F825AB2A1EB30E944CB60
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00AE35A1,SwapMouseButtons,00000004,?), ref: 00AE35D4
                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00AE35A1,SwapMouseButtons,00000004,?,?,?,?,00AE2754), ref: 00AE35F5
                                                      • RegCloseKey.KERNELBASE(00000000,?,?,00AE35A1,SwapMouseButtons,00000004,?,?,?,?,00AE2754), ref: 00AE3617
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: Control Panel\Mouse
                                                      • API String ID: 3677997916-824357125
                                                      • Opcode ID: df49339bf0552b108dad3ca6d14160eb473777c58562198b236f4ff56d64b9d2
                                                      • Instruction ID: 7f180973ee4e6fd5c389944c6f3b33d4798c8b6d3430d9cfa6c3ed94fcf9d5e5
                                                      • Opcode Fuzzy Hash: df49339bf0552b108dad3ca6d14160eb473777c58562198b236f4ff56d64b9d2
                                                      • Instruction Fuzzy Hash: FB114872510248BFDF20CFA9EC489BFB7B8EF05740F018469E805D7210D6719E409760
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 0136A745
                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0136A769
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0136A78B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1698283062.0000000001368000.00000040.00000020.00020000.00000000.sdmp, Offset: 01368000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1368000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                      • String ID:
                                                      • API String ID: 2438371351-0
                                                      • Opcode ID: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                                                      • Instruction ID: 17fe5090fd403f87d24d3ebdae9f5153044593cff3aa231546e8a6a469cd33fc
                                                      • Opcode Fuzzy Hash: 91de96a0508c6d9b88b93d6c14255c09b3dee72855056c89e06ebe7f8a996ab2
                                                      • Instruction Fuzzy Hash: 68620B30A14258DBEB24CFA4C840BEEB776EF58304F1091A9D10DEB394E7799E85CB59
                                                      APIs
                                                        • Part of subcall function 00AE5045: _fseek.LIBCMT ref: 00AE505D
                                                        • Part of subcall function 00B499BE: _wcscmp.LIBCMT ref: 00B49AAE
                                                        • Part of subcall function 00B499BE: _wcscmp.LIBCMT ref: 00B49AC1
                                                      • _free.LIBCMT ref: 00B4992C
                                                      • _free.LIBCMT ref: 00B49933
                                                      • _free.LIBCMT ref: 00B4999E
                                                        • Part of subcall function 00B02F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00B09C64), ref: 00B02FA9
                                                        • Part of subcall function 00B02F95: GetLastError.KERNEL32(00000000,?,00B09C64), ref: 00B02FBB
                                                      • _free.LIBCMT ref: 00B499A6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                      • String ID:
                                                      • API String ID: 1552873950-0
                                                      • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                                      • Instruction ID: b1a9a0573c6e6c92314845dc9f10e70aa8111011c662c37dcf4f2afb2713f64c
                                                      • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                                      • Instruction Fuzzy Hash: ED515BB1D04258AFDF249F65DC85A9EBBB9EF48314F1004EEB609A7281DB715E80CF58
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                      • String ID:
                                                      • API String ID: 2782032738-0
                                                      • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                                      • Instruction ID: 057c52fb1c7e432d11fee0286921f3eab756d6e834edeb4d478c8e1f16b2ab96
                                                      • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                                      • Instruction Fuzzy Hash: B24195B17406059FDF288EA9C88096F7FE5EF84360B2485BDEA55C76D0D7709D418744
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B1EE62
                                                      • GetOpenFileNameW.COMDLG32(?), ref: 00B1EEAC
                                                        • Part of subcall function 00AE48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AE48A1,?,?,00AE37C0,?), ref: 00AE48CE
                                                        • Part of subcall function 00B009D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B009F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Name$Path$FileFullLongOpen_memset
                                                      • String ID: X
                                                      • API String ID: 3777226403-3081909835
                                                      • Opcode ID: 27f8d465b698cd1058369670b8b653d0b0d5cc72aa5d8b0b4dddc64fd67e9a27
                                                      • Instruction ID: 0900ca2248ba694d1bf0705a4ded92290b4462aae4c875232d9e7462328824bb
                                                      • Opcode Fuzzy Hash: 27f8d465b698cd1058369670b8b653d0b0d5cc72aa5d8b0b4dddc64fd67e9a27
                                                      • Instruction Fuzzy Hash: 3E21D571A142989BDF51DF98CC45BEEBBFC9F49700F00405AE408E7281DBB499898FA1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock_memmove
                                                      • String ID: EA06
                                                      • API String ID: 1988441806-3962188686
                                                      • Opcode ID: 06343a615181abf98cabf92d070345fb6c3de55771e28ca5d7e38b4d8ea06b8d
                                                      • Instruction ID: 602ecc4bb0bb5539b3e1016f4654084cd2ddd096f2785dafc2340cb694053b93
                                                      • Opcode Fuzzy Hash: 06343a615181abf98cabf92d070345fb6c3de55771e28ca5d7e38b4d8ea06b8d
                                                      • Instruction Fuzzy Hash: 7901F971804218AEDB28C6A8C856EEE7FFCDB01301F0041DAF592D22C1E575A7089BA0
                                                      APIs
                                                      • GetTempPathW.KERNEL32(00000104,?), ref: 00B49B82
                                                      • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00B49B99
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Temp$FileNamePath
                                                      • String ID: aut
                                                      • API String ID: 3285503233-3010740371
                                                      • Opcode ID: 11547f1e147753d0ad63e37aaa59bdd8d08b3c9bcd783d9da385151ecd834b91
                                                      • Instruction ID: fa4b090a0a23748c2ef20b4db966cc96a35ef53419150690f74dd2b7f6739b37
                                                      • Opcode Fuzzy Hash: 11547f1e147753d0ad63e37aaa59bdd8d08b3c9bcd783d9da385151ecd834b91
                                                      • Instruction Fuzzy Hash: E7D05E7A94030EABDB109B90EC0EFAA776CE704704F0042B1FE54921E1DEF455988FD1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dffaa441c12ea4401850c627dca6e9d0fd98d2890a83c8c313816966db5ff3db
                                                      • Instruction ID: f0d7f7a0259d12360a79048df1a66280a05efc087abb178d55a6c8479126ec16
                                                      • Opcode Fuzzy Hash: dffaa441c12ea4401850c627dca6e9d0fd98d2890a83c8c313816966db5ff3db
                                                      • Instruction Fuzzy Hash: 51F16C706083419FC724DF28C584A6ABBE5FF88314F1489ADF8999B351D771E94ACF82
                                                      APIs
                                                        • Part of subcall function 00B003A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B003D3
                                                        • Part of subcall function 00B003A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00B003DB
                                                        • Part of subcall function 00B003A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B003E6
                                                        • Part of subcall function 00B003A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B003F1
                                                        • Part of subcall function 00B003A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00B003F9
                                                        • Part of subcall function 00B003A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00B00401
                                                        • Part of subcall function 00AF6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00AEFA90), ref: 00AF62B4
                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00AEFB2D
                                                      • OleInitialize.OLE32(00000000), ref: 00AEFBAA
                                                      • CloseHandle.KERNEL32(00000000), ref: 00B249F2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                      • String ID:
                                                      • API String ID: 1986988660-0
                                                      • Opcode ID: 4af8db771598cdc56d0352e7f117e8f46a10feab5dee61fcf061b363be371922
                                                      • Instruction ID: 2622542b2318b1ca1ec113c483d9028663aa88263f06bca4703d25b300262662
                                                      • Opcode Fuzzy Hash: 4af8db771598cdc56d0352e7f117e8f46a10feab5dee61fcf061b363be371922
                                                      • Instruction Fuzzy Hash: F881B9F19182808ECB84DF7AE9566297BE4FB5E30871885BAD429C73A2EF754805CF14
                                                      APIs
                                                      • _memset.LIBCMT ref: 00AE4401
                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AE44A6
                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00AE44C3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_$_memset
                                                      • String ID:
                                                      • API String ID: 1505330794-0
                                                      • Opcode ID: d294c9fc318853a644162f26fb95a83ef57e702c37e9827e342578e1574dfde1
                                                      • Instruction ID: f00d505dd7d1d95b93f39c05f2b41e88216b8485db7fa4b8942f5dfe9ce3f740
                                                      • Opcode Fuzzy Hash: d294c9fc318853a644162f26fb95a83ef57e702c37e9827e342578e1574dfde1
                                                      • Instruction Fuzzy Hash: 963171B06057418FD721DF25D88579BBBF8FB49304F04092EF59A83291EBB5A944CB92
                                                      APIs
                                                      • __FF_MSGBANNER.LIBCMT ref: 00B05963
                                                        • Part of subcall function 00B0A3AB: __NMSG_WRITE.LIBCMT ref: 00B0A3D2
                                                        • Part of subcall function 00B0A3AB: __NMSG_WRITE.LIBCMT ref: 00B0A3DC
                                                      • __NMSG_WRITE.LIBCMT ref: 00B0596A
                                                        • Part of subcall function 00B0A408: GetModuleFileNameW.KERNEL32(00000000,00BA43BA,00000104,?,00000001,00000000), ref: 00B0A49A
                                                        • Part of subcall function 00B0A408: ___crtMessageBoxW.LIBCMT ref: 00B0A548
                                                        • Part of subcall function 00B032DF: ___crtCorExitProcess.LIBCMT ref: 00B032E5
                                                        • Part of subcall function 00B032DF: ExitProcess.KERNEL32 ref: 00B032EE
                                                        • Part of subcall function 00B08D68: __getptd_noexit.LIBCMT ref: 00B08D68
                                                      • RtlAllocateHeap.NTDLL(01190000,00000000,00000001,00000000,?,?,?,00B01013,?), ref: 00B0598F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 1372826849-0
                                                      • Opcode ID: 5c86b3daef0f98fcd50b2782eadf7ea490607570d7502fc431815289ae177105
                                                      • Instruction ID: f15a6ed3be977e3dfcfc1aa71916e63d1456896a6cddcf97c6fcfa5a1ee86e07
                                                      • Opcode Fuzzy Hash: 5c86b3daef0f98fcd50b2782eadf7ea490607570d7502fc431815289ae177105
                                                      • Instruction Fuzzy Hash: 8A01B535200B15EEE6352B64EC46B7F7EC8DF92B70F1002BAF541AB5D1DEB09D019A64
                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00B497D2,?,?,?,?,?,00000004), ref: 00B49B45
                                                      • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00B497D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00B49B5B
                                                      • CloseHandle.KERNEL32(00000000,?,00B497D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00B49B62
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleTime
                                                      • String ID:
                                                      • API String ID: 3397143404-0
                                                      • Opcode ID: fcc10253b81fc6af7f5bcbce69c9fe42f92052986624d7445c1cb93fee337bd9
                                                      • Instruction ID: 75e87daaec57db002d64890e33ac96aef9939c36845a9e51273e119d574d3e0b
                                                      • Opcode Fuzzy Hash: fcc10253b81fc6af7f5bcbce69c9fe42f92052986624d7445c1cb93fee337bd9
                                                      • Instruction Fuzzy Hash: B0E08632181215B7D7211B54FC09FDA7B58EB067A1F104120FB547A0E08BF52A119798
                                                      APIs
                                                      • _free.LIBCMT ref: 00B48FA5
                                                        • Part of subcall function 00B02F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00B09C64), ref: 00B02FA9
                                                        • Part of subcall function 00B02F95: GetLastError.KERNEL32(00000000,?,00B09C64), ref: 00B02FBB
                                                      • _free.LIBCMT ref: 00B48FB6
                                                      • _free.LIBCMT ref: 00B48FC8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                                      • Instruction ID: fda0399ba627250473bd4eb6ce9f83f7fed11a028c85b11cedc8957baa952b4c
                                                      • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                                      • Instruction Fuzzy Hash: B1E02BB170C7024BCA20A738AD05E871BFE9F48390B080C8DB409DB1C2DF20FD489034
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CALL
                                                      • API String ID: 0-4196123274
                                                      • Opcode ID: 3fc6c72920c4784b940b1301b96319f0a903922e6e474b752b95cb1f135661bd
                                                      • Instruction ID: 61b36e7055948c7cfdb6b81775b51d36e27bf9f06c7578f83ac31e32fe36b451
                                                      • Opcode Fuzzy Hash: 3fc6c72920c4784b940b1301b96319f0a903922e6e474b752b95cb1f135661bd
                                                      • Instruction Fuzzy Hash: 6A2237705182919FC724DF15C594B6ABBF1FF94300F1489ADE89A8B362DB31ED85CB82
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: EA06
                                                      • API String ID: 4104443479-3962188686
                                                      • Opcode ID: 076b999b690040d23ff638434448dc21a75508ae146122795fde88d44bda8725
                                                      • Instruction ID: c37a40dcd93f50fac120847e05d0c5fc9ecb743979cf7f154791b8ad301dfa3e
                                                      • Opcode Fuzzy Hash: 076b999b690040d23ff638434448dc21a75508ae146122795fde88d44bda8725
                                                      • Instruction Fuzzy Hash: 69416D32A041D45BCF255F6699517FE7FBEEF0D300F6844B5F882AB282C6219D8483E1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID:
                                                      • API String ID: 4104443479-0
                                                      • Opcode ID: 888ce228c65e5e126e2c0d83d6bef63a0f4650b727a1fb86e52d4496ebb79edc
                                                      • Instruction ID: 714c1dab556ea7b2e1e0326751076a0ffec7d502b66359f68bd432e707629e59
                                                      • Opcode Fuzzy Hash: 888ce228c65e5e126e2c0d83d6bef63a0f4650b727a1fb86e52d4496ebb79edc
                                                      • Instruction Fuzzy Hash: 5231C2B1604546AFC714DF29D8D1E6DB7E9FF883107258629E915CB291EB30EC50CB90
                                                      APIs
                                                      • IsThemeActive.UXTHEME ref: 00AE4992
                                                        • Part of subcall function 00B035AC: __lock.LIBCMT ref: 00B035B2
                                                        • Part of subcall function 00B035AC: DecodePointer.KERNEL32(00000001,?,00AE49A7,00B381BC), ref: 00B035BE
                                                        • Part of subcall function 00B035AC: EncodePointer.KERNEL32(?,?,00AE49A7,00B381BC), ref: 00B035C9
                                                        • Part of subcall function 00AE4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00AE4A73
                                                        • Part of subcall function 00AE4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00AE4A88
                                                        • Part of subcall function 00AE3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AE3B7A
                                                        • Part of subcall function 00AE3B4C: IsDebuggerPresent.KERNEL32 ref: 00AE3B8C
                                                        • Part of subcall function 00AE3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00BA62F8,00BA62E0,?,?), ref: 00AE3BFD
                                                        • Part of subcall function 00AE3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00AE3C81
                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00AE49D2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                      • String ID:
                                                      • API String ID: 1438897964-0
                                                      • Opcode ID: da0c36b01251602c09c71499d6d1ea18ffaea3e5aa412e6f3222a867c3be5b15
                                                      • Instruction ID: 9b8c58bd33db170d64dedd1cccec2bacfaa1fc8419e22084c9078ce7ea5b1815
                                                      • Opcode Fuzzy Hash: da0c36b01251602c09c71499d6d1ea18ffaea3e5aa412e6f3222a867c3be5b15
                                                      • Instruction Fuzzy Hash: 18118CB19083519BC700EF2AED0691ABFE8EF99750F00452EF055972B1DFB09945CB92
                                                      APIs
                                                        • Part of subcall function 00B0594C: __FF_MSGBANNER.LIBCMT ref: 00B05963
                                                        • Part of subcall function 00B0594C: __NMSG_WRITE.LIBCMT ref: 00B0596A
                                                        • Part of subcall function 00B0594C: RtlAllocateHeap.NTDLL(01190000,00000000,00000001,00000000,?,?,?,00B01013,?), ref: 00B0598F
                                                      • std::exception::exception.LIBCMT ref: 00B0102C
                                                      • __CxxThrowException@8.LIBCMT ref: 00B01041
                                                        • Part of subcall function 00B087DB: RaiseException.KERNEL32(?,?,?,00B9BAF8,00000000,?,?,?,?,00B01046,?,00B9BAF8,?,00000001), ref: 00B08830
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 3902256705-0
                                                      • Opcode ID: 51fb3ff32fe7c665ac89d34f8c530fbbd0660e1071d7aa391c3f20da4d442500
                                                      • Instruction ID: d51b021e6437e6b416d6ddb8c76de67476d6be99249ab5e7b4cf40b8cf582795
                                                      • Opcode Fuzzy Hash: 51fb3ff32fe7c665ac89d34f8c530fbbd0660e1071d7aa391c3f20da4d442500
                                                      • Instruction Fuzzy Hash: 3EF08135500219A6CB25AB58ED069DF7FECDF00360F1044E5F898966E1EFB19A809691
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __lock_file_memset
                                                      • String ID:
                                                      • API String ID: 26237723-0
                                                      • Opcode ID: 59aca6475a3d52599fe88dabf66e2a3342f56b387437eb3b69129e022383f927
                                                      • Instruction ID: fbb8bdbf8ceff23ce54c4f0da48b4784586d6401043e48bc972a6364b3ca3c37
                                                      • Opcode Fuzzy Hash: 59aca6475a3d52599fe88dabf66e2a3342f56b387437eb3b69129e022383f927
                                                      • Instruction Fuzzy Hash: 78017171800B09EBCF22AF698C0599F7FE5AF40360F14C2A5B8145A1E1EB31CA21DF91
                                                      APIs
                                                        • Part of subcall function 00B08D68: __getptd_noexit.LIBCMT ref: 00B08D68
                                                      • __lock_file.LIBCMT ref: 00B0561B
                                                        • Part of subcall function 00B06E4E: __lock.LIBCMT ref: 00B06E71
                                                      • __fclose_nolock.LIBCMT ref: 00B05626
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                      • String ID:
                                                      • API String ID: 2800547568-0
                                                      • Opcode ID: f3dae88c46c6c9847b8ccfe0fe856e16854a96839cfb3f86bd2e0e47dcb7925d
                                                      • Instruction ID: dcfa9fe024553dc70d0dcefb75957943bcd486d5e07cb922e0b1a38919cb04ca
                                                      • Opcode Fuzzy Hash: f3dae88c46c6c9847b8ccfe0fe856e16854a96839cfb3f86bd2e0e47dcb7925d
                                                      • Instruction Fuzzy Hash: F0F09A71801A059ADB30AF798802B6F7FE1AF40334F6582C9A465AB5C2CF7D8A019F65
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 0136A745
                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0136A769
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0136A78B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1698283062.0000000001368000.00000040.00000020.00020000.00000000.sdmp, Offset: 01368000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1368000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                      • String ID:
                                                      • API String ID: 2438371351-0
                                                      • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                      • Instruction ID: 39f10c45b04df03bce71db72c933a995da5ac85220798591cf48b18ebaf84684
                                                      • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                      • Instruction Fuzzy Hash: C612CE24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F85CF5A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID:
                                                      • API String ID: 544645111-0
                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction ID: 4cf513f2966df6617bfcd4d2536444bcbc925934f749392e46791c5037d7a228
                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction Fuzzy Hash: EB31A271A10106DBC718EF58D480A69FBE6FF59300F648AE5E409DB692DB31EDC1DB80
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ClearVariant
                                                      • String ID:
                                                      • API String ID: 1473721057-0
                                                      • Opcode ID: 7b4d30947e95d9aa1600b9d07f5aab197b6a7cfd1cc01bf35e87426881160985
                                                      • Instruction ID: 24b9abdea134650e6da9e94cb8ddc9c002c47c5b4ea6d45e23d2c34a6c8817f2
                                                      • Opcode Fuzzy Hash: 7b4d30947e95d9aa1600b9d07f5aab197b6a7cfd1cc01bf35e87426881160985
                                                      • Instruction Fuzzy Hash: 15410574508391CFDB24DF15C484B1ABBE0BF45318F1988ACE8998B762C736EC85CB52
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID:
                                                      • API String ID: 4104443479-0
                                                      • Opcode ID: 9781abcdb158d5de311a8235c2bbea3f2900b5ee5d502aa41194046655936832
                                                      • Instruction ID: 6c2480a71750b8a9f9ee01810b57deba7cb9b2a214fcc3a566446cb135cc90dd
                                                      • Opcode Fuzzy Hash: 9781abcdb158d5de311a8235c2bbea3f2900b5ee5d502aa41194046655936832
                                                      • Instruction Fuzzy Hash: 8221BC7160860AEBDB104F25F982BB97BF8FF54390F2184AAE486C60A1EB3094E0D745
                                                      APIs
                                                        • Part of subcall function 00AE4D13: FreeLibrary.KERNEL32(00000000,?), ref: 00AE4D4D
                                                        • Part of subcall function 00B0548B: __wfsopen.LIBCMT ref: 00B05496
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00BA62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AE4F6F
                                                        • Part of subcall function 00AE4CC8: FreeLibrary.KERNEL32(00000000), ref: 00AE4D02
                                                        • Part of subcall function 00AE4DD0: _memmove.LIBCMT ref: 00AE4E1A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Library$Free$Load__wfsopen_memmove
                                                      • String ID:
                                                      • API String ID: 1396898556-0
                                                      • Opcode ID: a6fed814a712cf3de124e93b25ed8eb1a9d4482c65086199e2bab87f982c7d08
                                                      • Instruction ID: f4a78da764efaeb8856edb2e3eb54d6d17660682f12f7e053aaa71d60e927536
                                                      • Opcode Fuzzy Hash: a6fed814a712cf3de124e93b25ed8eb1a9d4482c65086199e2bab87f982c7d08
                                                      • Instruction Fuzzy Hash: B311E731A00709AACB10AF71DD52BAE77E8DF48B00F208429F541A72C1DA759A05AB50
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ClearVariant
                                                      • String ID:
                                                      • API String ID: 1473721057-0
                                                      • Opcode ID: e0d57f57421f492226c6fb10447a53781ed049e68c4ef29b2f0d3de6158fe4b2
                                                      • Instruction ID: c96e6688f938bf250f717e72eeca535da4df2a1d31461d47c30c3cbd0761ed81
                                                      • Opcode Fuzzy Hash: e0d57f57421f492226c6fb10447a53781ed049e68c4ef29b2f0d3de6158fe4b2
                                                      • Instruction Fuzzy Hash: 8E2122B4508391DFDB28DF65C484B1BBBE0BF88304F0589A8E89A47762D731F845CB52
                                                      APIs
                                                      • __lock_file.LIBCMT ref: 00B04AD6
                                                        • Part of subcall function 00B08D68: __getptd_noexit.LIBCMT ref: 00B08D68
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __getptd_noexit__lock_file
                                                      • String ID:
                                                      • API String ID: 2597487223-0
                                                      • Opcode ID: 82b1d9e7e24c3793ff77397505ec8982168e9efa72c6811d53ba04adf5d5440b
                                                      • Instruction ID: 946cbbb8ddc9db0d1e48c7e92a275352a854e9ed8ea63a5fbd709a023dfc4ab2
                                                      • Opcode Fuzzy Hash: 82b1d9e7e24c3793ff77397505ec8982168e9efa72c6811d53ba04adf5d5440b
                                                      • Instruction Fuzzy Hash: E4F0AFB1A40209ABDF61BF74CC0679F3EE1AF00365F1486A4B524AA1E1CB788A60DF51
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,?,00BA62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AE4FDE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 809218ad23ed75bf9d30338612bd28d901d65f83562150fab30da25aa507f792
                                                      • Instruction ID: e2fc37621e51793400949837d80ed4ae390a149876ac808e49e9404bc85e4117
                                                      • Opcode Fuzzy Hash: 809218ad23ed75bf9d30338612bd28d901d65f83562150fab30da25aa507f792
                                                      • Instruction Fuzzy Hash: 5FF03071109B52CFC7349F65E494912BBF9BF18B253208A7EE1D682A10C7719840DF50
                                                      APIs
                                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B009F4
                                                        • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: LongNamePath_memmove
                                                      • String ID:
                                                      • API String ID: 2514874351-0
                                                      • Opcode ID: f7bc74d09aa4e205da2fd2ad4b22d59d7591cbac0a226fe651284fb95cac289a
                                                      • Instruction ID: 320490204bc047009e6547c9fe1f9538ae0ec258e3e4c94a412027262746949e
                                                      • Opcode Fuzzy Hash: f7bc74d09aa4e205da2fd2ad4b22d59d7591cbac0a226fe651284fb95cac289a
                                                      • Instruction Fuzzy Hash: B0E0867690422857C720D65C9C05FFA77EDDF88690F0401B5FD0CD7248D9A49C818A90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock
                                                      • String ID:
                                                      • API String ID: 2638373210-0
                                                      • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                                      • Instruction ID: c8c33fdef82b5da319073cdaf454adc145f37396cc8b3c95d92ef051d350ebfc
                                                      • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                                                      • Instruction Fuzzy Hash: 6FE092B0104B005FD7348A24D8107E377E0EB06315F00085DF69A93341EB6278419B59
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __wfsopen
                                                      • String ID:
                                                      • API String ID: 197181222-0
                                                      • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                      • Instruction ID: 4227a6a2070449e2852e7afb99fa5cc7c4cabc0b4e2ca818ff8b1a51092e6f48
                                                      • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                      • Instruction Fuzzy Hash: 72B09B7544010C77DE111D42EC02A593F595740674F404050FB0C18561957395605585
                                                      APIs
                                                      • Sleep.KERNELBASE(000001F4), ref: 0136AF29
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1698283062.0000000001368000.00000040.00000020.00020000.00000000.sdmp, Offset: 01368000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1368000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                      • Instruction ID: 6321dd5b1861f182b4f09ed2740c95de6e3598288ff71c3e26ba956b8041a0eb
                                                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                      • Instruction Fuzzy Hash: BFE0E67494410DDFDB00DFB4D94969D7BB4EF04302F1041A1FD01E2281D6309D508A72
                                                      APIs
                                                        • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00B6CE50
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B6CE91
                                                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00B6CED6
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B6CF00
                                                      • SendMessageW.USER32 ref: 00B6CF29
                                                      • _wcsncpy.LIBCMT ref: 00B6CFA1
                                                      • GetKeyState.USER32(00000011), ref: 00B6CFC2
                                                      • GetKeyState.USER32(00000009), ref: 00B6CFCF
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B6CFE5
                                                      • GetKeyState.USER32(00000010), ref: 00B6CFEF
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B6D018
                                                      • SendMessageW.USER32 ref: 00B6D03F
                                                      • SendMessageW.USER32(?,00001030,?,00B6B602), ref: 00B6D145
                                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00B6D15B
                                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00B6D16E
                                                      • SetCapture.USER32(?), ref: 00B6D177
                                                      • ClientToScreen.USER32(?,?), ref: 00B6D1DC
                                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00B6D1E9
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B6D203
                                                      • ReleaseCapture.USER32 ref: 00B6D20E
                                                      • GetCursorPos.USER32(?), ref: 00B6D248
                                                      • ScreenToClient.USER32(?,?), ref: 00B6D255
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B6D2B1
                                                      • SendMessageW.USER32 ref: 00B6D2DF
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B6D31C
                                                      • SendMessageW.USER32 ref: 00B6D34B
                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00B6D36C
                                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00B6D37B
                                                      • GetCursorPos.USER32(?), ref: 00B6D39B
                                                      • ScreenToClient.USER32(?,?), ref: 00B6D3A8
                                                      • GetParent.USER32(?), ref: 00B6D3C8
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B6D431
                                                      • SendMessageW.USER32 ref: 00B6D462
                                                      • ClientToScreen.USER32(?,?), ref: 00B6D4C0
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00B6D4F0
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B6D51A
                                                      • SendMessageW.USER32 ref: 00B6D53D
                                                      • ClientToScreen.USER32(?,?), ref: 00B6D58F
                                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00B6D5C3
                                                        • Part of subcall function 00AE25DB: GetWindowLongW.USER32(?,000000EB), ref: 00AE25EC
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00B6D65F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                      • String ID: @GUI_DRAGID$F
                                                      • API String ID: 3977979337-4164748364
                                                      • Opcode ID: f90dce9ed6bc4a59015719d6ddfb950ba4c50e39b123ffb41f6658dee17f71c0
                                                      • Instruction ID: 65cac0c14c62787391df788a195744a092995d3958f239bdba3aade39e5d4809
                                                      • Opcode Fuzzy Hash: f90dce9ed6bc4a59015719d6ddfb950ba4c50e39b123ffb41f6658dee17f71c0
                                                      • Instruction Fuzzy Hash: 96429E71604241AFD721CF28C884FBABFF5FF49314F144599F6A5872A0CB7AA854CB92
                                                      APIs
                                                      • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00B6873F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: %d/%02d/%02d
                                                      • API String ID: 3850602802-328681919
                                                      • Opcode ID: f67d83c91a52b60fcf66b41b08722ecfd8079b58cf28c7ed31b9bdf8ee02fb0e
                                                      • Instruction ID: 0e257614d2dce70860726b26937c08bd4f850c6768891e7469ef8cce725e00ba
                                                      • Opcode Fuzzy Hash: f67d83c91a52b60fcf66b41b08722ecfd8079b58cf28c7ed31b9bdf8ee02fb0e
                                                      • Instruction Fuzzy Hash: 8912A371500245ABEB259F24DC89FBA7BF8EF45710F2442A9F516EB2E1DF788941CB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memmove$_memset
                                                      • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                                      • API String ID: 1357608183-1798697756
                                                      • Opcode ID: 12a06636054fb3e1595841aba06b638b809985cb0325eee89822a5703444d4e6
                                                      • Instruction ID: b30f73090db143864d6ee2929e4a0b3e8edc62ebc43d98b9174319b2bb2015b1
                                                      • Opcode Fuzzy Hash: 12a06636054fb3e1595841aba06b638b809985cb0325eee89822a5703444d4e6
                                                      • Instruction Fuzzy Hash: 90938075A04219DBDB24CF98C881BBDB7F1FF48710F3581AAE955AB290E7749E81CB40
                                                      APIs
                                                      • GetForegroundWindow.USER32(00000000,?), ref: 00AE4A3D
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B1DA8E
                                                      • IsIconic.USER32(?), ref: 00B1DA97
                                                      • ShowWindow.USER32(?,00000009), ref: 00B1DAA4
                                                      • SetForegroundWindow.USER32(?), ref: 00B1DAAE
                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00B1DAC4
                                                      • GetCurrentThreadId.KERNEL32 ref: 00B1DACB
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B1DAD7
                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 00B1DAE8
                                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 00B1DAF0
                                                      • AttachThreadInput.USER32(00000000,?,00000001), ref: 00B1DAF8
                                                      • SetForegroundWindow.USER32(?), ref: 00B1DAFB
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B1DB10
                                                      • keybd_event.USER32(00000012,00000000), ref: 00B1DB1B
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B1DB25
                                                      • keybd_event.USER32(00000012,00000000), ref: 00B1DB2A
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B1DB33
                                                      • keybd_event.USER32(00000012,00000000), ref: 00B1DB38
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B1DB42
                                                      • keybd_event.USER32(00000012,00000000), ref: 00B1DB47
                                                      • SetForegroundWindow.USER32(?), ref: 00B1DB4A
                                                      • AttachThreadInput.USER32(?,?,00000000), ref: 00B1DB71
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 4125248594-2988720461
                                                      • Opcode ID: 5170c2ad6c57b49d2be9e78baf10946d87bb92fb4e23be8c0624ef5dd727efd7
                                                      • Instruction ID: ff32f942eb13787e8233a80b8d45891b77ca7824a4536b2d26283097e7bad926
                                                      • Opcode Fuzzy Hash: 5170c2ad6c57b49d2be9e78baf10946d87bb92fb4e23be8c0624ef5dd727efd7
                                                      • Instruction Fuzzy Hash: 27318571A44318BBEB206FA1AC49FBF3EACEB44B50F114075FA05E71D0CAB45D40EAA5
                                                      APIs
                                                        • Part of subcall function 00B38CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B38D0D
                                                        • Part of subcall function 00B38CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B38D3A
                                                        • Part of subcall function 00B38CC3: GetLastError.KERNEL32 ref: 00B38D47
                                                      • _memset.LIBCMT ref: 00B3889B
                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00B388ED
                                                      • CloseHandle.KERNEL32(?), ref: 00B388FE
                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00B38915
                                                      • GetProcessWindowStation.USER32 ref: 00B3892E
                                                      • SetProcessWindowStation.USER32(00000000), ref: 00B38938
                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00B38952
                                                        • Part of subcall function 00B38713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B38851), ref: 00B38728
                                                        • Part of subcall function 00B38713: CloseHandle.KERNEL32(?,?,00B38851), ref: 00B3873A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                      • String ID: $default$winsta0
                                                      • API String ID: 2063423040-1027155976
                                                      • Opcode ID: c699358c59b59a92d6649e8cff05509c6de5e195a39850f874f83cd7a0ff0786
                                                      • Instruction ID: 13072239118e9e7f40ab46139530411afb88974499c6e7c5a234319a87411c61
                                                      • Opcode Fuzzy Hash: c699358c59b59a92d6649e8cff05509c6de5e195a39850f874f83cd7a0ff0786
                                                      • Instruction Fuzzy Hash: BB812971900309AFDF11DFA4EC45AEE7BB8EF04304F2841AAF910A62A1DF759E15DB61
                                                      APIs
                                                      • OpenClipboard.USER32(00B6F910), ref: 00B54284
                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 00B54292
                                                      • GetClipboardData.USER32(0000000D), ref: 00B5429A
                                                      • CloseClipboard.USER32 ref: 00B542A6
                                                      • GlobalLock.KERNEL32(00000000), ref: 00B542C2
                                                      • CloseClipboard.USER32 ref: 00B542CC
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00B542E1
                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 00B542EE
                                                      • GetClipboardData.USER32(00000001), ref: 00B542F6
                                                      • GlobalLock.KERNEL32(00000000), ref: 00B54303
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00B54337
                                                      • CloseClipboard.USER32 ref: 00B54447
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                      • String ID:
                                                      • API String ID: 3222323430-0
                                                      • Opcode ID: f898e9366878403de37825acb01d62df2fc7d8a50d5d41cc2854f5d85708eb03
                                                      • Instruction ID: 4eb40aedcb5f46c42897ec9f7f58ac33aa571aeaa9046412a2ee294fb4a95d1f
                                                      • Opcode Fuzzy Hash: f898e9366878403de37825acb01d62df2fc7d8a50d5d41cc2854f5d85708eb03
                                                      • Instruction Fuzzy Hash: 54518B31204302ABD300AB61ED96F7F77A8AF84B05F1045A9F956D32E1DFB499488A62
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00B4C9F8
                                                      • FindClose.KERNEL32(00000000), ref: 00B4CA4C
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B4CA71
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B4CA88
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B4CAAF
                                                      • __swprintf.LIBCMT ref: 00B4CAFB
                                                      • __swprintf.LIBCMT ref: 00B4CB3E
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                      • __swprintf.LIBCMT ref: 00B4CB92
                                                        • Part of subcall function 00B038D8: __woutput_l.LIBCMT ref: 00B03931
                                                      • __swprintf.LIBCMT ref: 00B4CBE0
                                                        • Part of subcall function 00B038D8: __flsbuf.LIBCMT ref: 00B03953
                                                        • Part of subcall function 00B038D8: __flsbuf.LIBCMT ref: 00B0396B
                                                      • __swprintf.LIBCMT ref: 00B4CC2F
                                                      • __swprintf.LIBCMT ref: 00B4CC7E
                                                      • __swprintf.LIBCMT ref: 00B4CCCD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                      • API String ID: 3953360268-2428617273
                                                      • Opcode ID: 9741411f5301c26759654b053e555f8ad318b8fd8322a8134a246c35ba02fa4c
                                                      • Instruction ID: 78910b52f230c9537afdbd0c2625c825374ea909d374181bbab965a3a9b50e0b
                                                      • Opcode Fuzzy Hash: 9741411f5301c26759654b053e555f8ad318b8fd8322a8134a246c35ba02fa4c
                                                      • Instruction Fuzzy Hash: 0EA14CB2508345ABC700EB65C986DAFB7ECFF94704F40496DF586C7191EA74DA08CB62
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00B4F221
                                                      • _wcscmp.LIBCMT ref: 00B4F236
                                                      • _wcscmp.LIBCMT ref: 00B4F24D
                                                      • GetFileAttributesW.KERNEL32(?), ref: 00B4F25F
                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 00B4F279
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00B4F291
                                                      • FindClose.KERNEL32(00000000), ref: 00B4F29C
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00B4F2B8
                                                      • _wcscmp.LIBCMT ref: 00B4F2DF
                                                      • _wcscmp.LIBCMT ref: 00B4F2F6
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00B4F308
                                                      • SetCurrentDirectoryW.KERNEL32(00B9A5A0), ref: 00B4F326
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B4F330
                                                      • FindClose.KERNEL32(00000000), ref: 00B4F33D
                                                      • FindClose.KERNEL32(00000000), ref: 00B4F34F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                      • String ID: *.*
                                                      • API String ID: 1803514871-438819550
                                                      • Opcode ID: 304922502741d2ae5afb325700ef7a18d4165bbc340aa0600bcc9c2bd780b665
                                                      • Instruction ID: 30c41afcefcd2f3c8537e6fbd5529891706f8ce6539c0399842c92e57e236d01
                                                      • Opcode Fuzzy Hash: 304922502741d2ae5afb325700ef7a18d4165bbc340aa0600bcc9c2bd780b665
                                                      • Instruction Fuzzy Hash: 8B31AE7660121A6ADB10DFA4EC98AFE77ECEF08360F1401B6F814D30A0EB74DB459A64
                                                      APIs
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B60BDE
                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00B6F910,00000000,?,00000000,?,?), ref: 00B60C4C
                                                      • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00B60C94
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00B60D1D
                                                      • RegCloseKey.ADVAPI32(?), ref: 00B6103D
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00B6104A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectCreateRegistryValue
                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                      • API String ID: 536824911-966354055
                                                      • Opcode ID: caf1c09c7d009da0e373594fb450db37d94bbfd19227192c721d286b55578e3b
                                                      • Instruction ID: fe340a4c3aa5d18d012c6033b2b4562b1ee7bd422a8f546f61f41ed3a8c0b548
                                                      • Opcode Fuzzy Hash: caf1c09c7d009da0e373594fb450db37d94bbfd19227192c721d286b55578e3b
                                                      • Instruction Fuzzy Hash: 92025C756006519FCB14EF19C995E2AB7E5FF88714F04889DF88A9B3A2CB34ED41CB81
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00B4F37E
                                                      • _wcscmp.LIBCMT ref: 00B4F393
                                                      • _wcscmp.LIBCMT ref: 00B4F3AA
                                                        • Part of subcall function 00B445C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00B445DC
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00B4F3D9
                                                      • FindClose.KERNEL32(00000000), ref: 00B4F3E4
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00B4F400
                                                      • _wcscmp.LIBCMT ref: 00B4F427
                                                      • _wcscmp.LIBCMT ref: 00B4F43E
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00B4F450
                                                      • SetCurrentDirectoryW.KERNEL32(00B9A5A0), ref: 00B4F46E
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B4F478
                                                      • FindClose.KERNEL32(00000000), ref: 00B4F485
                                                      • FindClose.KERNEL32(00000000), ref: 00B4F497
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                      • String ID: *.*
                                                      • API String ID: 1824444939-438819550
                                                      • Opcode ID: 2e918d395205c9884b0016fb77a050917a68dedcb236074f4e10a4e331923988
                                                      • Instruction ID: d625a27210f19aa149cba2fde3ca8f08d449c8d6eb5072a8b081ee3b479c6ef8
                                                      • Opcode Fuzzy Hash: 2e918d395205c9884b0016fb77a050917a68dedcb236074f4e10a4e331923988
                                                      • Instruction Fuzzy Hash: FA319E7660121A6ACF10AFA4EC98AFE77ECDF49360F1401F6E854A31A0DB74DF44DA64
                                                      APIs
                                                        • Part of subcall function 00B3874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B38766
                                                        • Part of subcall function 00B3874A: GetLastError.KERNEL32(?,00B3822A,?,?,?), ref: 00B38770
                                                        • Part of subcall function 00B3874A: GetProcessHeap.KERNEL32(00000008,?,?,00B3822A,?,?,?), ref: 00B3877F
                                                        • Part of subcall function 00B3874A: HeapAlloc.KERNEL32(00000000,?,00B3822A,?,?,?), ref: 00B38786
                                                        • Part of subcall function 00B3874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B3879D
                                                        • Part of subcall function 00B387E7: GetProcessHeap.KERNEL32(00000008,00B38240,00000000,00000000,?,00B38240,?), ref: 00B387F3
                                                        • Part of subcall function 00B387E7: HeapAlloc.KERNEL32(00000000,?,00B38240,?), ref: 00B387FA
                                                        • Part of subcall function 00B387E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00B38240,?), ref: 00B3880B
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B3825B
                                                      • _memset.LIBCMT ref: 00B38270
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B3828F
                                                      • GetLengthSid.ADVAPI32(?), ref: 00B382A0
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00B382DD
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B382F9
                                                      • GetLengthSid.ADVAPI32(?), ref: 00B38316
                                                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00B38325
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00B3832C
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B3834D
                                                      • CopySid.ADVAPI32(00000000), ref: 00B38354
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B38385
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B383AB
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B383BF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                      • String ID:
                                                      • API String ID: 3996160137-0
                                                      • Opcode ID: a72e9ef52b2e8cf014b41e543ba2992c544599d1672a5365134801e1a30423fc
                                                      • Instruction ID: e409a53058b39dc83f745b6b45379fdc6c407f6401ab81ecde8a017d8f3b50d7
                                                      • Opcode Fuzzy Hash: a72e9ef52b2e8cf014b41e543ba2992c544599d1672a5365134801e1a30423fc
                                                      • Instruction Fuzzy Hash: 9C61677190020AEFCF009FA4DC85AEEBBB9FF04700F2481A9F815A7291DF759A05CB61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                      • API String ID: 0-4052911093
                                                      • Opcode ID: b9df19ff244a47d86ce8a1f35f37d48de0e0a94bf7af0538aa7deea186774f10
                                                      • Instruction ID: ce58ecf6435fd65798b4fbdf4c87ca66859ae5b7ac1160664f0070a2bec5bd3e
                                                      • Opcode Fuzzy Hash: b9df19ff244a47d86ce8a1f35f37d48de0e0a94bf7af0538aa7deea186774f10
                                                      • Instruction Fuzzy Hash: CB724F75E00219DBDB24CF99C8807BEB7F5EF48710F2485AAE949EB290DB749D41CB90
                                                      APIs
                                                        • Part of subcall function 00B610A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B60038,?,?), ref: 00B610BC
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B60737
                                                        • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                                                        • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00B607D6
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00B6086E
                                                      • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00B60AAD
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00B60ABA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 1240663315-0
                                                      • Opcode ID: 966ccfab88567a847232672e9b584713e0c0c64b3d38feb7290b4f2a201c18ee
                                                      • Instruction ID: 4e42b0f4e9680103ec59ecc9dd1384e1e1c3622b0eaff45c989d6beb9dfba27d
                                                      • Opcode Fuzzy Hash: 966ccfab88567a847232672e9b584713e0c0c64b3d38feb7290b4f2a201c18ee
                                                      • Instruction Fuzzy Hash: 27E14C31214300AFCB14EF69C991E2BBBE4EF89714B0489ADF449DB2A2DA34ED01CB51
                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 00B40241
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00B402C2
                                                      • GetKeyState.USER32(000000A0), ref: 00B402DD
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00B402F7
                                                      • GetKeyState.USER32(000000A1), ref: 00B4030C
                                                      • GetAsyncKeyState.USER32(00000011), ref: 00B40324
                                                      • GetKeyState.USER32(00000011), ref: 00B40336
                                                      • GetAsyncKeyState.USER32(00000012), ref: 00B4034E
                                                      • GetKeyState.USER32(00000012), ref: 00B40360
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00B40378
                                                      • GetKeyState.USER32(0000005B), ref: 00B4038A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: 38ad4801283ba3f87ce408c8cdf687482f76c4e970ce21b9520a8930396762a7
                                                      • Instruction ID: dc7781b43d97bc336f251fcb0941193f8b2d7bc77d067644f499a73ce5d216f7
                                                      • Opcode Fuzzy Hash: 38ad4801283ba3f87ce408c8cdf687482f76c4e970ce21b9520a8930396762a7
                                                      • Instruction Fuzzy Hash: 894186245247CA6AFF31AA6494083B5BEE0EB15340F0840DEDBC6471C2DBF45EC4AB96
                                                      APIs
                                                        • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                                                        • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                                                      • CoInitialize.OLE32 ref: 00B58718
                                                      • CoUninitialize.OLE32 ref: 00B58723
                                                      • CoCreateInstance.OLE32(?,00000000,00000017,00B72BEC,?), ref: 00B58783
                                                      • IIDFromString.OLE32(?,?), ref: 00B587F6
                                                      • VariantInit.OLEAUT32(?), ref: 00B58890
                                                      • VariantClear.OLEAUT32(?), ref: 00B588F1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                      • API String ID: 834269672-1287834457
                                                      • Opcode ID: 0fa05ae220d7319a3b4f73c9e9aa106eae05c9a25aa96c3b5cdc211bfa179964
                                                      • Instruction ID: eebf28eb56807c07eec2e675ff71ffe0bf76c60aa337a62a73f8ace6d6b56754
                                                      • Opcode Fuzzy Hash: 0fa05ae220d7319a3b4f73c9e9aa106eae05c9a25aa96c3b5cdc211bfa179964
                                                      • Instruction Fuzzy Hash: FC61AE70608311AFD710DF24D985B6BBBE4EF48715F1048D9F985AB2A1DB70ED48CB92
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                      • String ID:
                                                      • API String ID: 1737998785-0
                                                      • Opcode ID: e21b9910a31993ffcad6f8ddf9062de7445f3a27b67b31bc8db5ffa971775d61
                                                      • Instruction ID: 3a130e30acaca082cc651d331f3ec104e600c9f5b4163d706c59309547261037
                                                      • Opcode Fuzzy Hash: e21b9910a31993ffcad6f8ddf9062de7445f3a27b67b31bc8db5ffa971775d61
                                                      • Instruction Fuzzy Hash: FD218B75200211AFDB10AF24EC49B7A7BA8EF54715F1080AAF906DB2B1DFB8AD01CB54
                                                      APIs
                                                        • Part of subcall function 00AE48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AE48A1,?,?,00AE37C0,?), ref: 00AE48CE
                                                        • Part of subcall function 00B44CD3: GetFileAttributesW.KERNEL32(?,00B43947), ref: 00B44CD4
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00B43ADF
                                                      • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00B43B87
                                                      • MoveFileW.KERNEL32(?,?), ref: 00B43B9A
                                                      • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00B43BB7
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B43BD9
                                                      • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00B43BF5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 4002782344-1173974218
                                                      • Opcode ID: b930749567a05e514a40927ad261c1eeac0c5a7cbd84b7d8631b4799ff64d04a
                                                      • Instruction ID: 0811391f1ac8d0b6852d6bdeb1bbe0840d0e1c7f47135dce6176a8d62bb77d79
                                                      • Opcode Fuzzy Hash: b930749567a05e514a40927ad261c1eeac0c5a7cbd84b7d8631b4799ff64d04a
                                                      • Instruction Fuzzy Hash: B95181318052899ACF05EBA1DE929FDB7F9EF14300F6841A9E44177092DF716F09DBA0
                                                      APIs
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                      • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00B4F6AB
                                                      • Sleep.KERNEL32(0000000A), ref: 00B4F6DB
                                                      • _wcscmp.LIBCMT ref: 00B4F6EF
                                                      • _wcscmp.LIBCMT ref: 00B4F70A
                                                      • FindNextFileW.KERNEL32(?,?), ref: 00B4F7A8
                                                      • FindClose.KERNEL32(00000000), ref: 00B4F7BE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                      • String ID: *.*
                                                      • API String ID: 713712311-438819550
                                                      • Opcode ID: b9e289992d2361e0ff8ef72dd516eeab236bb778fa764417ef56b8a06bad61ed
                                                      • Instruction ID: e6555ed2c742430b362e2fb6d2f3cd140ae1ed92e01d009a7dbb84e0cdc8647b
                                                      • Opcode Fuzzy Hash: b9e289992d2361e0ff8ef72dd516eeab236bb778fa764417ef56b8a06bad61ed
                                                      • Instruction Fuzzy Hash: 59417C7190021AABDF11DF64CC99AFEBBF4FF05310F1445A6E815A31A0EB349E44DBA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                      • API String ID: 0-1546025612
                                                      • Opcode ID: ba1ddd1f58d267ec2022cc5cdb8f77956ca1d82a07f182cf0c6251b2210d65d1
                                                      • Instruction ID: 525e2fb9a3f6463f1f92c95c488aff14dc5e759b83c954168e010f0aad0b15f0
                                                      • Opcode Fuzzy Hash: ba1ddd1f58d267ec2022cc5cdb8f77956ca1d82a07f182cf0c6251b2210d65d1
                                                      • Instruction Fuzzy Hash: 78A28270E0422E8BDF24DF98D9907BEB7B1FB58314F1481A9E959A7280DB709E81CF54
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID:
                                                      • API String ID: 4104443479-0
                                                      • Opcode ID: 6355f9264b5b2ed65444133d3d23d3b71c3ec8aed07eb90d0a02c5d36eae26f8
                                                      • Instruction ID: d79fe40681273bbeb39ac30e2527f74e4f57d13c41bf1b2c49976e6701bc6508
                                                      • Opcode Fuzzy Hash: 6355f9264b5b2ed65444133d3d23d3b71c3ec8aed07eb90d0a02c5d36eae26f8
                                                      • Instruction Fuzzy Hash: A612A970E00609DFDF14DFA5DA81AAEB7F5FF48300F2086A9E546A7291EB35AD11CB50
                                                      APIs
                                                        • Part of subcall function 00B38CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B38D0D
                                                        • Part of subcall function 00B38CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B38D3A
                                                        • Part of subcall function 00B38CC3: GetLastError.KERNEL32 ref: 00B38D47
                                                      • ExitWindowsEx.USER32(?,00000000), ref: 00B4549B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                      • String ID: $@$SeShutdownPrivilege
                                                      • API String ID: 2234035333-194228
                                                      • Opcode ID: d2f2e1aff8325b3be8c7fa197043a6930212bf7edaac451a5c02a22d9c4f8032
                                                      • Instruction ID: 4ae29cfe83678b64cb6dd8b6e68898145f027ff2f9295f78782b461f5383bc57
                                                      • Opcode Fuzzy Hash: d2f2e1aff8325b3be8c7fa197043a6930212bf7edaac451a5c02a22d9c4f8032
                                                      • Instruction Fuzzy Hash: 67014771655F026BF7385674EC8ABBA72D8EB00752F3400B0FC07DA2D7DA940E80A190
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000001,00000006), ref: 00B565EF
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00B565FE
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00B5661A
                                                      • listen.WSOCK32(00000000,00000005), ref: 00B56629
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00B56643
                                                      • closesocket.WSOCK32(00000000), ref: 00B56657
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$bindclosesocketlistensocket
                                                      • String ID:
                                                      • API String ID: 1279440585-0
                                                      • Opcode ID: d14097267aae753fbbd42e05797c5c65be832c7a236d5047661200c769892307
                                                      • Instruction ID: 7e1871b0021f749f2f6a9e987ca69a3b63ce8408ca8cb3a903243f336d9fc4be
                                                      • Opcode Fuzzy Hash: d14097267aae753fbbd42e05797c5c65be832c7a236d5047661200c769892307
                                                      • Instruction Fuzzy Hash: 04219C30600205AFCB10AF24D985B7EB7E9EF48321F2481A9E95AE73E1CB74AD058B51
                                                      APIs
                                                        • Part of subcall function 00B00FF6: std::exception::exception.LIBCMT ref: 00B0102C
                                                        • Part of subcall function 00B00FF6: __CxxThrowException@8.LIBCMT ref: 00B01041
                                                      • _memmove.LIBCMT ref: 00B3062F
                                                      • _memmove.LIBCMT ref: 00B30744
                                                      • _memmove.LIBCMT ref: 00B307EB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 1300846289-0
                                                      • Opcode ID: eef0a3f79747f45036a0ad66c762c78470dc049c882f193384d71319189b87e5
                                                      • Instruction ID: 46339b1878b10055f329f3c01235c93c025f4dd2eef784f3a78df14d7d220eae
                                                      • Opcode Fuzzy Hash: eef0a3f79747f45036a0ad66c762c78470dc049c882f193384d71319189b87e5
                                                      • Instruction Fuzzy Hash: 48029F70E10209DBDF04EF69D991ABEBBF5EF44340F2480A9E906DB295EB31D950CB91
                                                      APIs
                                                        • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 00AE19FA
                                                      • GetSysColor.USER32(0000000F), ref: 00AE1A4E
                                                      • SetBkColor.GDI32(?,00000000), ref: 00AE1A61
                                                        • Part of subcall function 00AE1290: DefDlgProcW.USER32(?,00000020,?), ref: 00AE12D8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ColorProc$LongWindow
                                                      • String ID:
                                                      • API String ID: 3744519093-0
                                                      • Opcode ID: 61f929ac3844103562d9440a3c3306744ccecf317f3f151b7ee56c85beb677ef
                                                      • Instruction ID: c8a75b7f7fddd88aeafd32650ffa1e728f3aece99a85d87d8beeae0e8fd98b7f
                                                      • Opcode Fuzzy Hash: 61f929ac3844103562d9440a3c3306744ccecf317f3f151b7ee56c85beb677ef
                                                      • Instruction Fuzzy Hash: 2CA16BB11055E4BED638AB2B8C65DBF3AEDDB463C1B54016AF402D7192CE388D4192B2
                                                      APIs
                                                        • Part of subcall function 00B580A0: inet_addr.WSOCK32(00000000), ref: 00B580CB
                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00B56AB1
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00B56ADA
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00B56B13
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00B56B20
                                                      • closesocket.WSOCK32(00000000), ref: 00B56B34
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 99427753-0
                                                      • Opcode ID: 669417a18f2e989d4bd0d93574cb89b41faeb009076cde0bb772baaa4cae77a5
                                                      • Instruction ID: a9ef05d4570496d82386d5a1bfe76f49563356f6ea61d8d95af4c2ee85584652
                                                      • Opcode Fuzzy Hash: 669417a18f2e989d4bd0d93574cb89b41faeb009076cde0bb772baaa4cae77a5
                                                      • Instruction Fuzzy Hash: 6F419175600310AFEB10AF25DD86F7E77E9DF48710F448098F91AAB2D2DA749D018791
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                      • String ID:
                                                      • API String ID: 292994002-0
                                                      • Opcode ID: 26043a18fe4214e4ea268eae4cba57a753112712decaed2278132f55dc0570dc
                                                      • Instruction ID: f78980bf824e7691dfb7d4d9051519ad65635514184838bf8d2658ae7a7ecf73
                                                      • Opcode Fuzzy Hash: 26043a18fe4214e4ea268eae4cba57a753112712decaed2278132f55dc0570dc
                                                      • Instruction Fuzzy Hash: 5F11BF72700A126FE7211F26EC44A2BBBD8FF54761F808079E806D7281CB789D12CAA5
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00B21D88,?), ref: 00B5C312
                                                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00B5C324
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                      • API String ID: 2574300362-1816364905
                                                      • Opcode ID: dc0eaa46ba2672ccddf7eef5e8fdd20e218d4e2f093471e2270aa2f6bdb62f86
                                                      • Instruction ID: 3972f8460fe3ffe576ff49e95fad66f89486b62e221c004ac068028aee4b5b04
                                                      • Opcode Fuzzy Hash: dc0eaa46ba2672ccddf7eef5e8fdd20e218d4e2f093471e2270aa2f6bdb62f86
                                                      • Instruction Fuzzy Hash: 50E0EC74600717CFDB205F25E804B967AD4EF09756B80C4F9E895D32A0EBB8D884CA60
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __itow__swprintf
                                                      • String ID:
                                                      • API String ID: 674341424-0
                                                      • Opcode ID: 701feb20c8153832fc962853d0609dbf95794230939782ed42588231efc692bb
                                                      • Instruction ID: 231df25e9fe22c5cb492ba1d8adf6dae118d75b4b6313c453b7423a6cefd34c1
                                                      • Opcode Fuzzy Hash: 701feb20c8153832fc962853d0609dbf95794230939782ed42588231efc692bb
                                                      • Instruction Fuzzy Hash: C8229B726083559FCB24DF64C981B6FB7E4EF84700F10492DFA9A97291DB70EA04CB92
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00B5F151
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00B5F15F
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00B5F21F
                                                      • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00B5F22E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                      • String ID:
                                                      • API String ID: 2576544623-0
                                                      • Opcode ID: 17df5268e7b45c3943f72c77a2bd5770e9bb9d630360944618bc534f0f6092e8
                                                      • Instruction ID: a82f2abe06efe1c060b56b92903c5131af5e54365ad7d32553bebbc34a79c280
                                                      • Opcode Fuzzy Hash: 17df5268e7b45c3943f72c77a2bd5770e9bb9d630360944618bc534f0f6092e8
                                                      • Instruction Fuzzy Hash: EB518DB15083419FD310EF25DC85E6BBBE8FF88750F10486DF995972A1EB70A908CB92
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00B440D1
                                                      • _memset.LIBCMT ref: 00B440F2
                                                      • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00B44144
                                                      • CloseHandle.KERNEL32(00000000), ref: 00B4414D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CloseControlCreateDeviceFileHandle_memset
                                                      • String ID:
                                                      • API String ID: 1157408455-0
                                                      • Opcode ID: e5aadeeacb51f96e2e8d95ea66971850016fddf9a5867ee31a83b13a805f96b0
                                                      • Instruction ID: 4d0454e6ce2a3ab05065e4344af89a80c493d8269720c703f616e7428245231d
                                                      • Opcode Fuzzy Hash: e5aadeeacb51f96e2e8d95ea66971850016fddf9a5867ee31a83b13a805f96b0
                                                      • Instruction Fuzzy Hash: DE11AB759012287AD7305BA5AC4DFABBBBCEF45760F1041D6F908E72C0D6744F908BA4
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00B3EB19
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID: ($|
                                                      • API String ID: 1659193697-1631851259
                                                      • Opcode ID: 3f0ede9625ccf2cac1a8d649f4397c33bbf699509322d8b854784489b8e55684
                                                      • Instruction ID: 0d1bf0a27259300be2e003d64ca50403b264e189fc1be478fcf2fca91b29ad98
                                                      • Opcode Fuzzy Hash: 3f0ede9625ccf2cac1a8d649f4397c33bbf699509322d8b854784489b8e55684
                                                      • Instruction Fuzzy Hash: B2321575A006059FDB28CF19C481A6AB7F1FF48310F25C5AEE4AADB3A1E770E941CB40
                                                      APIs
                                                      • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00B51AFE,00000000), ref: 00B526D5
                                                      • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00B5270C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Internet$AvailableDataFileQueryRead
                                                      • String ID:
                                                      • API String ID: 599397726-0
                                                      • Opcode ID: 6ad28d8adba9ca9e5f0f73c567e86edb23c14485d575bd0847cfaf05edc243a4
                                                      • Instruction ID: 2d532b4edb577941cbdee74497e04e1a090f120be2d39b70d9d31f94681b4397
                                                      • Opcode Fuzzy Hash: 6ad28d8adba9ca9e5f0f73c567e86edb23c14485d575bd0847cfaf05edc243a4
                                                      • Instruction Fuzzy Hash: C241C771501209BFEB20DB54DCC5FBB77FCEB45716F1040EAFE01A6180EA719D499A50
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00B4B5AE
                                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00B4B608
                                                      • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00B4B655
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DiskFreeSpace
                                                      • String ID:
                                                      • API String ID: 1682464887-0
                                                      • Opcode ID: 0d046defc5bf54d7c78232eaa632f9b219d7e418d30427402b59d4a3a01ecfe8
                                                      • Instruction ID: 51610623c695c7bdac6b616de2f105ecd46d13a6d315a225c82019aacb8a7d6d
                                                      • Opcode Fuzzy Hash: 0d046defc5bf54d7c78232eaa632f9b219d7e418d30427402b59d4a3a01ecfe8
                                                      • Instruction Fuzzy Hash: CF219035A00218EFCB00EF65E880EAEBBF8FF48310F1480A9E905AB351CB319915CF50
                                                      APIs
                                                        • Part of subcall function 00B00FF6: std::exception::exception.LIBCMT ref: 00B0102C
                                                        • Part of subcall function 00B00FF6: __CxxThrowException@8.LIBCMT ref: 00B01041
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B38D0D
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B38D3A
                                                      • GetLastError.KERNEL32 ref: 00B38D47
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                      • String ID:
                                                      • API String ID: 1922334811-0
                                                      • Opcode ID: a0a6b4b244014720c9ae3beb2d6e7a81e42fc965bb8b70b7e20aac57c5febcd8
                                                      • Instruction ID: 139a47d4537d2a2d88d75730caf193103370c3ec953c5711d4a74de86077c84d
                                                      • Opcode Fuzzy Hash: a0a6b4b244014720c9ae3beb2d6e7a81e42fc965bb8b70b7e20aac57c5febcd8
                                                      • Instruction Fuzzy Hash: BB1182B2414305AFD728AF54EC85D7BB7F8EB44710B20856EF45597281EF70AC408A64
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00B44C2C
                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00B44C43
                                                      • FreeSid.ADVAPI32(?), ref: 00B44C53
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                      • String ID:
                                                      • API String ID: 3429775523-0
                                                      • Opcode ID: edb3aa3477e4d592c9fed715cdfd31e62fa9f5b3bf41f6bc136b41566ecd2d4d
                                                      • Instruction ID: 5b1c1f91aa32c251f33bfdf0c1f89e7fb10d0854cac672c193b9833ca3c93690
                                                      • Opcode Fuzzy Hash: edb3aa3477e4d592c9fed715cdfd31e62fa9f5b3bf41f6bc136b41566ecd2d4d
                                                      • Instruction Fuzzy Hash: AFF03775A11209BBDB04DFE0AD89ABEBBB8EB08201F0044A9E901E2181E6B46A048B50
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2355fa578a4af7cf48d4a8ca254629ac80f33d749dc3de56677bb26ac5fa4006
                                                      • Instruction ID: 8011434dffe465312f29077f6b6dfb3062e81eec63551e03835cfbe3c2494fea
                                                      • Opcode Fuzzy Hash: 2355fa578a4af7cf48d4a8ca254629ac80f33d749dc3de56677bb26ac5fa4006
                                                      • Instruction Fuzzy Hash: 0922C170A00256CFDB24DF59D480ABEBBF1FF08300F1485A9E85A9B395E735AD85CB91
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00B4C966
                                                      • FindClose.KERNEL32(00000000), ref: 00B4C996
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID:
                                                      • API String ID: 2295610775-0
                                                      • Opcode ID: b7c540672fbf0f85dc2ecba5560b2dedbcbb9515c033c89f175eef7c56ce6ed7
                                                      • Instruction ID: a7ba629d857a473b163ea66f13a14c6844f55b8707999cd7b1ac6120139d2d9d
                                                      • Opcode Fuzzy Hash: b7c540672fbf0f85dc2ecba5560b2dedbcbb9515c033c89f175eef7c56ce6ed7
                                                      • Instruction Fuzzy Hash: B51161726106009FD710EF29D845A2AFBE9FF84324F00855EF8A9D73A1DB74AD01CB81
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00B5977D,?,00B6FB84,?), ref: 00B4A302
                                                      • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00B5977D,?,00B6FB84,?), ref: 00B4A314
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ErrorFormatLastMessage
                                                      • String ID:
                                                      • API String ID: 3479602957-0
                                                      • Opcode ID: dfbc3a0ed5d301c97802d9686be93a7e371ed0369ca2eb9ae4203ab4d017af0c
                                                      • Instruction ID: 0eacea2cd135fd6a8395929735f76c2f5ca774e9267c9c7e197934d01ec4c727
                                                      • Opcode Fuzzy Hash: dfbc3a0ed5d301c97802d9686be93a7e371ed0369ca2eb9ae4203ab4d017af0c
                                                      • Instruction Fuzzy Hash: F4F0823554822DABDB109FA4DC48FEA77ADFF08761F0082A5F918D7181EA709A44CBA1
                                                      APIs
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B38851), ref: 00B38728
                                                      • CloseHandle.KERNEL32(?,?,00B38851), ref: 00B3873A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                      • String ID:
                                                      • API String ID: 81990902-0
                                                      • Opcode ID: ca6a1bc96c3ac8ada9650ee83032ddd792b8a4da487ffca86ef1c718ff9e6863
                                                      • Instruction ID: 5af2d9f938106afd4ef2c7f936abecee78b2309a026b163d87151c0c4765a039
                                                      • Opcode Fuzzy Hash: ca6a1bc96c3ac8ada9650ee83032ddd792b8a4da487ffca86ef1c718ff9e6863
                                                      • Instruction Fuzzy Hash: D4E0B676014611EEE7252B64FC09D777BE9EB04350B248869F496814B0DBA2AC90DB50
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00B08F97,?,?,?,00000001), ref: 00B0A39A
                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00B0A3A3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 065a8caed0d7096cbc5e1c4824f02eaf05cc1ec211b83b2ff21fc83e8a82d0ab
                                                      • Instruction ID: cd7b914dc5b9083b53db049ae4c6fc14d312d75206e483b337b1245b45a576e0
                                                      • Opcode Fuzzy Hash: 065a8caed0d7096cbc5e1c4824f02eaf05cc1ec211b83b2ff21fc83e8a82d0ab
                                                      • Instruction Fuzzy Hash: 48B0923105820AABCA002B91FC09BA83F68EB44AA2F404020F70D862A0EFA654508A99
                                                      Strings
                                                      • Variable must be of type 'Object'., xrefs: 00B2428C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Variable must be of type 'Object'.
                                                      • API String ID: 0-109567571
                                                      • Opcode ID: f2c2aa67a76406f474609c1040b6a074f53087cdbc7ae504ef3fcc5281c17563
                                                      • Instruction ID: 53d50f793f3174bf7b967c3b8426f6e5abb8f532ec508a9969d6d79c94a3bfa4
                                                      • Opcode Fuzzy Hash: f2c2aa67a76406f474609c1040b6a074f53087cdbc7ae504ef3fcc5281c17563
                                                      • Instruction Fuzzy Hash: 75A2A274A04255CFCB24CF5AC980AAEB7F1FF59300F2481A9E91AAB351D735ED42CB91
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 07af707e14b5e8cef7a4f970e6b21910381a22d22f8746d0aa420d347fc023aa
                                                      • Instruction ID: 534c3eab7194cda88d90c10692a4f3de9253285fc67a3c789000bde8e7fcac0e
                                                      • Opcode Fuzzy Hash: 07af707e14b5e8cef7a4f970e6b21910381a22d22f8746d0aa420d347fc023aa
                                                      • Instruction Fuzzy Hash: 9632D122E69F424DD7339634D872335A699EFA63C4F15D737E819B6EA6EF2884C34100
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 58430cfc37dc2282771f18c17bfc81ed0ffcd595a0ed1451fbb931165d727e1e
                                                      • Instruction ID: 6097341b42849f7a14f6be20856f2de49e329beabd26fe3063bdc99f782c59c3
                                                      • Opcode Fuzzy Hash: 58430cfc37dc2282771f18c17bfc81ed0ffcd595a0ed1451fbb931165d727e1e
                                                      • Instruction Fuzzy Hash: 8BB1F120D2AF414DD2639A398875336B69CAFFB2C5F92D71BFC1A75D22EB2185C34141
                                                      APIs
                                                      • __time64.LIBCMT ref: 00B48B25
                                                        • Part of subcall function 00B0543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00B491F8,00000000,?,?,?,?,00B493A9,00000000,?), ref: 00B05443
                                                        • Part of subcall function 00B0543A: __aulldiv.LIBCMT ref: 00B05463
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Time$FileSystem__aulldiv__time64
                                                      • String ID:
                                                      • API String ID: 2893107130-0
                                                      • Opcode ID: 89c3d7f2bd3044f5cfec347c6a89d6b3d8d198d2677e2ffaf614444ceb8da2de
                                                      • Instruction ID: 9eff63d6d478d52f28e93c8a15e071c88beeaf440938693011bde94d4a9c7ffc
                                                      • Opcode Fuzzy Hash: 89c3d7f2bd3044f5cfec347c6a89d6b3d8d198d2677e2ffaf614444ceb8da2de
                                                      • Instruction Fuzzy Hash: C921E4726395108FC329CF25D841A56B3E1EBA5311F288E6CD0E5CB2D0CE75BD05DB94
                                                      APIs
                                                      • BlockInput.USER32(00000001), ref: 00B54218
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: BlockInput
                                                      • String ID:
                                                      • API String ID: 3456056419-0
                                                      • Opcode ID: ca3c0315c1193d75d1defa856d380787b6af22151adc730a2b69e2baca439c55
                                                      • Instruction ID: 86f91a206a18cbb4eea474ebef9659b9d9f323cd67e5aab83c84e877622a858b
                                                      • Opcode Fuzzy Hash: ca3c0315c1193d75d1defa856d380787b6af22151adc730a2b69e2baca439c55
                                                      • Instruction Fuzzy Hash: AEE04F712502149FC710EF5AE844A9BF7E8EF997A1F008066FC4AC7352DBB1E845CBA0
                                                      APIs
                                                      • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00B44F18
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: mouse_event
                                                      • String ID:
                                                      • API String ID: 2434400541-0
                                                      • Opcode ID: 064934f8809e8c1b6ead3a3d328576a3ed43ee08a38bfe294dd865928d8559b1
                                                      • Instruction ID: 7cc34056f94f41af46a5403f45a6b3ebe0afd09c5465b2b36d1da4b96a2f4938
                                                      • Opcode Fuzzy Hash: 064934f8809e8c1b6ead3a3d328576a3ed43ee08a38bfe294dd865928d8559b1
                                                      • Instruction Fuzzy Hash: A2D05EB016821538FC184B20AC0FF760188E341781F8449C9720A954C19AE56E38B035
                                                      APIs
                                                      • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00B388D1), ref: 00B38CB3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: LogonUser
                                                      • String ID:
                                                      • API String ID: 1244722697-0
                                                      • Opcode ID: 2aab1372eef548beba0fc4ac6e833a4e600d2a5da895062724fe81d1755c5620
                                                      • Instruction ID: c4486dc37eeef0b98556857207be3b08b23a8d3d2f9ff09391516a597dcfea20
                                                      • Opcode Fuzzy Hash: 2aab1372eef548beba0fc4ac6e833a4e600d2a5da895062724fe81d1755c5620
                                                      • Instruction Fuzzy Hash: 31D09E3226450EBBEF019EA4ED05EBE3B69EB04B01F408511FE15D61A1C7B5D935AB60
                                                      APIs
                                                      • GetUserNameW.ADVAPI32(?,?), ref: 00B22242
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: NameUser
                                                      • String ID:
                                                      • API String ID: 2645101109-0
                                                      • Opcode ID: 6030af1aaa8d6e5718a79b01a8e0281d157f11b832da8737a2842541bd9ec0a7
                                                      • Instruction ID: 4f2dea8ce8885ab2a2cef784252444038021a71ed3d40f34f9a5c9a8de939628
                                                      • Opcode Fuzzy Hash: 6030af1aaa8d6e5718a79b01a8e0281d157f11b832da8737a2842541bd9ec0a7
                                                      • Instruction Fuzzy Hash: 1CC04CF1801119DBDB05DF90E988DFE77BCAB04304F104495E105F2140D7749B448A71
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00B0A36A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 15df079b6f35f27285f1cc98b342e909a30cc0b7cf61006fc5c45e0c2fa1f62f
                                                      • Instruction ID: db4957c34b17d180044ab6f8217753857383ebd00bf7d36c99439382fa75fb31
                                                      • Opcode Fuzzy Hash: 15df079b6f35f27285f1cc98b342e909a30cc0b7cf61006fc5c45e0c2fa1f62f
                                                      • Instruction Fuzzy Hash: A5A0243000010DF7CF001F41FC044547F5CD7001D07004030F50C41131DF73541045C4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9d7862f35bb4bb48324af86fca8994ba362d06d6fe1d824c15fef974a4cde99c
                                                      • Instruction ID: 6c4500da2d8a606f88230cc48886f8f62fe070ecc7455aa50396bb44ebf2dbb0
                                                      • Opcode Fuzzy Hash: 9d7862f35bb4bb48324af86fca8994ba362d06d6fe1d824c15fef974a4cde99c
                                                      • Instruction Fuzzy Hash: 81220770605659CBDF388BA4C4D467D77F1EB02344F7544AAFA928B291DB3C9D82CB60
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                      • Instruction ID: b13b6e4d1fdc45eb3e9a78678d31cb983004fd93f8ad38425a07be535680a3fb
                                                      • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                      • Instruction Fuzzy Hash: B4C1803220519309DB2D473D957813EBEE19AA27F171A0BDDE8B3CB5D5EF20D928D620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                      • Instruction ID: 09672fc9ef5b61cd007f765ab44240405ce867648844c30e289befda350f0d38
                                                      • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                      • Instruction Fuzzy Hash: 82C1833220519309DF6D473D957813EBFE19AA27F131A0BEDE4B2DB5D4EF20D5289620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                      • Instruction ID: c8c8b1fea45cdae8b85ceaf68def85ffae7563d2fee4cb0536356e48f7c64b3d
                                                      • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                      • Instruction Fuzzy Hash: 3EC16F322091930ADB2D463ED57413EBEE1DAA27F131A0FEDE4B2CB5D4EF20D5649620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1698283062.0000000001368000.00000040.00000020.00020000.00000000.sdmp, Offset: 01368000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1368000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                      • Instruction ID: dd3b83d29103128a53c5a3f03e0e6b823bc2d812a49f3d15b7a5ffeb6c48f566
                                                      • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                      • Instruction Fuzzy Hash: 0F41C271D1051CEBCF48CFADC991AEEBBF2AF88201F548299D556AB345D730AB41DB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1698283062.0000000001368000.00000040.00000020.00020000.00000000.sdmp, Offset: 01368000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1368000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                      • Instruction ID: 0c4bd002b51f63096d111f90f26a1fe2d56061898830e80e3f744172d16c0e33
                                                      • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                      • Instruction Fuzzy Hash: 4B019278A00209EFCB44DF98C5909AEF7BAFF48314F208599D859A7705D731AE41DB90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1698283062.0000000001368000.00000040.00000020.00020000.00000000.sdmp, Offset: 01368000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1368000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                      • Instruction ID: de54cef011a0a3932f2d78149fb19e55979248cf093db62476e2753399083c7c
                                                      • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                      • Instruction Fuzzy Hash: 84019278A00109EFCB44DF98C5909AEF7BAFF48314F20869AD859A7705D730AE41DB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1698283062.0000000001368000.00000040.00000020.00020000.00000000.sdmp, Offset: 01368000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1368000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                      • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                      • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                      • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 00B57B70
                                                      • DeleteObject.GDI32(00000000), ref: 00B57B82
                                                      • DestroyWindow.USER32 ref: 00B57B90
                                                      • GetDesktopWindow.USER32 ref: 00B57BAA
                                                      • GetWindowRect.USER32(00000000), ref: 00B57BB1
                                                      • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00B57CF2
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00B57D02
                                                      • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57D4A
                                                      • GetClientRect.USER32(00000000,?), ref: 00B57D56
                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00B57D90
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57DB2
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57DC5
                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57DD0
                                                      • GlobalLock.KERNEL32(00000000), ref: 00B57DD9
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57DE8
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00B57DF1
                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57DF8
                                                      • GlobalFree.KERNEL32(00000000), ref: 00B57E03
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57E15
                                                      • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00B72CAC,00000000), ref: 00B57E2B
                                                      • GlobalFree.KERNEL32(00000000), ref: 00B57E3B
                                                      • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00B57E61
                                                      • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00B57E80
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B57EA2
                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B5808F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                      • String ID: $AutoIt v3$DISPLAY$static
                                                      • API String ID: 2211948467-2373415609
                                                      • Opcode ID: 580945c40d9375ac14a92a4963c132523fd95420ce3667a6be43599803389d83
                                                      • Instruction ID: 3a845b52e49828ea88ea53d8563354a2ad54f4c1720dbacfb3fbc9d33cee1c5e
                                                      • Opcode Fuzzy Hash: 580945c40d9375ac14a92a4963c132523fd95420ce3667a6be43599803389d83
                                                      • Instruction Fuzzy Hash: E9028D71A00215EFDB14DF64ED89EAE7BB9FF49311F148198F915AB2A1CB74AD00CB60
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,00B6F910), ref: 00B638AF
                                                      • IsWindowVisible.USER32(?), ref: 00B638D3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpperVisibleWindow
                                                      • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                      • API String ID: 4105515805-45149045
                                                      • Opcode ID: 616ddb4f29a1ee9dab28c3d638e08c1477f70d5a615b9d1e00e869a97e054468
                                                      • Instruction ID: fbae088cdb64db627801e128f100d1c175fa603f89ab4b0dd5793329081e3930
                                                      • Opcode Fuzzy Hash: 616ddb4f29a1ee9dab28c3d638e08c1477f70d5a615b9d1e00e869a97e054468
                                                      • Instruction Fuzzy Hash: 8FD17F30218305ABCB14EF11C591A6EBBE1EF94B44F1445E8F8865B3E2CB75EE0ACB51
                                                      APIs
                                                      • SetTextColor.GDI32(?,00000000), ref: 00B6A89F
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00B6A8D0
                                                      • GetSysColor.USER32(0000000F), ref: 00B6A8DC
                                                      • SetBkColor.GDI32(?,000000FF), ref: 00B6A8F6
                                                      • SelectObject.GDI32(?,?), ref: 00B6A905
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00B6A930
                                                      • GetSysColor.USER32(00000010), ref: 00B6A938
                                                      • CreateSolidBrush.GDI32(00000000), ref: 00B6A93F
                                                      • FrameRect.USER32(?,?,00000000), ref: 00B6A94E
                                                      • DeleteObject.GDI32(00000000), ref: 00B6A955
                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 00B6A9A0
                                                      • FillRect.USER32(?,?,?), ref: 00B6A9D2
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00B6A9FD
                                                        • Part of subcall function 00B6AB60: GetSysColor.USER32(00000012), ref: 00B6AB99
                                                        • Part of subcall function 00B6AB60: SetTextColor.GDI32(?,?), ref: 00B6AB9D
                                                        • Part of subcall function 00B6AB60: GetSysColorBrush.USER32(0000000F), ref: 00B6ABB3
                                                        • Part of subcall function 00B6AB60: GetSysColor.USER32(0000000F), ref: 00B6ABBE
                                                        • Part of subcall function 00B6AB60: GetSysColor.USER32(00000011), ref: 00B6ABDB
                                                        • Part of subcall function 00B6AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B6ABE9
                                                        • Part of subcall function 00B6AB60: SelectObject.GDI32(?,00000000), ref: 00B6ABFA
                                                        • Part of subcall function 00B6AB60: SetBkColor.GDI32(?,00000000), ref: 00B6AC03
                                                        • Part of subcall function 00B6AB60: SelectObject.GDI32(?,?), ref: 00B6AC10
                                                        • Part of subcall function 00B6AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00B6AC2F
                                                        • Part of subcall function 00B6AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B6AC46
                                                        • Part of subcall function 00B6AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00B6AC5B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                      • String ID:
                                                      • API String ID: 4124339563-0
                                                      • Opcode ID: 095be60d8e7bc5b21c5089f29b8c74ba97568300cc8c2c321f1868bef44158e9
                                                      • Instruction ID: afc9759ebb9f094afb669849386e47453cf3ad8d41350a6d9723817335b064fa
                                                      • Opcode Fuzzy Hash: 095be60d8e7bc5b21c5089f29b8c74ba97568300cc8c2c321f1868bef44158e9
                                                      • Instruction Fuzzy Hash: DEA17472408302AFDB109F64EC48A6B7BE9FF89321F104A29F552A71E1DB79D944CF52
                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?), ref: 00AE2CA2
                                                      • DeleteObject.GDI32(00000000), ref: 00AE2CE8
                                                      • DeleteObject.GDI32(00000000), ref: 00AE2CF3
                                                      • DestroyIcon.USER32(00000000,?,?,?), ref: 00AE2CFE
                                                      • DestroyWindow.USER32(00000000,?,?,?), ref: 00AE2D09
                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 00B1C68B
                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00B1C6C4
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00B1CAED
                                                        • Part of subcall function 00AE1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AE2036,?,00000000,?,?,?,?,00AE16CB,00000000,?), ref: 00AE1B9A
                                                      • SendMessageW.USER32(?,00001053), ref: 00B1CB2A
                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00B1CB41
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00B1CB57
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00B1CB62
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                      • String ID: 0
                                                      • API String ID: 464785882-4108050209
                                                      • Opcode ID: 69fae1537e89e096493d99fad504458a85ee3e3f195ed82e55b30eb5a97eba18
                                                      • Instruction ID: 55b7b825f47dac8a8fa9dbbf7b54e51d11ba21e97fffe71f5ecc899988374799
                                                      • Opcode Fuzzy Hash: 69fae1537e89e096493d99fad504458a85ee3e3f195ed82e55b30eb5a97eba18
                                                      • Instruction Fuzzy Hash: 1012AF30644241EFDB11CF24C884BB9BBE5FF45310FA445A9E596DB2A2CB71EC81CB91
                                                      APIs
                                                      • DestroyWindow.USER32(00000000), ref: 00B577F1
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00B578B0
                                                      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00B578EE
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00B57900
                                                      • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00B57946
                                                      • GetClientRect.USER32(00000000,?), ref: 00B57952
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00B57996
                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00B579A5
                                                      • GetStockObject.GDI32(00000011), ref: 00B579B5
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00B579B9
                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00B579C9
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B579D2
                                                      • DeleteDC.GDI32(00000000), ref: 00B579DB
                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00B57A07
                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 00B57A1E
                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00B57A59
                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00B57A6D
                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 00B57A7E
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00B57AAE
                                                      • GetStockObject.GDI32(00000011), ref: 00B57AB9
                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00B57AC4
                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00B57ACE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                      • API String ID: 2910397461-517079104
                                                      • Opcode ID: ef577038f10b91f7e40b646ab704b5f59be54d3cabeaade80405888cc40e4f07
                                                      • Instruction ID: af521fdefce7d608e4623568f9bf5e8539ab0a1fde3b77c0cf7630fe9ddeac22
                                                      • Opcode Fuzzy Hash: ef577038f10b91f7e40b646ab704b5f59be54d3cabeaade80405888cc40e4f07
                                                      • Instruction Fuzzy Hash: 2FA181B1A40219BFEB14DBA5DC4AFAE7BA9EB49710F144154FA14A71E0CBB4AD00CB60
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00B4AF89
                                                      • GetDriveTypeW.KERNEL32(?,00B6FAC0,?,\\.\,00B6F910), ref: 00B4B066
                                                      • SetErrorMode.KERNEL32(00000000,00B6FAC0,?,\\.\,00B6F910), ref: 00B4B1C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DriveType
                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                      • API String ID: 2907320926-4222207086
                                                      • Opcode ID: 91dadf22fc4cc7ec949f2439bee37a0f923ccf91d2dd165825dd5c5e9329b076
                                                      • Instruction ID: d58ceda50a705dd554ec5f5cb341684e7e782edb78027d6ad4ea74982996fb25
                                                      • Opcode Fuzzy Hash: 91dadf22fc4cc7ec949f2439bee37a0f923ccf91d2dd165825dd5c5e9329b076
                                                      • Instruction Fuzzy Hash: 68518130694345ABCF04DB50CAA2E7D73F1EB54741B2040E5E60AB72A1DB79DF41EB82
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp
                                                      • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                      • API String ID: 1038674560-86951937
                                                      • Opcode ID: 0a47c3479a79cb2e1430c084039cf56dcc70600ba912942d87e1a64ef2f850e3
                                                      • Instruction ID: cad6aa7448602a9f816aa932349223fe73b57eac320eadb0492f514eac3ffdbf
                                                      • Opcode Fuzzy Hash: 0a47c3479a79cb2e1430c084039cf56dcc70600ba912942d87e1a64ef2f850e3
                                                      • Instruction Fuzzy Hash: DB812B70740285BADB20AF61DD86FBE7BE8EF25740F0444A5FD45AB1D2EB60DE41C2A1
                                                      APIs
                                                      • GetSysColor.USER32(00000012), ref: 00B6AB99
                                                      • SetTextColor.GDI32(?,?), ref: 00B6AB9D
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00B6ABB3
                                                      • GetSysColor.USER32(0000000F), ref: 00B6ABBE
                                                      • CreateSolidBrush.GDI32(?), ref: 00B6ABC3
                                                      • GetSysColor.USER32(00000011), ref: 00B6ABDB
                                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B6ABE9
                                                      • SelectObject.GDI32(?,00000000), ref: 00B6ABFA
                                                      • SetBkColor.GDI32(?,00000000), ref: 00B6AC03
                                                      • SelectObject.GDI32(?,?), ref: 00B6AC10
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00B6AC2F
                                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B6AC46
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00B6AC5B
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B6ACA7
                                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00B6ACCE
                                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 00B6ACEC
                                                      • DrawFocusRect.USER32(?,?), ref: 00B6ACF7
                                                      • GetSysColor.USER32(00000011), ref: 00B6AD05
                                                      • SetTextColor.GDI32(?,00000000), ref: 00B6AD0D
                                                      • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00B6AD21
                                                      • SelectObject.GDI32(?,00B6A869), ref: 00B6AD38
                                                      • DeleteObject.GDI32(?), ref: 00B6AD43
                                                      • SelectObject.GDI32(?,?), ref: 00B6AD49
                                                      • DeleteObject.GDI32(?), ref: 00B6AD4E
                                                      • SetTextColor.GDI32(?,?), ref: 00B6AD54
                                                      • SetBkColor.GDI32(?,?), ref: 00B6AD5E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                      • String ID:
                                                      • API String ID: 1996641542-0
                                                      • Opcode ID: 810b43c9465efb94b168ae8bc60ae6e3c5d80c4e10ca0676b2fc5db8c2578db5
                                                      • Instruction ID: 608ae1ed445076c3494a7e466e106dfe4a36ab328120be5193ee320f3098ae70
                                                      • Opcode Fuzzy Hash: 810b43c9465efb94b168ae8bc60ae6e3c5d80c4e10ca0676b2fc5db8c2578db5
                                                      • Instruction Fuzzy Hash: CE615F71900219AFDF119FA4EC48AAE7BB9FF08320F144165F915BB2E1DAB99D40DF90
                                                      APIs
                                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00B68D34
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B68D45
                                                      • CharNextW.USER32(0000014E), ref: 00B68D74
                                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00B68DB5
                                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00B68DCB
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B68DDC
                                                      • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00B68DF9
                                                      • SetWindowTextW.USER32(?,0000014E), ref: 00B68E45
                                                      • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00B68E5B
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B68E8C
                                                      • _memset.LIBCMT ref: 00B68EB1
                                                      • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00B68EFA
                                                      • _memset.LIBCMT ref: 00B68F59
                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00B68F83
                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 00B68FDB
                                                      • SendMessageW.USER32(?,0000133D,?,?), ref: 00B69088
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00B690AA
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B690F4
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B69121
                                                      • DrawMenuBar.USER32(?), ref: 00B69130
                                                      • SetWindowTextW.USER32(?,0000014E), ref: 00B69158
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                      • String ID: 0
                                                      • API String ID: 1073566785-4108050209
                                                      • Opcode ID: 6a88d3c6cc14e7df84fbd2ff05f20f009bbb2d7259f8d9378f3d4d96844c16b9
                                                      • Instruction ID: 37d98acc9ceb82c0ff52f5a4ba1b4474606b78ea64f1083e2b92462569db2b74
                                                      • Opcode Fuzzy Hash: 6a88d3c6cc14e7df84fbd2ff05f20f009bbb2d7259f8d9378f3d4d96844c16b9
                                                      • Instruction Fuzzy Hash: 3FE15070901219ABDF209F54DC88EEE7BF9EF05710F148299F915AB1E0DB788A85DF60
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 00B64C51
                                                      • GetDesktopWindow.USER32 ref: 00B64C66
                                                      • GetWindowRect.USER32(00000000), ref: 00B64C6D
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00B64CCF
                                                      • DestroyWindow.USER32(?), ref: 00B64CFB
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00B64D24
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B64D42
                                                      • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00B64D68
                                                      • SendMessageW.USER32(?,00000421,?,?), ref: 00B64D7D
                                                      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00B64D90
                                                      • IsWindowVisible.USER32(?), ref: 00B64DB0
                                                      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00B64DCB
                                                      • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00B64DDF
                                                      • GetWindowRect.USER32(?,?), ref: 00B64DF7
                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00B64E1D
                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 00B64E37
                                                      • CopyRect.USER32(?,?), ref: 00B64E4E
                                                      • SendMessageW.USER32(?,00000412,00000000), ref: 00B64EB9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                      • String ID: ($0$tooltips_class32
                                                      • API String ID: 698492251-4156429822
                                                      • Opcode ID: 673862f1328e7624ae96c5d555ae6b9a6cff30fa9c5de8ebd0cd270223c9ffef
                                                      • Instruction ID: 22eec5dcb17b97b77cd2b7c786af129106534c6964ff96e18dd1f17e80332d20
                                                      • Opcode Fuzzy Hash: 673862f1328e7624ae96c5d555ae6b9a6cff30fa9c5de8ebd0cd270223c9ffef
                                                      • Instruction Fuzzy Hash: 9EB16871608741AFDB04DF25D984B6ABBE4FF88310F00896CF5999B2A1DB75EC04CB91
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AE28BC
                                                      • GetSystemMetrics.USER32(00000007), ref: 00AE28C4
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AE28EF
                                                      • GetSystemMetrics.USER32(00000008), ref: 00AE28F7
                                                      • GetSystemMetrics.USER32(00000004), ref: 00AE291C
                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00AE2939
                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00AE2949
                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00AE297C
                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00AE2990
                                                      • GetClientRect.USER32(00000000,000000FF), ref: 00AE29AE
                                                      • GetStockObject.GDI32(00000011), ref: 00AE29CA
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00AE29D5
                                                        • Part of subcall function 00AE2344: GetCursorPos.USER32(?), ref: 00AE2357
                                                        • Part of subcall function 00AE2344: ScreenToClient.USER32(00BA67B0,?), ref: 00AE2374
                                                        • Part of subcall function 00AE2344: GetAsyncKeyState.USER32(00000001), ref: 00AE2399
                                                        • Part of subcall function 00AE2344: GetAsyncKeyState.USER32(00000002), ref: 00AE23A7
                                                      • SetTimer.USER32(00000000,00000000,00000028,00AE1256), ref: 00AE29FC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                      • String ID: AutoIt v3 GUI
                                                      • API String ID: 1458621304-248962490
                                                      • Opcode ID: d42890ca9f9b069d67b923665f537218f202ea8db67234c0b816adcac4864cc6
                                                      • Instruction ID: 01c358df692bbb52af3bce59b2599021fd0728fe722cfdacc73ed6c114c633c9
                                                      • Opcode Fuzzy Hash: d42890ca9f9b069d67b923665f537218f202ea8db67234c0b816adcac4864cc6
                                                      • Instruction Fuzzy Hash: 4EB14C71A4024AEFDB14DFA9EC45BAE7BB8FB08314F108129FA16A72D0DB749950CB54
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 00B640F6
                                                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00B641B6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: BuffCharMessageSendUpper
                                                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                      • API String ID: 3974292440-719923060
                                                      • Opcode ID: 229d68207fe17666d2cb5117043b8cb59b94e0d21370aa137cf5e11b98929ae3
                                                      • Instruction ID: 1709bd2f28095daf4a393dce55804fa3cb3af46c3afba0cdfd4646eaa3e1005d
                                                      • Opcode Fuzzy Hash: 229d68207fe17666d2cb5117043b8cb59b94e0d21370aa137cf5e11b98929ae3
                                                      • Instruction Fuzzy Hash: 4EA16B302247419FCB14EF20CA91A6AB7E5EF95314F2449BCB8A69B3D2DB74EC05CB51
                                                      APIs
                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 00B55309
                                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 00B55314
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00B5531F
                                                      • LoadCursorW.USER32(00000000,00007F03), ref: 00B5532A
                                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 00B55335
                                                      • LoadCursorW.USER32(00000000,00007F01), ref: 00B55340
                                                      • LoadCursorW.USER32(00000000,00007F81), ref: 00B5534B
                                                      • LoadCursorW.USER32(00000000,00007F88), ref: 00B55356
                                                      • LoadCursorW.USER32(00000000,00007F80), ref: 00B55361
                                                      • LoadCursorW.USER32(00000000,00007F86), ref: 00B5536C
                                                      • LoadCursorW.USER32(00000000,00007F83), ref: 00B55377
                                                      • LoadCursorW.USER32(00000000,00007F85), ref: 00B55382
                                                      • LoadCursorW.USER32(00000000,00007F82), ref: 00B5538D
                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 00B55398
                                                      • LoadCursorW.USER32(00000000,00007F04), ref: 00B553A3
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00B553AE
                                                      • GetCursorInfo.USER32(?), ref: 00B553BE
                                                      • GetLastError.KERNEL32(00000001,00000000), ref: 00B553E9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Cursor$Load$ErrorInfoLast
                                                      • String ID:
                                                      • API String ID: 3215588206-0
                                                      • Opcode ID: 61562f42dcc5f7749a43c843cbbc7e5db4241597875576799bc043dde9087085
                                                      • Instruction ID: 4da55b1343442a8ffb7707cae587ffff2613a0b0b03e2afad92da366dd4783b6
                                                      • Opcode Fuzzy Hash: 61562f42dcc5f7749a43c843cbbc7e5db4241597875576799bc043dde9087085
                                                      • Instruction Fuzzy Hash: 39416470E043196ADB209FBA8C4996FFFF8EF51B51F10456FE509E7290DAB8A401CE61
                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00B3AAA5
                                                      • __swprintf.LIBCMT ref: 00B3AB46
                                                      • _wcscmp.LIBCMT ref: 00B3AB59
                                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00B3ABAE
                                                      • _wcscmp.LIBCMT ref: 00B3ABEA
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00B3AC21
                                                      • GetDlgCtrlID.USER32(?), ref: 00B3AC73
                                                      • GetWindowRect.USER32(?,?), ref: 00B3ACA9
                                                      • GetParent.USER32(?), ref: 00B3ACC7
                                                      • ScreenToClient.USER32(00000000), ref: 00B3ACCE
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00B3AD48
                                                      • _wcscmp.LIBCMT ref: 00B3AD5C
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00B3AD82
                                                      • _wcscmp.LIBCMT ref: 00B3AD96
                                                        • Part of subcall function 00B0386C: _iswctype.LIBCMT ref: 00B03874
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                      • String ID: %s%u
                                                      • API String ID: 3744389584-679674701
                                                      • Opcode ID: da807694889e3e5a2d1b8462fc51ac4f061560ec2dbac82221f0f312c5025814
                                                      • Instruction ID: ba87fbb7e6969cf24e9c3ec05d984fe506d5abcd897384d6bb8609e057401389
                                                      • Opcode Fuzzy Hash: da807694889e3e5a2d1b8462fc51ac4f061560ec2dbac82221f0f312c5025814
                                                      • Instruction Fuzzy Hash: C8A1BE71204706ABDB15DF24C884FAABBE8FF04315F3086A9F9D9D2590DB30E955CB92
                                                      APIs
                                                      • GetClassNameW.USER32(00000008,?,00000400), ref: 00B3B3DB
                                                      • _wcscmp.LIBCMT ref: 00B3B3EC
                                                      • GetWindowTextW.USER32(00000001,?,00000400), ref: 00B3B414
                                                      • CharUpperBuffW.USER32(?,00000000), ref: 00B3B431
                                                      • _wcscmp.LIBCMT ref: 00B3B44F
                                                      • _wcsstr.LIBCMT ref: 00B3B460
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00B3B498
                                                      • _wcscmp.LIBCMT ref: 00B3B4A8
                                                      • GetWindowTextW.USER32(00000002,?,00000400), ref: 00B3B4CF
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00B3B518
                                                      • _wcscmp.LIBCMT ref: 00B3B528
                                                      • GetClassNameW.USER32(00000010,?,00000400), ref: 00B3B550
                                                      • GetWindowRect.USER32(00000004,?), ref: 00B3B5B9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                      • String ID: @$ThumbnailClass
                                                      • API String ID: 1788623398-1539354611
                                                      • Opcode ID: 55919a106c7a730f449309ef12d25d230c24e7e2828bf066fd433681a0d8b3d7
                                                      • Instruction ID: 68e59aafb991e8821dfa8619a8bc203b20e63b8d85d8face13cb6f2b063e730d
                                                      • Opcode Fuzzy Hash: 55919a106c7a730f449309ef12d25d230c24e7e2828bf066fd433681a0d8b3d7
                                                      • Instruction Fuzzy Hash: B781D1720083069BDB01CF10D885FBABBE8FF54314F2485A9FE898A19ADB34DD45CB61
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp
                                                      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                      • API String ID: 1038674560-1810252412
                                                      • Opcode ID: cc1a3083a5db60da62828d069e956ec4b4add3cb8584b6f537b6b5db177be51f
                                                      • Instruction ID: 02d4e5912970582b536f8bd38e054111ce04c2d2031fc0e8720cf1f700730233
                                                      • Opcode Fuzzy Hash: cc1a3083a5db60da62828d069e956ec4b4add3cb8584b6f537b6b5db177be51f
                                                      • Instruction Fuzzy Hash: C631B231A04245A6DF14FAA5DE83EEE7BE8AF14B50F7001BDF511720E6EF616E04C551
                                                      APIs
                                                      • LoadIconW.USER32(00000063), ref: 00B3C4D4
                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00B3C4E6
                                                      • SetWindowTextW.USER32(?,?), ref: 00B3C4FD
                                                      • GetDlgItem.USER32(?,000003EA), ref: 00B3C512
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00B3C518
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00B3C528
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00B3C52E
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00B3C54F
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00B3C569
                                                      • GetWindowRect.USER32(?,?), ref: 00B3C572
                                                      • SetWindowTextW.USER32(?,?), ref: 00B3C5DD
                                                      • GetDesktopWindow.USER32 ref: 00B3C5E3
                                                      • GetWindowRect.USER32(00000000), ref: 00B3C5EA
                                                      • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00B3C636
                                                      • GetClientRect.USER32(?,?), ref: 00B3C643
                                                      • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00B3C668
                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00B3C693
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                      • String ID:
                                                      • API String ID: 3869813825-0
                                                      • Opcode ID: 14867dab4ebcfc9f430fdb71c19f9d6c3826115bb9fd43a4fcc01704e2536ac2
                                                      • Instruction ID: 9c9aa11256d140f66452fe329becaba77f84520b80a0dad67dc48751b3bb5e22
                                                      • Opcode Fuzzy Hash: 14867dab4ebcfc9f430fdb71c19f9d6c3826115bb9fd43a4fcc01704e2536ac2
                                                      • Instruction Fuzzy Hash: BD51717190070AAFDB20DFA8DD86B7EBBF5FF04705F104568E696A35A0CBB4A904CB50
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B6A4C8
                                                      • DestroyWindow.USER32(?,?), ref: 00B6A542
                                                        • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00B6A5BC
                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00B6A5DE
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B6A5F1
                                                      • DestroyWindow.USER32(00000000), ref: 00B6A613
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00AE0000,00000000), ref: 00B6A64A
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B6A663
                                                      • GetDesktopWindow.USER32 ref: 00B6A67C
                                                      • GetWindowRect.USER32(00000000), ref: 00B6A683
                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B6A69B
                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00B6A6B3
                                                        • Part of subcall function 00AE25DB: GetWindowLongW.USER32(?,000000EB), ref: 00AE25EC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                      • String ID: 0$tooltips_class32
                                                      • API String ID: 1297703922-3619404913
                                                      • Opcode ID: a104e43c4c627946a5660f0977ef7a610379c813b039bf4b1f53bbf7b22fa7c7
                                                      • Instruction ID: 69a3ca33d557904a1ab875a821d04385ca68417b06b04a796471e80a55b0525f
                                                      • Opcode Fuzzy Hash: a104e43c4c627946a5660f0977ef7a610379c813b039bf4b1f53bbf7b22fa7c7
                                                      • Instruction Fuzzy Hash: EB719A71140245AFDB20CF28DC49F6A7BE9FB89700F08456DF995972A0DBB8E912CF12
                                                      APIs
                                                        • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                                                      • DragQueryPoint.SHELL32(?,?), ref: 00B6C917
                                                        • Part of subcall function 00B6ADF1: ClientToScreen.USER32(?,?), ref: 00B6AE1A
                                                        • Part of subcall function 00B6ADF1: GetWindowRect.USER32(?,?), ref: 00B6AE90
                                                        • Part of subcall function 00B6ADF1: PtInRect.USER32(?,?,00B6C304), ref: 00B6AEA0
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00B6C980
                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00B6C98B
                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00B6C9AE
                                                      • _wcscat.LIBCMT ref: 00B6C9DE
                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00B6C9F5
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00B6CA0E
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00B6CA25
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00B6CA47
                                                      • DragFinish.SHELL32(?), ref: 00B6CA4E
                                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00B6CB41
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                      • API String ID: 169749273-3440237614
                                                      • Opcode ID: dce65cba674f55959e6321653c1461baa56d057528c7c0bb81011920c7f42d96
                                                      • Instruction ID: 8f86222eaedc501579f2d4c2aa0083c2736b73200db6206b9f2676d70f6b2f93
                                                      • Opcode Fuzzy Hash: dce65cba674f55959e6321653c1461baa56d057528c7c0bb81011920c7f42d96
                                                      • Instruction Fuzzy Hash: 9E619A71108341AFC701DF64DC85DAFBBE8EF89350F000A6EF5A5932A1DB749A09CB62
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 00B646AB
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B646F6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: BuffCharMessageSendUpper
                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                      • API String ID: 3974292440-4258414348
                                                      • Opcode ID: cc7939fbf4bf8448b4f7a4a1f7e5a138b5b56b0ac41a767764da31c12bcaa1be
                                                      • Instruction ID: 751f954c144d0096cee3441800f2bb72c02ea3e158881917321f3d5e074a7199
                                                      • Opcode Fuzzy Hash: cc7939fbf4bf8448b4f7a4a1f7e5a138b5b56b0ac41a767764da31c12bcaa1be
                                                      • Instruction Fuzzy Hash: E7918F342047419FCB14EF21C591A6ABBE1EF95354F1448ECF8965B3A2CB34ED4ACB91
                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00B6BB6E
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00B66D80,?), ref: 00B6BBCA
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B6BC03
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00B6BC46
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B6BC7D
                                                      • FreeLibrary.KERNEL32(?), ref: 00B6BC89
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B6BC99
                                                      • DestroyIcon.USER32(?), ref: 00B6BCA8
                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00B6BCC5
                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00B6BCD1
                                                        • Part of subcall function 00B0313D: __wcsicmp_l.LIBCMT ref: 00B031C6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                      • String ID: .dll$.exe$.icl
                                                      • API String ID: 1212759294-1154884017
                                                      • Opcode ID: 93aad7d21dcd35898aa2cf59ecb0991d4a32df7d5d2f8ea5ad7728d6a2097096
                                                      • Instruction ID: a3f45355a94fbc4a872cfbd57e5fe4b306153fffde6a7c849ebf0e9f60b817c9
                                                      • Opcode Fuzzy Hash: 93aad7d21dcd35898aa2cf59ecb0991d4a32df7d5d2f8ea5ad7728d6a2097096
                                                      • Instruction Fuzzy Hash: 7A61B071900219BEEB14DF64DC85FBA7BF8FB08710F104195F915D61D1DBB89A90DBA0
                                                      APIs
                                                        • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                                                        • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                                                      • CharLowerBuffW.USER32(?,?), ref: 00B4A636
                                                      • GetDriveTypeW.KERNEL32 ref: 00B4A683
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B4A6CB
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B4A702
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B4A730
                                                        • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                      • API String ID: 2698844021-4113822522
                                                      • Opcode ID: f838bc12c3d2f18eb7bf1769c68d1d9f2091ab4dc40000685970b5f6c3fe7283
                                                      • Instruction ID: 818a88809957b249a698596b7c9a458c1f87015bcf82531534f1fdc55a499d1a
                                                      • Opcode Fuzzy Hash: f838bc12c3d2f18eb7bf1769c68d1d9f2091ab4dc40000685970b5f6c3fe7283
                                                      • Instruction Fuzzy Hash: BB518C711083459FC700EF25C99186AB7F8FF98758F0449ACF896572A1DB31EE0ACB92
                                                      APIs
                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00B4A47A
                                                      • __swprintf.LIBCMT ref: 00B4A49C
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00B4A4D9
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00B4A4FE
                                                      • _memset.LIBCMT ref: 00B4A51D
                                                      • _wcsncpy.LIBCMT ref: 00B4A559
                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00B4A58E
                                                      • CloseHandle.KERNEL32(00000000), ref: 00B4A599
                                                      • RemoveDirectoryW.KERNEL32(?), ref: 00B4A5A2
                                                      • CloseHandle.KERNEL32(00000000), ref: 00B4A5AC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                      • String ID: :$\$\??\%s
                                                      • API String ID: 2733774712-3457252023
                                                      • Opcode ID: 229c3055cd58c54a5984cd9ca2e9489667cacde4b3af807d6b9fba97c5debbda
                                                      • Instruction ID: 338336a1464624ec881ac45dbb7d0edc07ba2a853f8b144fd10170aa382c1a3d
                                                      • Opcode Fuzzy Hash: 229c3055cd58c54a5984cd9ca2e9489667cacde4b3af807d6b9fba97c5debbda
                                                      • Instruction Fuzzy Hash: 87318FB554010AAADB219FA0DC49FAB77BCEF88701F1041F6F908D61A0EBB497448B25
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                                                      • String ID:
                                                      • API String ID: 884005220-0
                                                      • Opcode ID: cff319300417cd1f722bbea4a5f818bc34f75cbf7c3d5b7f842acc71e3ad8b95
                                                      • Instruction ID: 9ba839d13b2a7400e39392b8746783392cc7d8132d5fc1fd19ba09db03823238
                                                      • Opcode Fuzzy Hash: cff319300417cd1f722bbea4a5f818bc34f75cbf7c3d5b7f842acc71e3ad8b95
                                                      • Instruction Fuzzy Hash: 36611772506301AFDB205F24EC42BAA7BE9EF51721F9042E9E8019B1D1DB74EDC1C792
                                                      APIs
                                                      • __wsplitpath.LIBCMT ref: 00B4DC7B
                                                      • _wcscat.LIBCMT ref: 00B4DC93
                                                      • _wcscat.LIBCMT ref: 00B4DCA5
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B4DCBA
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00B4DCCE
                                                      • GetFileAttributesW.KERNEL32(?), ref: 00B4DCE6
                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00B4DD00
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00B4DD12
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                      • String ID: *.*
                                                      • API String ID: 34673085-438819550
                                                      • Opcode ID: 3fb82f565047b5ea58fa6a7a6e7cf363235fe964896f364a7190155671d5b658
                                                      • Instruction ID: 4ef8baa801a3cc8bf755d3098f4e0b645a707cdc508832bd2fbe6a44ce6712e3
                                                      • Opcode Fuzzy Hash: 3fb82f565047b5ea58fa6a7a6e7cf363235fe964896f364a7190155671d5b658
                                                      • Instruction Fuzzy Hash: 798193716043419FCB24EF64C8859AAB7E8FF88350F158CAEF885C7251E770DA44DB52
                                                      APIs
                                                        • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B6C4EC
                                                      • GetFocus.USER32 ref: 00B6C4FC
                                                      • GetDlgCtrlID.USER32(00000000), ref: 00B6C507
                                                      • _memset.LIBCMT ref: 00B6C632
                                                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00B6C65D
                                                      • GetMenuItemCount.USER32(?), ref: 00B6C67D
                                                      • GetMenuItemID.USER32(?,00000000), ref: 00B6C690
                                                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00B6C6C4
                                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00B6C70C
                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B6C744
                                                      • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00B6C779
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                      • String ID: 0
                                                      • API String ID: 1296962147-4108050209
                                                      • Opcode ID: 430fc3b46517e71e05324078bd5cc6558d277275fc0e74a340fb6016a4e681a5
                                                      • Instruction ID: 57eaecab4337dca3b08af0d58fb0ae31f99d792c1942269012a548ecd407b430
                                                      • Opcode Fuzzy Hash: 430fc3b46517e71e05324078bd5cc6558d277275fc0e74a340fb6016a4e681a5
                                                      • Instruction Fuzzy Hash: A0818D712083019FD710CF24D985A7BBBE8FB98314F1045AEF99697291DB78DD05CBA2
                                                      APIs
                                                        • Part of subcall function 00B3874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B38766
                                                        • Part of subcall function 00B3874A: GetLastError.KERNEL32(?,00B3822A,?,?,?), ref: 00B38770
                                                        • Part of subcall function 00B3874A: GetProcessHeap.KERNEL32(00000008,?,?,00B3822A,?,?,?), ref: 00B3877F
                                                        • Part of subcall function 00B3874A: HeapAlloc.KERNEL32(00000000,?,00B3822A,?,?,?), ref: 00B38786
                                                        • Part of subcall function 00B3874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B3879D
                                                        • Part of subcall function 00B387E7: GetProcessHeap.KERNEL32(00000008,00B38240,00000000,00000000,?,00B38240,?), ref: 00B387F3
                                                        • Part of subcall function 00B387E7: HeapAlloc.KERNEL32(00000000,?,00B38240,?), ref: 00B387FA
                                                        • Part of subcall function 00B387E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00B38240,?), ref: 00B3880B
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B38458
                                                      • _memset.LIBCMT ref: 00B3846D
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B3848C
                                                      • GetLengthSid.ADVAPI32(?), ref: 00B3849D
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00B384DA
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B384F6
                                                      • GetLengthSid.ADVAPI32(?), ref: 00B38513
                                                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00B38522
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00B38529
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B3854A
                                                      • CopySid.ADVAPI32(00000000), ref: 00B38551
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B38582
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B385A8
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B385BC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                      • String ID:
                                                      • API String ID: 3996160137-0
                                                      • Opcode ID: 51ced4be23ec7c33e7195457788d5e83b2fe60b6a1653e0a471e782c9487fe1d
                                                      • Instruction ID: 46d01044c4688ec94a68d460ea3c8e420f53af304216ac5867fece7dca92be30
                                                      • Opcode Fuzzy Hash: 51ced4be23ec7c33e7195457788d5e83b2fe60b6a1653e0a471e782c9487fe1d
                                                      • Instruction Fuzzy Hash: 6C61567190020AEBDF01DFA5EC45AAEBBB9FF04300F2481A9F915A7291DF759A04CF61
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 00B576A2
                                                      • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00B576AE
                                                      • CreateCompatibleDC.GDI32(?), ref: 00B576BA
                                                      • SelectObject.GDI32(00000000,?), ref: 00B576C7
                                                      • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00B5771B
                                                      • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00B57757
                                                      • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00B5777B
                                                      • SelectObject.GDI32(00000006,?), ref: 00B57783
                                                      • DeleteObject.GDI32(?), ref: 00B5778C
                                                      • DeleteDC.GDI32(00000006), ref: 00B57793
                                                      • ReleaseDC.USER32(00000000,?), ref: 00B5779E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                      • String ID: (
                                                      • API String ID: 2598888154-3887548279
                                                      • Opcode ID: 5503eeb062ac6685779f1c84b8b17405250467d9c5419219d0f667568deac548
                                                      • Instruction ID: 653d1bf1a5bd82e94d5c7927714e1fb737aa8e8e0151a0b487a822548d6d3e06
                                                      • Opcode Fuzzy Hash: 5503eeb062ac6685779f1c84b8b17405250467d9c5419219d0f667568deac548
                                                      • Instruction Fuzzy Hash: 87515875A04209EFCB15CFA8EC84EAEBBF9EF48310F148469E94997250DA75A844CB60
                                                      APIs
                                                      • LoadStringW.USER32(00000066,?,00000FFF,00B6FB78), ref: 00B4A0FC
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                      • LoadStringW.USER32(?,?,00000FFF,?), ref: 00B4A11E
                                                      • __swprintf.LIBCMT ref: 00B4A177
                                                      • __swprintf.LIBCMT ref: 00B4A190
                                                      • _wprintf.LIBCMT ref: 00B4A246
                                                      • _wprintf.LIBCMT ref: 00B4A264
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: LoadString__swprintf_wprintf$_memmove
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 311963372-2391861430
                                                      • Opcode ID: 9bb08f34030b4c755701f881b5a98b56eae6256475edf85e4a687bd65cb426a2
                                                      • Instruction ID: 93d2acd1e97d0a1290eed03e0407528e003b5790a00cb6fbee6d9733262ca7ad
                                                      • Opcode Fuzzy Hash: 9bb08f34030b4c755701f881b5a98b56eae6256475edf85e4a687bd65cb426a2
                                                      • Instruction Fuzzy Hash: FA518D7190024AAACF15EBE0CE86EEEB7B8EF04300F2441A5F505730A1EB716F58DB61
                                                      APIs
                                                        • Part of subcall function 00B00B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00AE6C6C,?,00008000), ref: 00B00BB7
                                                        • Part of subcall function 00AE48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AE48A1,?,?,00AE37C0,?), ref: 00AE48CE
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00AE6D0D
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00AE6E5A
                                                        • Part of subcall function 00AE59CD: _wcscpy.LIBCMT ref: 00AE5A05
                                                        • Part of subcall function 00B0387D: _iswctype.LIBCMT ref: 00B03885
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                      • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                      • API String ID: 537147316-1018226102
                                                      • Opcode ID: 979b89566fceda3625197a2f37427e2d93a95e1063a03d1d682a0056a98649ff
                                                      • Instruction ID: 3308e4a40d3f0e281909afb88885722cd6bec210d5db53f0a28ecc8fc415ca11
                                                      • Opcode Fuzzy Hash: 979b89566fceda3625197a2f37427e2d93a95e1063a03d1d682a0056a98649ff
                                                      • Instruction Fuzzy Hash: 9F02CE305083819FC724EF25C981AAFBBE5FF98354F54096DF896972A1DB30D989CB42
                                                      APIs
                                                      • _memset.LIBCMT ref: 00AE45F9
                                                      • GetMenuItemCount.USER32(00BA6890), ref: 00B1D7CD
                                                      • GetMenuItemCount.USER32(00BA6890), ref: 00B1D87D
                                                      • GetCursorPos.USER32(?), ref: 00B1D8C1
                                                      • SetForegroundWindow.USER32(00000000), ref: 00B1D8CA
                                                      • TrackPopupMenuEx.USER32(00BA6890,00000000,?,00000000,00000000,00000000), ref: 00B1D8DD
                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00B1D8E9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                      • String ID:
                                                      • API String ID: 2751501086-0
                                                      • Opcode ID: 9666ebae6ad38066ad1cd6f0987f182c17d513dcbe86f0112bfdbc522cd056ed
                                                      • Instruction ID: af318184815dcbb1c065a4341543fcbb0540924e9d6dc209e9ddbf1c36333128
                                                      • Opcode Fuzzy Hash: 9666ebae6ad38066ad1cd6f0987f182c17d513dcbe86f0112bfdbc522cd056ed
                                                      • Instruction Fuzzy Hash: B5712570600246BEEB219F15DC89FEABFA8FF05368F200256F515A61E0CBB15C50DB94
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B60038,?,?), ref: 00B610BC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper
                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                      • API String ID: 3964851224-909552448
                                                      • Opcode ID: 54e89b3379a147e83966a4ce23a40bf368874393d2e3174ac493a53353d6c177
                                                      • Instruction ID: 28701e910e88c46e48df02b0017a4dacc803137b489462ad2d6292fe720971ef
                                                      • Opcode Fuzzy Hash: 54e89b3379a147e83966a4ce23a40bf368874393d2e3174ac493a53353d6c177
                                                      • Instruction Fuzzy Hash: DE41713112424A9BCF10EF94ED91AEE37A4FF26340F1449E4FD916B291DB34AD1AC760
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00B1E6C9,00000010,?,Bad directive syntax error,00B6F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00B3FCD2
                                                      • LoadStringW.USER32(00000000,?,00B1E6C9,00000010), ref: 00B3FCD9
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                      • _wprintf.LIBCMT ref: 00B3FD0C
                                                      • __swprintf.LIBCMT ref: 00B3FD2E
                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00B3FD9D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                      • API String ID: 1506413516-4153970271
                                                      • Opcode ID: 7c49de7ae9196fc4f39a90dbcd5c7b2d77f5cbf9145d8d80649134235f8c9917
                                                      • Instruction ID: 4d4e57560bad7b92937eccf295bd5faa06ca868f7f9933e3dd0a956ffe7f238b
                                                      • Opcode Fuzzy Hash: 7c49de7ae9196fc4f39a90dbcd5c7b2d77f5cbf9145d8d80649134235f8c9917
                                                      • Instruction Fuzzy Hash: 97217132D0421EABCF12EFA0CC5AEFE77B9BF18700F0444A9F505620B1DA719A18DB51
                                                      APIs
                                                        • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                                                        • Part of subcall function 00AE7A84: _memmove.LIBCMT ref: 00AE7B0D
                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00B455D2
                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00B455E8
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B455F9
                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00B4560B
                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00B4561C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: SendString$_memmove
                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                      • API String ID: 2279737902-1007645807
                                                      • Opcode ID: 3c80cf7854d7d8bfaf18c691972dc0990deeb5fbc49981e2755a4fc64ebd93be
                                                      • Instruction ID: 50cc65b741b8e860920af01639df4eb03b5253a27f087f50f771e1a26f09f482
                                                      • Opcode Fuzzy Hash: 3c80cf7854d7d8bfaf18c691972dc0990deeb5fbc49981e2755a4fc64ebd93be
                                                      • Instruction Fuzzy Hash: E51194209545A97ADB20B762DC9ADFF7BBCEF95B40F4004B9B405A30E2DEA01E05C5E5
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                      • String ID: 0.0.0.0
                                                      • API String ID: 208665112-3771769585
                                                      • Opcode ID: 872ad22794b0c16c8f374e5fecb1f2bfc94b420193e0a8e0bf174b9a82334a5f
                                                      • Instruction ID: f37ff7adc84fc1bcb85005cedd764d7119def1df17f1cb0e3170b3e43feb0dd5
                                                      • Opcode Fuzzy Hash: 872ad22794b0c16c8f374e5fecb1f2bfc94b420193e0a8e0bf174b9a82334a5f
                                                      • Instruction Fuzzy Hash: CC11C03190811AAFCB24EB24AC4AEEB7BECDF40710F0401F6F444970E1EFB49A95A661
                                                      APIs
                                                      • timeGetTime.WINMM ref: 00B4521C
                                                        • Part of subcall function 00B00719: timeGetTime.WINMM(?,75C0B400,00AF0FF9), ref: 00B0071D
                                                      • Sleep.KERNEL32(0000000A), ref: 00B45248
                                                      • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00B4526C
                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00B4528E
                                                      • SetActiveWindow.USER32 ref: 00B452AD
                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00B452BB
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00B452DA
                                                      • Sleep.KERNEL32(000000FA), ref: 00B452E5
                                                      • IsWindow.USER32 ref: 00B452F1
                                                      • EndDialog.USER32(00000000), ref: 00B45302
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                      • String ID: BUTTON
                                                      • API String ID: 1194449130-3405671355
                                                      • Opcode ID: 6a998c0f9dc22bf505fbb3e10dc519cd9820e3583e9f36c5ca3239ad02751971
                                                      • Instruction ID: a91486e7c81705cc70ae12d283394822186429201837430edf9477308625ae86
                                                      • Opcode Fuzzy Hash: 6a998c0f9dc22bf505fbb3e10dc519cd9820e3583e9f36c5ca3239ad02751971
                                                      • Instruction Fuzzy Hash: 9A218370148B05AFE7116F60FC9AB353BA9E756786B0414AAF102931B2CFA55E00EA71
                                                      APIs
                                                        • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                                                        • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                                                      • CoInitialize.OLE32(00000000), ref: 00B4D855
                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00B4D8E8
                                                      • SHGetDesktopFolder.SHELL32(?), ref: 00B4D8FC
                                                      • CoCreateInstance.OLE32(00B72D7C,00000000,00000001,00B9A89C,?), ref: 00B4D948
                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00B4D9B7
                                                      • CoTaskMemFree.OLE32(?,?), ref: 00B4DA0F
                                                      • _memset.LIBCMT ref: 00B4DA4C
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00B4DA88
                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00B4DAAB
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00B4DAB2
                                                      • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00B4DAE9
                                                      • CoUninitialize.OLE32(00000001,00000000), ref: 00B4DAEB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                      • String ID:
                                                      • API String ID: 1246142700-0
                                                      • Opcode ID: 1a7b2ed783093e5770e3eda47e3cc81edb3725979519f524ae56d5ca0a3de961
                                                      • Instruction ID: f6ecca836456891bdc2a39ae10761f833640101d63baeb350e5ad03f14243176
                                                      • Opcode Fuzzy Hash: 1a7b2ed783093e5770e3eda47e3cc81edb3725979519f524ae56d5ca0a3de961
                                                      • Instruction Fuzzy Hash: 59B1FE75A00209AFDB04DFA5D988DAEBBF9FF48314B1484A9F505EB261DB30EE45CB50
                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 00B405A7
                                                      • SetKeyboardState.USER32(?), ref: 00B40612
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00B40632
                                                      • GetKeyState.USER32(000000A0), ref: 00B40649
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00B40678
                                                      • GetKeyState.USER32(000000A1), ref: 00B40689
                                                      • GetAsyncKeyState.USER32(00000011), ref: 00B406B5
                                                      • GetKeyState.USER32(00000011), ref: 00B406C3
                                                      • GetAsyncKeyState.USER32(00000012), ref: 00B406EC
                                                      • GetKeyState.USER32(00000012), ref: 00B406FA
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00B40723
                                                      • GetKeyState.USER32(0000005B), ref: 00B40731
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: ecc64ad2e6ebac8b6c75e32ad51054945f90eeff9b5faefc797b03095e703e92
                                                      • Instruction ID: e7e160d154fab40a80b644e17d48237f469da4407c1e15070ff2a1a1f512500d
                                                      • Opcode Fuzzy Hash: ecc64ad2e6ebac8b6c75e32ad51054945f90eeff9b5faefc797b03095e703e92
                                                      • Instruction Fuzzy Hash: 2D51C820A1478429FB35FBA484557EABFF4DF11380F0849D9DAC2571C2DA749B8CDB52
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000001), ref: 00B3C746
                                                      • GetWindowRect.USER32(00000000,?), ref: 00B3C758
                                                      • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00B3C7B6
                                                      • GetDlgItem.USER32(?,00000002), ref: 00B3C7C1
                                                      • GetWindowRect.USER32(00000000,?), ref: 00B3C7D3
                                                      • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00B3C827
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00B3C835
                                                      • GetWindowRect.USER32(00000000,?), ref: 00B3C846
                                                      • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00B3C889
                                                      • GetDlgItem.USER32(?,000003EA), ref: 00B3C897
                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00B3C8B4
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00B3C8C1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                      • String ID:
                                                      • API String ID: 3096461208-0
                                                      • Opcode ID: 213338ef6574a00a078333bb4607fe979fb7d5cc3f670e4187f68ecf403e24ec
                                                      • Instruction ID: bcf73902404cf128f15af1099a18760003c45e8da87314323ea170e8d54d29f1
                                                      • Opcode Fuzzy Hash: 213338ef6574a00a078333bb4607fe979fb7d5cc3f670e4187f68ecf403e24ec
                                                      • Instruction Fuzzy Hash: BD512171B00205ABDB18CFA9DD95ABEBBB6EB88311F14816DF515E72D0DBB49D00CB50
                                                      APIs
                                                        • Part of subcall function 00AE1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AE2036,?,00000000,?,?,?,?,00AE16CB,00000000,?), ref: 00AE1B9A
                                                      • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00AE20D3
                                                      • KillTimer.USER32(-00000001,?,?,?,?,00AE16CB,00000000,?,?,00AE1AE2,?,?), ref: 00AE216E
                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 00B1BEF6
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00AE16CB,00000000,?,?,00AE1AE2,?,?), ref: 00B1BF27
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00AE16CB,00000000,?,?,00AE1AE2,?,?), ref: 00B1BF3E
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00AE16CB,00000000,?,?,00AE1AE2,?,?), ref: 00B1BF5A
                                                      • DeleteObject.GDI32(00000000), ref: 00B1BF6C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                      • String ID:
                                                      • API String ID: 641708696-0
                                                      • Opcode ID: e0b229ad26ab8420dafbb8bd457aecf3e9c9e4bfb5606539f7fa91839f419572
                                                      • Instruction ID: cf6576b44f666b0040690a3d0dec25d4f0776f98ef13c1511eb5084e8d8b294f
                                                      • Opcode Fuzzy Hash: e0b229ad26ab8420dafbb8bd457aecf3e9c9e4bfb5606539f7fa91839f419572
                                                      • Instruction Fuzzy Hash: A661BA71100691DFCB359F16DD49B3AB7F9FB41312F54856AE442879A0CB79AC81CF80
                                                      APIs
                                                        • Part of subcall function 00AE25DB: GetWindowLongW.USER32(?,000000EB), ref: 00AE25EC
                                                      • GetSysColor.USER32(0000000F), ref: 00AE21D3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ColorLongWindow
                                                      • String ID:
                                                      • API String ID: 259745315-0
                                                      • Opcode ID: 80cbfb4ed55bc054f2e5389cf931b59e3f847ee7d8612d55e4087704c710e22a
                                                      • Instruction ID: bb35bccfe8f7c326be2e4222836dbfef6c9347c8143f9d30248c2b178e726613
                                                      • Opcode Fuzzy Hash: 80cbfb4ed55bc054f2e5389cf931b59e3f847ee7d8612d55e4087704c710e22a
                                                      • Instruction Fuzzy Hash: B041B531040180AFDB255F29EC48BF93BA9FB06331F184265FE659B1E6CB758D82DB21
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?,00B6F910), ref: 00B4AB76
                                                      • GetDriveTypeW.KERNEL32(00000061,00B9A620,00000061), ref: 00B4AC40
                                                      • _wcscpy.LIBCMT ref: 00B4AC6A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: BuffCharDriveLowerType_wcscpy
                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                      • API String ID: 2820617543-1000479233
                                                      • Opcode ID: 4f6b454c9f2b379459a61df5ffb8fc1f9b23dc0f1661f914defd3fcca607a769
                                                      • Instruction ID: daee007eb659ddb083db78ffc9f7b3870d7b7ee035a7a8d6803a42c5d7e98eba
                                                      • Opcode Fuzzy Hash: 4f6b454c9f2b379459a61df5ffb8fc1f9b23dc0f1661f914defd3fcca607a769
                                                      • Instruction Fuzzy Hash: 5251AC31158341ABC710EF14C991AAEBBE5EF94300F5048ADF886972E2DB319E09DA53
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __i64tow__itow__swprintf
                                                      • String ID: %.15g$0x%p$False$True
                                                      • API String ID: 421087845-2263619337
                                                      • Opcode ID: 53069780ba53a6623b4460eda2017e6981ee30d0cf07ecef77d23d113beec19c
                                                      • Instruction ID: 8c932cc3d6ed69352457dd72033b429f685d0f6dcc50a4a19b91967dfb12c05b
                                                      • Opcode Fuzzy Hash: 53069780ba53a6623b4460eda2017e6981ee30d0cf07ecef77d23d113beec19c
                                                      • Instruction Fuzzy Hash: 6741BF71604306AADB24AB39D842FBBB7F8EF44340F2044EEE549D72A2EA71D941DB11
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B673D9
                                                      • CreateMenu.USER32 ref: 00B673F4
                                                      • SetMenu.USER32(?,00000000), ref: 00B67403
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B67490
                                                      • IsMenu.USER32(?), ref: 00B674A6
                                                      • CreatePopupMenu.USER32 ref: 00B674B0
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B674DD
                                                      • DrawMenuBar.USER32 ref: 00B674E5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                      • String ID: 0$F
                                                      • API String ID: 176399719-3044882817
                                                      • Opcode ID: 21d9206e9d4d278839f9300b2d95a147a8d0d3ae56d84c936d814c11999a627d
                                                      • Instruction ID: 8a646726804c1eea7e8736a42d92e313243918852d337978b71ff9c1d96e19f5
                                                      • Opcode Fuzzy Hash: 21d9206e9d4d278839f9300b2d95a147a8d0d3ae56d84c936d814c11999a627d
                                                      • Instruction Fuzzy Hash: FB414975A01205EFDB10DF64E888AAABBF9FF49304F144069E956973A0DF78AD10CF90
                                                      APIs
                                                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00B677CD
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 00B677D4
                                                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00B677E7
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00B677EF
                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B677FA
                                                      • DeleteDC.GDI32(00000000), ref: 00B67803
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00B6780D
                                                      • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00B67821
                                                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00B6782D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                      • String ID: static
                                                      • API String ID: 2559357485-2160076837
                                                      • Opcode ID: b3ca9e939a06ad3cb13d63765c3c728d835b7583b802030e7788a918ce58f38e
                                                      • Instruction ID: 7754f68c5ce90e36181e2563076b71b89422b710866294133562feb326554bf4
                                                      • Opcode Fuzzy Hash: b3ca9e939a06ad3cb13d63765c3c728d835b7583b802030e7788a918ce58f38e
                                                      • Instruction Fuzzy Hash: 22318F31104115ABDF119FA5EC09FEA3BA9FF09325F100264FA15A70E0CB79DC11DBA4
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B0707B
                                                        • Part of subcall function 00B08D68: __getptd_noexit.LIBCMT ref: 00B08D68
                                                      • __gmtime64_s.LIBCMT ref: 00B07114
                                                      • __gmtime64_s.LIBCMT ref: 00B0714A
                                                      • __gmtime64_s.LIBCMT ref: 00B07167
                                                      • __allrem.LIBCMT ref: 00B071BD
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B071D9
                                                      • __allrem.LIBCMT ref: 00B071F0
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B0720E
                                                      • __allrem.LIBCMT ref: 00B07225
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B07243
                                                      • __invoke_watson.LIBCMT ref: 00B072B4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                      • String ID:
                                                      • API String ID: 384356119-0
                                                      • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                                      • Instruction ID: 2d08b8fb1f3e5f13dd67d2a5474c1b4fe1b1afe46fafb23360c0ddd991bc59ff
                                                      • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                                      • Instruction Fuzzy Hash: B671C371E44716ABE7149E79CC81B9AFBE8EF11720F1442BAF414E62C1FB70EA408790
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B42A31
                                                      • GetMenuItemInfoW.USER32(00BA6890,000000FF,00000000,00000030), ref: 00B42A92
                                                      • SetMenuItemInfoW.USER32(00BA6890,00000004,00000000,00000030), ref: 00B42AC8
                                                      • Sleep.KERNEL32(000001F4), ref: 00B42ADA
                                                      • GetMenuItemCount.USER32(?), ref: 00B42B1E
                                                      • GetMenuItemID.USER32(?,00000000), ref: 00B42B3A
                                                      • GetMenuItemID.USER32(?,-00000001), ref: 00B42B64
                                                      • GetMenuItemID.USER32(?,?), ref: 00B42BA9
                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B42BEF
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B42C03
                                                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B42C24
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                      • String ID:
                                                      • API String ID: 4176008265-0
                                                      • Opcode ID: 2b609247ff403adaa76cb81eab6dba506408cb648e0829ca0b6509f502d12fb9
                                                      • Instruction ID: a3c104eb4a0a29a3c607e3169276d8c03a6d933b777cd0383b7b78ecbb04aff8
                                                      • Opcode Fuzzy Hash: 2b609247ff403adaa76cb81eab6dba506408cb648e0829ca0b6509f502d12fb9
                                                      • Instruction Fuzzy Hash: 7B6190B0900249AFDF11CF64D888EBEBBF8EB45304F940599F84297291DB71AE45FB21
                                                      APIs
                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00B67214
                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00B67217
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00B6723B
                                                      • _memset.LIBCMT ref: 00B6724C
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B6725E
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00B672D6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$LongWindow_memset
                                                      • String ID:
                                                      • API String ID: 830647256-0
                                                      • Opcode ID: 1c1fbc664f641ce628ece3526af70b5ff0eb6d09db9b958f2fa179cca404ad31
                                                      • Instruction ID: 5cc27b43e204afa7ff088ce1595a565c6a4136ecebdddeb15c38ba2cc7211910
                                                      • Opcode Fuzzy Hash: 1c1fbc664f641ce628ece3526af70b5ff0eb6d09db9b958f2fa179cca404ad31
                                                      • Instruction Fuzzy Hash: FF616C71940208AFDB10DFA4CC81EEE77F8EB09714F14019AFA15A73A1DB74AD45DB64
                                                      APIs
                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00B37135
                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 00B3718E
                                                      • VariantInit.OLEAUT32(?), ref: 00B371A0
                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00B371C0
                                                      • VariantCopy.OLEAUT32(?,?), ref: 00B37213
                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00B37227
                                                      • VariantClear.OLEAUT32(?), ref: 00B3723C
                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 00B37249
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00B37252
                                                      • VariantClear.OLEAUT32(?), ref: 00B37264
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00B3726F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                      • String ID:
                                                      • API String ID: 2706829360-0
                                                      • Opcode ID: ec9e3b5b6544bdbdd28552c91380fa8043dedd9f669e9ce8bc0a03edde5876e2
                                                      • Instruction ID: 8aca950f4c1f54d635a97b02a0471b03e3fdc71195c1a45848368d93c3166602
                                                      • Opcode Fuzzy Hash: ec9e3b5b6544bdbdd28552c91380fa8043dedd9f669e9ce8bc0a03edde5876e2
                                                      • Instruction Fuzzy Hash: A3413A75A04219AFCF10DFA8DC489AEBBF8FF08354F1080A9E915A7361CF74A945CB90
                                                      APIs
                                                      • WSAStartup.WSOCK32(00000101,?), ref: 00B55AA6
                                                      • inet_addr.WSOCK32(?), ref: 00B55AEB
                                                      • gethostbyname.WSOCK32(?), ref: 00B55AF7
                                                      • IcmpCreateFile.IPHLPAPI ref: 00B55B05
                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00B55B75
                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00B55B8B
                                                      • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00B55C00
                                                      • WSACleanup.WSOCK32 ref: 00B55C06
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                      • String ID: Ping
                                                      • API String ID: 1028309954-2246546115
                                                      • Opcode ID: 02c740708584a52e229a3cd52766e8a3e9446acce965dd994212acdc8ef25a75
                                                      • Instruction ID: 6330e6ca962c0754dbfd29f397981d5b0b80a9a0ca0bd34011897b33687fee52
                                                      • Opcode Fuzzy Hash: 02c740708584a52e229a3cd52766e8a3e9446acce965dd994212acdc8ef25a75
                                                      • Instruction Fuzzy Hash: E151AF716047019FDB20AF25DD99B2AB7E4EF48312F1489AAF955DB2E1DB70EC04CB42
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00B4B73B
                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00B4B7B1
                                                      • GetLastError.KERNEL32 ref: 00B4B7BB
                                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 00B4B828
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Error$Mode$DiskFreeLastSpace
                                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                      • API String ID: 4194297153-14809454
                                                      • Opcode ID: 3791b2b36c197d803c4a8f06acc6322fe2e563f223558b31db03245004e98e22
                                                      • Instruction ID: 2bc3cab7442b5a25a983484f1c325c29dccfcffe594098f1f8ff1dcddc27aa03
                                                      • Opcode Fuzzy Hash: 3791b2b36c197d803c4a8f06acc6322fe2e563f223558b31db03245004e98e22
                                                      • Instruction Fuzzy Hash: 73316135A00205AFDB10EF64D885EBE7BF8EF45740F1480A9E602E7291DB71DE42DB91
                                                      APIs
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                        • Part of subcall function 00B3B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B3B0E7
                                                      • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00B394F6
                                                      • GetDlgCtrlID.USER32 ref: 00B39501
                                                      • GetParent.USER32 ref: 00B3951D
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B39520
                                                      • GetDlgCtrlID.USER32(?), ref: 00B39529
                                                      • GetParent.USER32(?), ref: 00B39545
                                                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 00B39548
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 1536045017-1403004172
                                                      • Opcode ID: bcfb8bd1efa11de204282f4f014908980ab31758dac0b0136ccd3677426d66b5
                                                      • Instruction ID: 3271bb3d107999d3e068c8db6e6caef28fcaa914712d19893b5e4ae19fec9ae3
                                                      • Opcode Fuzzy Hash: bcfb8bd1efa11de204282f4f014908980ab31758dac0b0136ccd3677426d66b5
                                                      • Instruction Fuzzy Hash: 6621C470D00204BBCF05AB65DC85DFEBBB8EF59300F204169F562972E1DBB95919DB20
                                                      APIs
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                        • Part of subcall function 00B3B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B3B0E7
                                                      • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00B395DF
                                                      • GetDlgCtrlID.USER32 ref: 00B395EA
                                                      • GetParent.USER32 ref: 00B39606
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B39609
                                                      • GetDlgCtrlID.USER32(?), ref: 00B39612
                                                      • GetParent.USER32(?), ref: 00B3962E
                                                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 00B39631
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 1536045017-1403004172
                                                      • Opcode ID: c8a8dde02e6e452e1efe39f4d1399b2a7f4679a3f2f09aa301415fa7d7fba7f3
                                                      • Instruction ID: 3e7958647671e159eab07448b0cdbd3fa72852cbf46f2c9b09109e6c5878813d
                                                      • Opcode Fuzzy Hash: c8a8dde02e6e452e1efe39f4d1399b2a7f4679a3f2f09aa301415fa7d7fba7f3
                                                      • Instruction Fuzzy Hash: 9221C574900205BBDF05AB65DCC5EFEBBB8EF58300F204069F921971E1DBB99919DB20
                                                      APIs
                                                      • GetParent.USER32 ref: 00B39651
                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00B39666
                                                      • _wcscmp.LIBCMT ref: 00B39678
                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00B396F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameParentSend_wcscmp
                                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                      • API String ID: 1704125052-3381328864
                                                      • Opcode ID: 4925aeefe1823fe66f6b17ae0ad526b89a4c67b52bad631866ba73e425131499
                                                      • Instruction ID: 2bbb02cfa7628cca767e52876f882f70a322339fc196858785b462964be08966
                                                      • Opcode Fuzzy Hash: 4925aeefe1823fe66f6b17ae0ad526b89a4c67b52bad631866ba73e425131499
                                                      • Instruction Fuzzy Hash: AA112C77649307BAFB012625EC0BDA777DCDB14760F3000EAF910A50E1FEE159108558
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00B58BEC
                                                      • CoInitialize.OLE32(00000000), ref: 00B58C19
                                                      • CoUninitialize.OLE32 ref: 00B58C23
                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00B58D23
                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00B58E50
                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00B72C0C), ref: 00B58E84
                                                      • CoGetObject.OLE32(?,00000000,00B72C0C,?), ref: 00B58EA7
                                                      • SetErrorMode.KERNEL32(00000000), ref: 00B58EBA
                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00B58F3A
                                                      • VariantClear.OLEAUT32(?), ref: 00B58F4A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                      • String ID:
                                                      • API String ID: 2395222682-0
                                                      • Opcode ID: 866a19b2a6435ae53183869a632886328bbfbaf6d8845b1560c111e6de56f5e2
                                                      • Instruction ID: 0648bf89e70674090180e444b386784dcb40a5fb50870be6f6cb0012b3e3e52f
                                                      • Opcode Fuzzy Hash: 866a19b2a6435ae53183869a632886328bbfbaf6d8845b1560c111e6de56f5e2
                                                      • Instruction Fuzzy Hash: 3EC11771204305AFD700DF64C884A2BB7E9FF89749F1049ADF98A9B261DB71ED09CB52
                                                      APIs
                                                      • __swprintf.LIBCMT ref: 00B4419D
                                                      • __swprintf.LIBCMT ref: 00B441AA
                                                        • Part of subcall function 00B038D8: __woutput_l.LIBCMT ref: 00B03931
                                                      • FindResourceW.KERNEL32(?,?,0000000E), ref: 00B441D4
                                                      • LoadResource.KERNEL32(?,00000000), ref: 00B441E0
                                                      • LockResource.KERNEL32(00000000), ref: 00B441ED
                                                      • FindResourceW.KERNEL32(?,?,00000003), ref: 00B4420D
                                                      • LoadResource.KERNEL32(?,00000000), ref: 00B4421F
                                                      • SizeofResource.KERNEL32(?,00000000), ref: 00B4422E
                                                      • LockResource.KERNEL32(?), ref: 00B4423A
                                                      • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00B4429B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                      • String ID:
                                                      • API String ID: 1433390588-0
                                                      • Opcode ID: bcca8881ebc26e56972e954b4cd87e0b81ad431f099af7cb4fdbfe46c4ef721c
                                                      • Instruction ID: 259aa2c4e1eec2f068d4a428eb9f5bc6330df2dc568a448962fb38e59e642844
                                                      • Opcode Fuzzy Hash: bcca8881ebc26e56972e954b4cd87e0b81ad431f099af7cb4fdbfe46c4ef721c
                                                      • Instruction Fuzzy Hash: C031A072A0521AAFCB119F60EC59EBB7BECFF05301F004565F901E3190DBB4DA619BA0
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00B41700
                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00B40778,?,00000001), ref: 00B41714
                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 00B4171B
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B40778,?,00000001), ref: 00B4172A
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B4173C
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B40778,?,00000001), ref: 00B41755
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B40778,?,00000001), ref: 00B41767
                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00B40778,?,00000001), ref: 00B417AC
                                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00B40778,?,00000001), ref: 00B417C1
                                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00B40778,?,00000001), ref: 00B417CC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                      • String ID:
                                                      • API String ID: 2156557900-0
                                                      • Opcode ID: 94460e97431490c94ee3f01f4a86054edc98a3c47778cc334811b951e6734a89
                                                      • Instruction ID: f199669c8bd72421dc2e2a0293fcf19dc2550511e92858e67a3a2fa68e30765a
                                                      • Opcode Fuzzy Hash: 94460e97431490c94ee3f01f4a86054edc98a3c47778cc334811b951e6734a89
                                                      • Instruction Fuzzy Hash: 5331BFB5A48204BFEB119F58ED85B793BE9EB16711F1044A4F800C72A0EFB59F81DB61
                                                      APIs
                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00AEFC06
                                                      • OleUninitialize.OLE32(?,00000000), ref: 00AEFCA5
                                                      • UnregisterHotKey.USER32(?), ref: 00AEFDFC
                                                      • DestroyWindow.USER32(?), ref: 00B24A00
                                                      • FreeLibrary.KERNEL32(?), ref: 00B24A65
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00B24A92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                      • String ID: close all
                                                      • API String ID: 469580280-3243417748
                                                      • Opcode ID: 089af7e0f1c02d5765923c949cb4b1e88973a63b3a33e347d2274cb7a2287f2c
                                                      • Instruction ID: a716b0f17b651941eab2591e19217cb17ab0ce0c90700dba2ba3bb470d1db536
                                                      • Opcode Fuzzy Hash: 089af7e0f1c02d5765923c949cb4b1e88973a63b3a33e347d2274cb7a2287f2c
                                                      • Instruction Fuzzy Hash: 4FA18C30701222CFCB28EF15D998B69F7A4EF05700F2442EDE90AAB261DB30AD16CF54
                                                      APIs
                                                      • EnumChildWindows.USER32(?,00B3AA64), ref: 00B3A9A2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ChildEnumWindows
                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                      • API String ID: 3555792229-1603158881
                                                      • Opcode ID: 6cd5b87ad62fab03afad84444a66cc1d415f4a6d5e22128a1b95c250414d53ad
                                                      • Instruction ID: 3bef1985756c6d1d735e95333349140b2587371b683c36f483e28b77ba9ba63a
                                                      • Opcode Fuzzy Hash: 6cd5b87ad62fab03afad84444a66cc1d415f4a6d5e22128a1b95c250414d53ad
                                                      • Instruction Fuzzy Hash: F4917331900646EADB18DF64C481BE9FBF4FF14344F3482A9D8DAA7191DF306959CBA1
                                                      APIs
                                                      • SetWindowLongW.USER32(?,000000EB), ref: 00AE2EAE
                                                        • Part of subcall function 00AE1DB3: GetClientRect.USER32(?,?), ref: 00AE1DDC
                                                        • Part of subcall function 00AE1DB3: GetWindowRect.USER32(?,?), ref: 00AE1E1D
                                                        • Part of subcall function 00AE1DB3: ScreenToClient.USER32(?,?), ref: 00AE1E45
                                                      • GetDC.USER32 ref: 00B1CF82
                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00B1CF95
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00B1CFA3
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00B1CFB8
                                                      • ReleaseDC.USER32(?,00000000), ref: 00B1CFC0
                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00B1D04B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                      • String ID: U
                                                      • API String ID: 4009187628-3372436214
                                                      • Opcode ID: 0948b0dc8cf51a52a09d1a66258e012b95f3e10264db5a487af17d13b2081ecd
                                                      • Instruction ID: 6d2b970dc981136ca20d03ad7efee0012a5e780f49a85e48414e1c8bec3b91fe
                                                      • Opcode Fuzzy Hash: 0948b0dc8cf51a52a09d1a66258e012b95f3e10264db5a487af17d13b2081ecd
                                                      • Instruction Fuzzy Hash: 0571C071500245DFCF218F64C895AFA7FFAFF49350F1442AAED555A1A6CB318C82DB60
                                                      APIs
                                                        • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                                                        • Part of subcall function 00AE2344: GetCursorPos.USER32(?), ref: 00AE2357
                                                        • Part of subcall function 00AE2344: ScreenToClient.USER32(00BA67B0,?), ref: 00AE2374
                                                        • Part of subcall function 00AE2344: GetAsyncKeyState.USER32(00000001), ref: 00AE2399
                                                        • Part of subcall function 00AE2344: GetAsyncKeyState.USER32(00000002), ref: 00AE23A7
                                                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00B6C2E4
                                                      • ImageList_EndDrag.COMCTL32 ref: 00B6C2EA
                                                      • ReleaseCapture.USER32 ref: 00B6C2F0
                                                      • SetWindowTextW.USER32(?,00000000), ref: 00B6C39A
                                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00B6C3AD
                                                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00B6C48F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                      • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                      • API String ID: 1924731296-2107944366
                                                      • Opcode ID: 3672498c82ff87101b39660bb284c5a29f04588b5e40b1e552eb4c8920e65287
                                                      • Instruction ID: 41f77147bdf2f01b854ecdb0c1b9f3318196cb37d39a20f229a115b65db511d4
                                                      • Opcode Fuzzy Hash: 3672498c82ff87101b39660bb284c5a29f04588b5e40b1e552eb4c8920e65287
                                                      • Instruction Fuzzy Hash: 9D518B71208305AFD700EF24D896F7A7BE5EB88310F04856DF5A58B2E1DB78A944CB52
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00B6F910), ref: 00B5903D
                                                      • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00B6F910), ref: 00B59071
                                                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00B591EB
                                                      • SysFreeString.OLEAUT32(?), ref: 00B59215
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                      • String ID:
                                                      • API String ID: 560350794-0
                                                      • Opcode ID: a8e59affbb01ba6bdc6c4af5542eca43e06cbe73db39532a87509f0560da6e89
                                                      • Instruction ID: e3c97143e660f1a70e4fb85e4303a0c62a8aa2e31fc24920ec39611bf8f22d06
                                                      • Opcode Fuzzy Hash: a8e59affbb01ba6bdc6c4af5542eca43e06cbe73db39532a87509f0560da6e89
                                                      • Instruction Fuzzy Hash: 28F11971A00219EFDB04DF94C888EAEB7B9FF49315F1084D9F916AB291DB31AD49CB50
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B5F9C9
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B5FB5C
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B5FB80
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B5FBC0
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B5FBE2
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B5FD5E
                                                      • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00B5FD90
                                                      • CloseHandle.KERNEL32(?), ref: 00B5FDBF
                                                      • CloseHandle.KERNEL32(?), ref: 00B5FE36
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                      • String ID:
                                                      • API String ID: 4090791747-0
                                                      • Opcode ID: a4d6a68ba8263d5f8427a2a790a402f61f0c5ac82c4eebb7a57e746dc5a1e1c5
                                                      • Instruction ID: aebb07514bbd586602966b170678c883de94bd245ce5a8760ca4d300d5cdf505
                                                      • Opcode Fuzzy Hash: a4d6a68ba8263d5f8427a2a790a402f61f0c5ac82c4eebb7a57e746dc5a1e1c5
                                                      • Instruction Fuzzy Hash: E8E190312043429FC714EF24C981B7ABBE1EF88354F1488ADF8999B2A2DB31DC45CB52
                                                      APIs
                                                        • Part of subcall function 00B448AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B438D3,?), ref: 00B448C7
                                                        • Part of subcall function 00B448AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B438D3,?), ref: 00B448E0
                                                        • Part of subcall function 00B44CD3: GetFileAttributesW.KERNEL32(?,00B43947), ref: 00B44CD4
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00B44FE2
                                                      • _wcscmp.LIBCMT ref: 00B44FFC
                                                      • MoveFileW.KERNEL32(?,?), ref: 00B45017
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                      • String ID:
                                                      • API String ID: 793581249-0
                                                      • Opcode ID: 49af181fb4e3f5074d8864fbd5917c17a4fcc9304ad72c935eed021850513425
                                                      • Instruction ID: c75e4d5d12c29b5b5a7ad4b02eed404f0bc63d408b16271c9f84d4aa5ab62d1c
                                                      • Opcode Fuzzy Hash: 49af181fb4e3f5074d8864fbd5917c17a4fcc9304ad72c935eed021850513425
                                                      • Instruction Fuzzy Hash: 915153B24087859BC725DB60D885ADFB7ECEF84340F10496EF189D3192EF74A68C8766
                                                      APIs
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00B6896E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: InvalidateRect
                                                      • String ID:
                                                      • API String ID: 634782764-0
                                                      • Opcode ID: 9a9b48f1628bb2b2061187a0c0525ce3b8270c072057ccf6e5b1ecc7666fb717
                                                      • Instruction ID: 013dedc5cfca5334e33110a425e47f82caf88d16fb409c134f5a0da0e8465cfb
                                                      • Opcode Fuzzy Hash: 9a9b48f1628bb2b2061187a0c0525ce3b8270c072057ccf6e5b1ecc7666fb717
                                                      • Instruction Fuzzy Hash: B351B430500208BFDF209F64DC85BA93BE5FB05310F6042A2FA15E71E1DFB9A980CB91
                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00B1C547
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B1C569
                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00B1C581
                                                      • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00B1C59F
                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00B1C5C0
                                                      • DestroyIcon.USER32(00000000), ref: 00B1C5CF
                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00B1C5EC
                                                      • DestroyIcon.USER32(?), ref: 00B1C5FB
                                                        • Part of subcall function 00B6A71E: DeleteObject.GDI32(00000000), ref: 00B6A757
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                      • String ID:
                                                      • API String ID: 2819616528-0
                                                      • Opcode ID: aec3ad984ad932716cb23db806702ddbc2031adeabd03fc872b03ea66c16241c
                                                      • Instruction ID: b836c97d8dc4386fa395a7cc624f2da24a9d6e2699f939cb384589bbdeedd740
                                                      • Opcode Fuzzy Hash: aec3ad984ad932716cb23db806702ddbc2031adeabd03fc872b03ea66c16241c
                                                      • Instruction Fuzzy Hash: CA515870A40249AFDB24DF25DC46FBA3BF9EB58310F104569F902972A0DBB4ED90DB60
                                                      APIs
                                                        • Part of subcall function 00B3AE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B3AE77
                                                        • Part of subcall function 00B3AE57: GetCurrentThreadId.KERNEL32 ref: 00B3AE7E
                                                        • Part of subcall function 00B3AE57: AttachThreadInput.USER32(00000000,?,00B39B65,?,00000001), ref: 00B3AE85
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00B39B70
                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00B39B8D
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00B39B90
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00B39B99
                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00B39BB7
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00B39BBA
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00B39BC3
                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00B39BDA
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00B39BDD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                      • String ID:
                                                      • API String ID: 2014098862-0
                                                      • Opcode ID: 347c84b68c5679cf3178f858fe8ff65c3faec329b6e54d6a986899792f72c4b1
                                                      • Instruction ID: ca795cd88a2602960e2323e3e705aa6d16a3218f4ab5c5851419e9945e825f5c
                                                      • Opcode Fuzzy Hash: 347c84b68c5679cf3178f858fe8ff65c3faec329b6e54d6a986899792f72c4b1
                                                      • Instruction Fuzzy Hash: 7E11E171550219BEFA106F60EC89F6A7B6DEB4D791F200425F354AB0E0CDF25C10DAA4
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00B38A84,00000B00,?,?), ref: 00B38E0C
                                                      • HeapAlloc.KERNEL32(00000000,?,00B38A84,00000B00,?,?), ref: 00B38E13
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00B38A84,00000B00,?,?), ref: 00B38E28
                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00B38A84,00000B00,?,?), ref: 00B38E30
                                                      • DuplicateHandle.KERNEL32(00000000,?,00B38A84,00000B00,?,?), ref: 00B38E33
                                                      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00B38A84,00000B00,?,?), ref: 00B38E43
                                                      • GetCurrentProcess.KERNEL32(00B38A84,00000000,?,00B38A84,00000B00,?,?), ref: 00B38E4B
                                                      • DuplicateHandle.KERNEL32(00000000,?,00B38A84,00000B00,?,?), ref: 00B38E4E
                                                      • CreateThread.KERNEL32(00000000,00000000,00B38E74,00000000,00000000,00000000), ref: 00B38E68
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                      • String ID:
                                                      • API String ID: 1957940570-0
                                                      • Opcode ID: e3a38e866beeed91e8540345f101bbe3b852f87e247770bdf8c68f08f6e9bb44
                                                      • Instruction ID: 80887c669baa1f5c94553c19e5fedd08bc505c9916641f442a1f4544a6d7c257
                                                      • Opcode Fuzzy Hash: e3a38e866beeed91e8540345f101bbe3b852f87e247770bdf8c68f08f6e9bb44
                                                      • Instruction Fuzzy Hash: B601BBB5240309FFEB10ABA5EC4DF6B3BACEB89751F004421FA05DB1E1CAB59800CB20
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$_memset
                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                      • API String ID: 2862541840-625585964
                                                      • Opcode ID: c2fbbed249eec914a90f19cc5ef95d97172a62ad5b57af14efa5bbd45674d49b
                                                      • Instruction ID: 78a4f958b8885590ff5f6c700aa5f8582b93708c03fec5582b335e189e964a1d
                                                      • Opcode Fuzzy Hash: c2fbbed249eec914a90f19cc5ef95d97172a62ad5b57af14efa5bbd45674d49b
                                                      • Instruction Fuzzy Hash: EE918C71A00215EBDF24DFA5D888FAEBBF8EF45711F1081D9F915AB290D7709909CBA0
                                                      APIs
                                                        • Part of subcall function 00B37652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?,?,00B3799D), ref: 00B3766F
                                                        • Part of subcall function 00B37652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?), ref: 00B3768A
                                                        • Part of subcall function 00B37652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?), ref: 00B37698
                                                        • Part of subcall function 00B37652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?), ref: 00B376A8
                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00B59B1B
                                                      • _memset.LIBCMT ref: 00B59B28
                                                      • _memset.LIBCMT ref: 00B59C6B
                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00B59C97
                                                      • CoTaskMemFree.OLE32(?), ref: 00B59CA2
                                                      Strings
                                                      • NULL Pointer assignment, xrefs: 00B59CF0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                      • String ID: NULL Pointer assignment
                                                      • API String ID: 1300414916-2785691316
                                                      • Opcode ID: 797f7a7067ab3f348b364e5bab0a5ddf98dc9b660bd2b2a94f9e629765b4a6f9
                                                      • Instruction ID: e2affbbb87a69c97bc7f6fdf104b2a620805c61fe3a39f50a4a206658c116afa
                                                      • Opcode Fuzzy Hash: 797f7a7067ab3f348b364e5bab0a5ddf98dc9b660bd2b2a94f9e629765b4a6f9
                                                      • Instruction Fuzzy Hash: 13912971D00219EBDF10DFA5DC85ADEBBB9EF08710F2041AAF919A7291DB715A44CFA0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00B67093
                                                      • SendMessageW.USER32(?,00001036,00000000,?), ref: 00B670A7
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00B670C1
                                                      • _wcscat.LIBCMT ref: 00B6711C
                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00B67133
                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00B67161
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window_wcscat
                                                      • String ID: SysListView32
                                                      • API String ID: 307300125-78025650
                                                      • Opcode ID: 8116d91f27335df77063855dde2d1d23284ac5852b77fee28d087ca154cd562f
                                                      • Instruction ID: 9967a04e0df41658f7dca9c7415bfb3bbfad49e6ae15d7f119bed3aa220bd342
                                                      • Opcode Fuzzy Hash: 8116d91f27335df77063855dde2d1d23284ac5852b77fee28d087ca154cd562f
                                                      • Instruction Fuzzy Hash: B641E271944308AFEB21DFA4CC85BEE77E8EF08354F1004AAF544E72D2DA759D848B60
                                                      APIs
                                                        • Part of subcall function 00B43E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00B43EB6
                                                        • Part of subcall function 00B43E91: Process32FirstW.KERNEL32(00000000,?), ref: 00B43EC4
                                                        • Part of subcall function 00B43E91: CloseHandle.KERNEL32(00000000), ref: 00B43F8E
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B5ECB8
                                                      • GetLastError.KERNEL32 ref: 00B5ECCB
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B5ECFA
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B5ED77
                                                      • GetLastError.KERNEL32(00000000), ref: 00B5ED82
                                                      • CloseHandle.KERNEL32(00000000), ref: 00B5EDB7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 2533919879-2896544425
                                                      • Opcode ID: 50a252c36408f78999eefdd93654bd69a92a16f25a05a94cdf1845b478a391e9
                                                      • Instruction ID: 36aa85f035bf7c4ed6a22ea15fd54b81099d571884386bbccd11e222b709a5f3
                                                      • Opcode Fuzzy Hash: 50a252c36408f78999eefdd93654bd69a92a16f25a05a94cdf1845b478a391e9
                                                      • Instruction Fuzzy Hash: 7A419C712002019FDB14EF24CD95F7EB7E5AF80714F1880A9F9529B2D2DBB5E908CB96
                                                      APIs
                                                      • LoadIconW.USER32(00000000,00007F03), ref: 00B432C5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: IconLoad
                                                      • String ID: blank$info$question$stop$warning
                                                      • API String ID: 2457776203-404129466
                                                      • Opcode ID: dc6baf27f4e4d028fe3fd0a1fd33b97d5aaa6439d4b934809b0eda74713f1b89
                                                      • Instruction ID: a25b7a7e10dc34e9f20eda0725eb06c8a5a9566b409061d7fcdcfb1a3d10cc89
                                                      • Opcode Fuzzy Hash: dc6baf27f4e4d028fe3fd0a1fd33b97d5aaa6439d4b934809b0eda74713f1b89
                                                      • Instruction Fuzzy Hash: 2611E731208356BAEB015B54EC83C6AB7DCEF19B70F2400EAF900A61C1EBE55F4059E5
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00B4454E
                                                      • LoadStringW.USER32(00000000), ref: 00B44555
                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00B4456B
                                                      • LoadStringW.USER32(00000000), ref: 00B44572
                                                      • _wprintf.LIBCMT ref: 00B44598
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00B445B6
                                                      Strings
                                                      • %s (%d) : ==> %s: %s %s, xrefs: 00B44593
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message_wprintf
                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                      • API String ID: 3648134473-3128320259
                                                      • Opcode ID: 7200fe25c944fcee115a901f6c1ec3bbd62cd89eb71919eb227f6ac4e060af89
                                                      • Instruction ID: e6cd81bca0b50c73306ba271dcc3eb6328b2f570d3a494032e2d20fd57feeb8b
                                                      • Opcode Fuzzy Hash: 7200fe25c944fcee115a901f6c1ec3bbd62cd89eb71919eb227f6ac4e060af89
                                                      • Instruction Fuzzy Hash: DF0144F2504209BFE7509794ED89EF677ACE708741F0005A5F745E3091EAB49E958F70
                                                      APIs
                                                        • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                                                      • GetSystemMetrics.USER32(0000000F), ref: 00B6D78A
                                                      • GetSystemMetrics.USER32(0000000F), ref: 00B6D7AA
                                                      • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00B6D9E5
                                                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00B6DA03
                                                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00B6DA24
                                                      • ShowWindow.USER32(00000003,00000000), ref: 00B6DA43
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00B6DA68
                                                      • DefDlgProcW.USER32(?,00000005,?,?), ref: 00B6DA8B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                      • String ID:
                                                      • API String ID: 1211466189-0
                                                      • Opcode ID: 7837e9f3e3b5849a5bddf199fc5d6ae6d2abbcf5c72bd956de491c90dc117e98
                                                      • Instruction ID: 4ea5580ca61a3bed2d88d9dd3bbed096c367efe45a3212db8a77e123dd458d70
                                                      • Opcode Fuzzy Hash: 7837e9f3e3b5849a5bddf199fc5d6ae6d2abbcf5c72bd956de491c90dc117e98
                                                      • Instruction Fuzzy Hash: B9B16871A04226ABDF14CF69C9C57BD7BF1FF44701F0881A9ED489B295DB38A950CB60
                                                      APIs
                                                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00B1C417,00000004,00000000,00000000,00000000), ref: 00AE2ACF
                                                      • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00B1C417,00000004,00000000,00000000,00000000,000000FF), ref: 00AE2B17
                                                      • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00B1C417,00000004,00000000,00000000,00000000), ref: 00B1C46A
                                                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00B1C417,00000004,00000000,00000000,00000000), ref: 00B1C4D6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: 043ab491ebef16d34b42bd1459df94c3f898a17709a6a965a24fd0eb83764414
                                                      • Instruction ID: 9472f565303f3aa2701340c4d73f8a42ba61407775d865f4ae75a8ef2636c492
                                                      • Opcode Fuzzy Hash: 043ab491ebef16d34b42bd1459df94c3f898a17709a6a965a24fd0eb83764414
                                                      • Instruction Fuzzy Hash: 0A41FC312086C09AD7358B2ADC9CBBB7BEAEB46350F58847EE047876A1CA7598C1D711
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 00B4737F
                                                        • Part of subcall function 00B00FF6: std::exception::exception.LIBCMT ref: 00B0102C
                                                        • Part of subcall function 00B00FF6: __CxxThrowException@8.LIBCMT ref: 00B01041
                                                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00B473B6
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00B473D2
                                                      • _memmove.LIBCMT ref: 00B47420
                                                      • _memmove.LIBCMT ref: 00B4743D
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00B4744C
                                                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00B47461
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B47480
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 256516436-0
                                                      • Opcode ID: 2b2d09e2638e47afca6f91bbeea61986dd902304f6add9d15724b1a95f64409b
                                                      • Instruction ID: 0c706a6230c06cdc13fb305de6e62bc440e84d0082412e2d32842435788fbe30
                                                      • Opcode Fuzzy Hash: 2b2d09e2638e47afca6f91bbeea61986dd902304f6add9d15724b1a95f64409b
                                                      • Instruction Fuzzy Hash: E6316E31904206EBDF10EF58DD85AAA7BB8EF45710B1441A5F904AB286DF749A14DBA0
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 00B6645A
                                                      • GetDC.USER32(00000000), ref: 00B66462
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B6646D
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00B66479
                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00B664B5
                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00B664C6
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00B69299,?,?,000000FF,00000000,?,000000FF,?), ref: 00B66500
                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00B66520
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                      • String ID:
                                                      • API String ID: 3864802216-0
                                                      • Opcode ID: a42d9fccd552fa1dd7a1cbef2f5e2b37ec3252a68e563dc3d7821bcd866bd8bc
                                                      • Instruction ID: 0829ea0bc4c889fccd0f86852cd200979ea81183754961709d68c976c0581de9
                                                      • Opcode Fuzzy Hash: a42d9fccd552fa1dd7a1cbef2f5e2b37ec3252a68e563dc3d7821bcd866bd8bc
                                                      • Instruction Fuzzy Hash: 66315C72201214BFEB118F50DC4AFFA3BA9EB19761F044065FE099A2A1DAB99841CB64
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID:
                                                      • API String ID: 2931989736-0
                                                      • Opcode ID: e24b0071b8cd2a31f3764e1db092aa9bf4ae67003345e9107eb055598db859eb
                                                      • Instruction ID: 5c24a2912836af6940f4343431a522dea6b46ee290cde8bd737c5c139e4bf791
                                                      • Opcode Fuzzy Hash: e24b0071b8cd2a31f3764e1db092aa9bf4ae67003345e9107eb055598db859eb
                                                      • Instruction Fuzzy Hash: 97219861600605BBD628A6654D52FBF3FDCDF203D4F2440E0FD09B62E2EB52DD1193A5
                                                      APIs
                                                        • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                                                        • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                                                        • Part of subcall function 00AFFEC6: _wcscpy.LIBCMT ref: 00AFFEE9
                                                      • _wcstok.LIBCMT ref: 00B4EEFF
                                                      • _wcscpy.LIBCMT ref: 00B4EF8E
                                                      • _memset.LIBCMT ref: 00B4EFC1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                      • String ID: X
                                                      • API String ID: 774024439-3081909835
                                                      • Opcode ID: 9a55783f110f67c04505dec21d060326e71fd4febc82481c62ad47d8fc7bc7ee
                                                      • Instruction ID: c64c4c1d402c1bfd2fd6839d55eced33c96d3471f52c503d5668e86a9cfed71d
                                                      • Opcode Fuzzy Hash: 9a55783f110f67c04505dec21d060326e71fd4febc82481c62ad47d8fc7bc7ee
                                                      • Instruction Fuzzy Hash: 55C17B715083419FD724EF24C985A6EB7E4FF88310F1049ADF8999B2A2DB70ED45CB82
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7ec32e2ec659b025cd0e6c103b7b07606bdb39cff1228bbcc27eecd452bf70db
                                                      • Instruction ID: 74d3c84e170d53a2e840df74c7c7364a1e15dabcda345925fd05194067883048
                                                      • Opcode Fuzzy Hash: 7ec32e2ec659b025cd0e6c103b7b07606bdb39cff1228bbcc27eecd452bf70db
                                                      • Instruction Fuzzy Hash: BF716970900159EFCB148F99CC89EBEBBB9FF89310F148159F915AB291D734AA51CFA0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 252f46d48b015b26064a25c68ed48ec399b8f6c766df82ce6952c2ca3dc34f47
                                                      • Instruction ID: ebd1484ed5da5cb40343e99a7b05ce0f1dec48091bce09b18bf399027e72ffc0
                                                      • Opcode Fuzzy Hash: 252f46d48b015b26064a25c68ed48ec399b8f6c766df82ce6952c2ca3dc34f47
                                                      • Instruction Fuzzy Hash: 6361BA71608340ABC710EB25DC86F6FB7E9EF88714F144999F9459B2E2DA709D08C792
                                                      APIs
                                                      • IsWindow.USER32(011A5950), ref: 00B6B6A5
                                                      • IsWindowEnabled.USER32(011A5950), ref: 00B6B6B1
                                                      • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00B6B795
                                                      • SendMessageW.USER32(011A5950,000000B0,?,?), ref: 00B6B7CC
                                                      • IsDlgButtonChecked.USER32(?,?), ref: 00B6B809
                                                      • GetWindowLongW.USER32(011A5950,000000EC), ref: 00B6B82B
                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00B6B843
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                      • String ID:
                                                      • API String ID: 4072528602-0
                                                      • Opcode ID: 5d5dfc1d3b2baed060dfeba37f70ea664126e816c7cc006547d2372adbabd8e8
                                                      • Instruction ID: 3a090f7071b38ea1a19f8882e8906ef7fb410a39e336c18c535002f474c6298b
                                                      • Opcode Fuzzy Hash: 5d5dfc1d3b2baed060dfeba37f70ea664126e816c7cc006547d2372adbabd8e8
                                                      • Instruction Fuzzy Hash: E6717C74604205AFDB249F64C8D4FBABBF9FF4A300F1440A9E956D72A1CB39AD91CB50
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B5F75C
                                                      • _memset.LIBCMT ref: 00B5F825
                                                      • ShellExecuteExW.SHELL32(?), ref: 00B5F86A
                                                        • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                                                        • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                                                        • Part of subcall function 00AFFEC6: _wcscpy.LIBCMT ref: 00AFFEE9
                                                      • GetProcessId.KERNEL32(00000000), ref: 00B5F8E1
                                                      • CloseHandle.KERNEL32(00000000), ref: 00B5F910
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                      • String ID: @
                                                      • API String ID: 3522835683-2766056989
                                                      • Opcode ID: 16bbc29e647a758daf23ce795ab53b6c8623c145bf4a22066a5247c6f6a52f2b
                                                      • Instruction ID: 00cccd5b320adad02f39f42d33ea048757b9627ecfc4f51b5a8de224115e64ee
                                                      • Opcode Fuzzy Hash: 16bbc29e647a758daf23ce795ab53b6c8623c145bf4a22066a5247c6f6a52f2b
                                                      • Instruction Fuzzy Hash: A8618C75A0065ADFCB14EF55C580AAEFBF4FF48310F1484A9E846AB391CB30AD45CB90
                                                      APIs
                                                      • GetParent.USER32(?), ref: 00B4149C
                                                      • GetKeyboardState.USER32(?), ref: 00B414B1
                                                      • SetKeyboardState.USER32(?), ref: 00B41512
                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 00B41540
                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 00B4155F
                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00B415A5
                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00B415C8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: 3c4fb671307f34ab6d578f75a0260e9a6c939d9c987adb22e975152979a3aa8f
                                                      • Instruction ID: b6db0c7f03e3bf3a46ea763867a7d18f265bcdb469fbc6045abe366d9227a506
                                                      • Opcode Fuzzy Hash: 3c4fb671307f34ab6d578f75a0260e9a6c939d9c987adb22e975152979a3aa8f
                                                      • Instruction Fuzzy Hash: 5E51D3A0E047D53DFB36462C8C45BBA7FE99B46304F0848C9E1D5568C2D6E8DEC4EB50
                                                      APIs
                                                      • GetParent.USER32(00000000), ref: 00B412B5
                                                      • GetKeyboardState.USER32(?), ref: 00B412CA
                                                      • SetKeyboardState.USER32(?), ref: 00B4132B
                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00B41357
                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00B41374
                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00B413B8
                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00B413D9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: abd97e80fd4a99e877c7fd015d5d09cf44ab4cb739d2ee296a3e59c068b0dc6b
                                                      • Instruction ID: 166c1fcec39bd0ab740ff5dc6c28b7c613628491b579e834b2672fafa4471db6
                                                      • Opcode Fuzzy Hash: abd97e80fd4a99e877c7fd015d5d09cf44ab4cb739d2ee296a3e59c068b0dc6b
                                                      • Instruction Fuzzy Hash: A051F6A0D047D53DFB3287288C55B7A7FE99B06300F0889C9E1D8968C2D794AED4F765
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _wcsncpy$LocalTime
                                                      • String ID:
                                                      • API String ID: 2945705084-0
                                                      • Opcode ID: c85730d6aa8e912bc5111a72e589b09996b4715440e7a3d48427a6f94a262a8a
                                                      • Instruction ID: 5049b6ff5544a3b96dd63232aa280d548b79d7eaca5d805ac2ead1cde081951d
                                                      • Opcode Fuzzy Hash: c85730d6aa8e912bc5111a72e589b09996b4715440e7a3d48427a6f94a262a8a
                                                      • Instruction Fuzzy Hash: 794193A5C20618B6CB10EBB4CC8A9DFBBECAF04710F508596F518E3162E734E715C7A9
                                                      APIs
                                                        • Part of subcall function 00B448AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B438D3,?), ref: 00B448C7
                                                        • Part of subcall function 00B448AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B438D3,?), ref: 00B448E0
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00B438F3
                                                      • _wcscmp.LIBCMT ref: 00B4390F
                                                      • MoveFileW.KERNEL32(?,?), ref: 00B43927
                                                      • _wcscat.LIBCMT ref: 00B4396F
                                                      • SHFileOperationW.SHELL32(?), ref: 00B439DB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                      • String ID: \*.*
                                                      • API String ID: 1377345388-1173974218
                                                      • Opcode ID: fd463a7a5b0297579023bb1ad72e8eb62708cd850e048bb98693b3fff4c99dd8
                                                      • Instruction ID: 4f117027ba41385bb31012b93cbc3936ee9758920c2bf8b5145de30dfbaca0a7
                                                      • Opcode Fuzzy Hash: fd463a7a5b0297579023bb1ad72e8eb62708cd850e048bb98693b3fff4c99dd8
                                                      • Instruction Fuzzy Hash: B94181B140C3849AC751EF64D485AEFB7E8EF88740F5409AEB48AC3191EB74D788C752
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B67519
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B675C0
                                                      • IsMenu.USER32(?), ref: 00B675D8
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B67620
                                                      • DrawMenuBar.USER32 ref: 00B67633
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$DrawInfoInsert_memset
                                                      • String ID: 0
                                                      • API String ID: 3866635326-4108050209
                                                      • Opcode ID: 8aa834fbd5b01c142c1fcc40a4958b05c53dba6038d0a526e82faa3f2caf7563
                                                      • Instruction ID: 2868849f701c46c52fa4a40c64aa126514512105be57b27cc5f456a0490c50bf
                                                      • Opcode Fuzzy Hash: 8aa834fbd5b01c142c1fcc40a4958b05c53dba6038d0a526e82faa3f2caf7563
                                                      • Instruction Fuzzy Hash: 9C415C75A05609EFDB10DF54D884EAABBF8FF05324F1480A9F91697290DB34AD50CF90
                                                      APIs
                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00B6125C
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B61286
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00B6133D
                                                        • Part of subcall function 00B6122D: RegCloseKey.ADVAPI32(?), ref: 00B612A3
                                                        • Part of subcall function 00B6122D: FreeLibrary.KERNEL32(?), ref: 00B612F5
                                                        • Part of subcall function 00B6122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00B61318
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B612E0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                      • String ID:
                                                      • API String ID: 395352322-0
                                                      • Opcode ID: 2e234b0abd76592771b3fd795db613567819a0708e914c4a7e7671ac4c322cd3
                                                      • Instruction ID: 174a940506da77b5b77de1fd4b0be350cceaeb4ab72a309c5216ac63f23646e7
                                                      • Opcode Fuzzy Hash: 2e234b0abd76592771b3fd795db613567819a0708e914c4a7e7671ac4c322cd3
                                                      • Instruction Fuzzy Hash: 25312DB1901109BFDB14DF94EC99AFEB7BCEF08340F0405A9E502E3251DA789E459AA4
                                                      APIs
                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00B6655B
                                                      • GetWindowLongW.USER32(011A5950,000000F0), ref: 00B6658E
                                                      • GetWindowLongW.USER32(011A5950,000000F0), ref: 00B665C3
                                                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00B665F5
                                                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00B6661F
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00B66630
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00B6664A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$MessageSend
                                                      • String ID:
                                                      • API String ID: 2178440468-0
                                                      • Opcode ID: bf5c996bd5e91dea88062ecdd812ec76ec5e76bcf7e1b3919568fafd9e09ac8c
                                                      • Instruction ID: 625233d9e40d5799d55361af32f983b54394b7c44aaacca0df4f733938612611
                                                      • Opcode Fuzzy Hash: bf5c996bd5e91dea88062ecdd812ec76ec5e76bcf7e1b3919568fafd9e09ac8c
                                                      • Instruction Fuzzy Hash: F3310F70604255AFDB208F28EC86F653BE5FB5A710F1801A9F512CB2F6CB69AC40DB91
                                                      APIs
                                                        • Part of subcall function 00B580A0: inet_addr.WSOCK32(00000000), ref: 00B580CB
                                                      • socket.WSOCK32(00000002,00000001,00000006), ref: 00B564D9
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00B564E8
                                                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00B56521
                                                      • connect.WSOCK32(00000000,?,00000010), ref: 00B5652A
                                                      • WSAGetLastError.WSOCK32 ref: 00B56534
                                                      • closesocket.WSOCK32(00000000), ref: 00B5655D
                                                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00B56576
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 910771015-0
                                                      • Opcode ID: f5f5f7c71bd916031c1e75a62838d41572e107eed895de8641346430cff718a5
                                                      • Instruction ID: 919b772f810201770cb7ae49cb75a5ca03c7ace89d795c258d6b796da43466c0
                                                      • Opcode Fuzzy Hash: f5f5f7c71bd916031c1e75a62838d41572e107eed895de8641346430cff718a5
                                                      • Instruction Fuzzy Hash: 9131AF71600218AFEB10AF24DC85BBE7BE8EF54711F4480A9FD05A7291DB74AD09CBA1
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B3E0FA
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B3E120
                                                      • SysAllocString.OLEAUT32(00000000), ref: 00B3E123
                                                      • SysAllocString.OLEAUT32 ref: 00B3E144
                                                      • SysFreeString.OLEAUT32 ref: 00B3E14D
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00B3E167
                                                      • SysAllocString.OLEAUT32(?), ref: 00B3E175
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: 46158979aa90cb184b80d0ed7e0a536e84fdb306bbb6da29c3b4fcf700626d88
                                                      • Instruction ID: 19f6bb8a822bf4101b040b884e62fc4fe7863ea87f272a3820d4dfeef9bc599f
                                                      • Opcode Fuzzy Hash: 46158979aa90cb184b80d0ed7e0a536e84fdb306bbb6da29c3b4fcf700626d88
                                                      • Instruction Fuzzy Hash: 26219035204109AFDB10AFA8DC89CBB77ECEB09760B108166FA24DB2E0DE74DC418B60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp
                                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                      • API String ID: 1038674560-2734436370
                                                      • Opcode ID: 48ed1362cc94f8666d0902e630e88c8b191a7f366762cffbd2d82c3157584dbf
                                                      • Instruction ID: a927f896c967de762e7229407bb0d0c84fbe37fd4649678402efce5208f5373e
                                                      • Opcode Fuzzy Hash: 48ed1362cc94f8666d0902e630e88c8b191a7f366762cffbd2d82c3157584dbf
                                                      • Instruction Fuzzy Hash: C0216472A44252AAD330A724DD12EBBB7DCEF11340F6084B6F88686191FB50ED82C2A1
                                                      APIs
                                                        • Part of subcall function 00AE1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00AE1D73
                                                        • Part of subcall function 00AE1D35: GetStockObject.GDI32(00000011), ref: 00AE1D87
                                                        • Part of subcall function 00AE1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AE1D91
                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00B678A1
                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00B678AE
                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00B678B9
                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00B678C8
                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00B678D4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                      • String ID: Msctls_Progress32
                                                      • API String ID: 1025951953-3636473452
                                                      • Opcode ID: 7afe3f1ecaa59b4b3378973c5ffbdf81a4eb4fe7c28378ad1164c50f17378949
                                                      • Instruction ID: 7e204f2b22a0bbb50bc67781ea972f5704a2e08e3b445fb7c0223fdba9f2b3c9
                                                      • Opcode Fuzzy Hash: 7afe3f1ecaa59b4b3378973c5ffbdf81a4eb4fe7c28378ad1164c50f17378949
                                                      • Instruction Fuzzy Hash: 91118EB2150219BEEF159E61CC85EE77F6DEF08758F014115BA04A30A0CB769C21DBA0
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00B04292,?), ref: 00B041E3
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00B041EA
                                                      • EncodePointer.KERNEL32(00000000), ref: 00B041F6
                                                      • DecodePointer.KERNEL32(00000001,00B04292,?), ref: 00B04213
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                      • String ID: RoInitialize$combase.dll
                                                      • API String ID: 3489934621-340411864
                                                      • Opcode ID: 9c68b969f6f9729ed1d0c3107c067d8967177f8a964e578233f578d5431f30d4
                                                      • Instruction ID: 1a6da2d791bce1f967b2763745e116102a2c3a8ec9364cf0389ecd958d5f6d07
                                                      • Opcode Fuzzy Hash: 9c68b969f6f9729ed1d0c3107c067d8967177f8a964e578233f578d5431f30d4
                                                      • Instruction Fuzzy Hash: 54E0E5B0690301AEEB205BB0EC0AB243EE5FBA2B02F108474F521E71E0DFF944919E04
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00B041B8), ref: 00B042B8
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00B042BF
                                                      • EncodePointer.KERNEL32(00000000), ref: 00B042CA
                                                      • DecodePointer.KERNEL32(00B041B8), ref: 00B042E5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                      • String ID: RoUninitialize$combase.dll
                                                      • API String ID: 3489934621-2819208100
                                                      • Opcode ID: 750fe8156e4105e9373b971e6f7c4a9f5111643f6fe2795e40a71ce6bb1ca5c9
                                                      • Instruction ID: e9157eb584c491adcac3a3d7083f439ecaff3469c6b83407ebe5474f7d298f2e
                                                      • Opcode Fuzzy Hash: 750fe8156e4105e9373b971e6f7c4a9f5111643f6fe2795e40a71ce6bb1ca5c9
                                                      • Instruction Fuzzy Hash: 2DE092B8691202AFEA109B60FE0AB243EA4BB65B42F204064F111F31E0CFF845448A18
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memmove$__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 3253778849-0
                                                      • Opcode ID: b6af34302f73e7cc86d124cdaa6c703dbf7dfb6507262c8ff84fb63fda3a9fb8
                                                      • Instruction ID: 285c55adc2f3a765545ee618557bed7944abdec63eccf0af16359ee8ed277110
                                                      • Opcode Fuzzy Hash: b6af34302f73e7cc86d124cdaa6c703dbf7dfb6507262c8ff84fb63fda3a9fb8
                                                      • Instruction Fuzzy Hash: 2A61CE3050069A9BCF15EF25CD81EFE3BE4EF49308F044599F8955B292EB309E45DB51
                                                      APIs
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                        • Part of subcall function 00B610A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B60038,?,?), ref: 00B610BC
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B60548
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B60588
                                                      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00B605AB
                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00B605D4
                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B60617
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00B60624
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                      • String ID:
                                                      • API String ID: 4046560759-0
                                                      • Opcode ID: 220cd666d9c6a514316431fed9f99c766cced6b3234a648b40b37093130331a0
                                                      • Instruction ID: 6e3e6a62db0e9ae5eee215fa94dd02a8968a566e6d14d43324c515be65cec5c5
                                                      • Opcode Fuzzy Hash: 220cd666d9c6a514316431fed9f99c766cced6b3234a648b40b37093130331a0
                                                      • Instruction Fuzzy Hash: 33516631218240AFCB14EF65D985E6FBBE8FF88314F04496DF586872A2DB75E904CB52
                                                      APIs
                                                      • GetMenu.USER32(?), ref: 00B65A82
                                                      • GetMenuItemCount.USER32(00000000), ref: 00B65AB9
                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00B65AE1
                                                      • GetMenuItemID.USER32(?,?), ref: 00B65B50
                                                      • GetSubMenu.USER32(?,?), ref: 00B65B5E
                                                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 00B65BAF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountMessagePostString
                                                      • String ID:
                                                      • API String ID: 650687236-0
                                                      • Opcode ID: c4aabbb8d86ed036da67ff042fa3e07faadaae7a4b8287676b8ed1230dbd4b37
                                                      • Instruction ID: fc03bad50c058f8cc4182cf59a3844c900b44655462dfb9eb2bcae35fb003c29
                                                      • Opcode Fuzzy Hash: c4aabbb8d86ed036da67ff042fa3e07faadaae7a4b8287676b8ed1230dbd4b37
                                                      • Instruction Fuzzy Hash: C4519135A00615EFCF21DFA4C945AAEB7F4EF48310F1444A9E941B7391CB74AE41CB90
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00B3F3F7
                                                      • VariantClear.OLEAUT32(00000013), ref: 00B3F469
                                                      • VariantClear.OLEAUT32(00000000), ref: 00B3F4C4
                                                      • _memmove.LIBCMT ref: 00B3F4EE
                                                      • VariantClear.OLEAUT32(?), ref: 00B3F53B
                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00B3F569
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Variant$Clear$ChangeInitType_memmove
                                                      • String ID:
                                                      • API String ID: 1101466143-0
                                                      • Opcode ID: a438e34ba837db4dca4a1c0f33b8a945e42f0657fbbdf8a3bb63fee693392ada
                                                      • Instruction ID: f3c205479d91911df4c8badd95a2d99bd9b227bdda25895f29b0a03cf083dc21
                                                      • Opcode Fuzzy Hash: a438e34ba837db4dca4a1c0f33b8a945e42f0657fbbdf8a3bb63fee693392ada
                                                      • Instruction Fuzzy Hash: 90514BB5A0020AAFCB14CF58D884AAAB7F8FF4C354F15856AE959DB350D734E911CFA0
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B42747
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B42792
                                                      • IsMenu.USER32(00000000), ref: 00B427B2
                                                      • CreatePopupMenu.USER32 ref: 00B427E6
                                                      • GetMenuItemCount.USER32(000000FF), ref: 00B42844
                                                      • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00B42875
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                      • String ID:
                                                      • API String ID: 3311875123-0
                                                      • Opcode ID: 7ee15d0348069d777c49b0939e42490630c103cf007a2728f1f6ef7a0fb8d2e4
                                                      • Instruction ID: 882715d3c3e3e53f0acc34ccc034f3c221bd32f0302822f17baf0cfb82c06da8
                                                      • Opcode Fuzzy Hash: 7ee15d0348069d777c49b0939e42490630c103cf007a2728f1f6ef7a0fb8d2e4
                                                      • Instruction Fuzzy Hash: D8519E70A0020AEBDF25CF68D988BAEBBF5EF54314F5041A9F8119B291D7709E44EB61
                                                      APIs
                                                        • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                                                      • BeginPaint.USER32(?,?,?,?,?,?), ref: 00AE179A
                                                      • GetWindowRect.USER32(?,?), ref: 00AE17FE
                                                      • ScreenToClient.USER32(?,?), ref: 00AE181B
                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00AE182C
                                                      • EndPaint.USER32(?,?), ref: 00AE1876
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                      • String ID:
                                                      • API String ID: 1827037458-0
                                                      • Opcode ID: 24fb301384d6e68b46fbb3d6180ee8d882baa058602df1dccdcb5924acc55618
                                                      • Instruction ID: 64a924fbf4e588c4542c9bcb1d584332e989a2c70378e4ccd72548839d55c048
                                                      • Opcode Fuzzy Hash: 24fb301384d6e68b46fbb3d6180ee8d882baa058602df1dccdcb5924acc55618
                                                      • Instruction Fuzzy Hash: 8341DB70100351AFC710DF26DC84FBA3BF8EB4A724F140669FAA5872A1CB749845CB61
                                                      APIs
                                                      • ShowWindow.USER32(00BA67B0,00000000,011A5950,?,?,00BA67B0,?,00B6B862,?,?), ref: 00B6B9CC
                                                      • EnableWindow.USER32(00000000,00000000), ref: 00B6B9F0
                                                      • ShowWindow.USER32(00BA67B0,00000000,011A5950,?,?,00BA67B0,?,00B6B862,?,?), ref: 00B6BA50
                                                      • ShowWindow.USER32(00000000,00000004,?,00B6B862,?,?), ref: 00B6BA62
                                                      • EnableWindow.USER32(00000000,00000001), ref: 00B6BA86
                                                      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00B6BAA9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$Enable$MessageSend
                                                      • String ID:
                                                      • API String ID: 642888154-0
                                                      • Opcode ID: ccaa7da5f9effefe6e12499ef81fc0fe571c576db0ad77fd250175f3190532e3
                                                      • Instruction ID: 22caddb13f6d3cd72fc70163555421da4763a498afc8cf6e1d4076af9222395d
                                                      • Opcode Fuzzy Hash: ccaa7da5f9effefe6e12499ef81fc0fe571c576db0ad77fd250175f3190532e3
                                                      • Instruction Fuzzy Hash: DC415030600241AFDB25CF94D489FA57BF1FB05314F1842F9EA48CF2A2CB79A885CB51
                                                      APIs
                                                      • GetForegroundWindow.USER32(?,?,?,?,?,?,00B55134,?,?,00000000,00000001), ref: 00B573BF
                                                        • Part of subcall function 00B53C94: GetWindowRect.USER32(?,?), ref: 00B53CA7
                                                      • GetDesktopWindow.USER32 ref: 00B573E9
                                                      • GetWindowRect.USER32(00000000), ref: 00B573F0
                                                      • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00B57422
                                                        • Part of subcall function 00B454E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B4555E
                                                      • GetCursorPos.USER32(?), ref: 00B5744E
                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00B574AC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                      • String ID:
                                                      • API String ID: 4137160315-0
                                                      • Opcode ID: 2de930f1899900409145e9d349b007f17d9fdd1995e25f98f36fc1b0e5930ff6
                                                      • Instruction ID: cf0f587d83e2e92f907f71d90b6899918a3b4bd105741faf2f0dac99a299648c
                                                      • Opcode Fuzzy Hash: 2de930f1899900409145e9d349b007f17d9fdd1995e25f98f36fc1b0e5930ff6
                                                      • Instruction Fuzzy Hash: 6131E872508306ABD720DF14E849F6BBBD9FF88314F000959F98597291CB74EE48CB92
                                                      APIs
                                                        • Part of subcall function 00B385F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B38608
                                                        • Part of subcall function 00B385F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B38612
                                                        • Part of subcall function 00B385F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B38621
                                                        • Part of subcall function 00B385F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B38628
                                                        • Part of subcall function 00B385F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B3863E
                                                      • GetLengthSid.ADVAPI32(?,00000000,00B38977), ref: 00B38DAC
                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00B38DB8
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00B38DBF
                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 00B38DD8
                                                      • GetProcessHeap.KERNEL32(00000000,00000000,00B38977), ref: 00B38DEC
                                                      • HeapFree.KERNEL32(00000000), ref: 00B38DF3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                      • String ID:
                                                      • API String ID: 3008561057-0
                                                      • Opcode ID: f13972605876618edad8aad581e49a25c2ff01aa21d6218b44543f632ebb70c2
                                                      • Instruction ID: 2e370f00a01e7dda8f42715f7c3f994c77f2b09aa12f36609be664ac013593e9
                                                      • Opcode Fuzzy Hash: f13972605876618edad8aad581e49a25c2ff01aa21d6218b44543f632ebb70c2
                                                      • Instruction Fuzzy Hash: 2F11AC32500606FFDB109FA8DC09BBE7BA9FF55355F2040ADF945A7290CB76AA04CB61
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00B38B2A
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00B38B31
                                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00B38B40
                                                      • CloseHandle.KERNEL32(00000004), ref: 00B38B4B
                                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B38B7A
                                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00B38B8E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                      • String ID:
                                                      • API String ID: 1413079979-0
                                                      • Opcode ID: 811197733cc0efffba45abfb7661ff25e2d46d6eddda0535e35fbb9e930649df
                                                      • Instruction ID: f75f0b12745f326d382d939200e1fa3d9b218a3e24d4e89d97e14a483baf823d
                                                      • Opcode Fuzzy Hash: 811197733cc0efffba45abfb7661ff25e2d46d6eddda0535e35fbb9e930649df
                                                      • Instruction Fuzzy Hash: 4D112EB250124AEBDF018F94ED49FEA7BE9EF08304F144065FE04A21A0DB769D609B61
                                                      APIs
                                                        • Part of subcall function 00AE12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AE134D
                                                        • Part of subcall function 00AE12F3: SelectObject.GDI32(?,00000000), ref: 00AE135C
                                                        • Part of subcall function 00AE12F3: BeginPath.GDI32(?), ref: 00AE1373
                                                        • Part of subcall function 00AE12F3: SelectObject.GDI32(?,00000000), ref: 00AE139C
                                                      • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00B6C1C4
                                                      • LineTo.GDI32(00000000,00000003,?), ref: 00B6C1D8
                                                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B6C1E6
                                                      • LineTo.GDI32(00000000,00000000,?), ref: 00B6C1F6
                                                      • EndPath.GDI32(00000000), ref: 00B6C206
                                                      • StrokePath.GDI32(00000000), ref: 00B6C216
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                      • String ID:
                                                      • API String ID: 43455801-0
                                                      • Opcode ID: 804c90cf422aebf56c4c1dec0948f23c4740f22b908d6f9f76b5cdb5f4513f89
                                                      • Instruction ID: 8cd16e08d27883a4dd74c8fe41a46401590a7902ea04cbdbeaf2257261b6db4f
                                                      • Opcode Fuzzy Hash: 804c90cf422aebf56c4c1dec0948f23c4740f22b908d6f9f76b5cdb5f4513f89
                                                      • Instruction Fuzzy Hash: 90113C7600010DBFDB019F90EC48EAA3FACEB08390F048021FA08561A1CB759D54DBA0
                                                      APIs
                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B003D3
                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00B003DB
                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B003E6
                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B003F1
                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00B003F9
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B00401
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Virtual
                                                      • String ID:
                                                      • API String ID: 4278518827-0
                                                      • Opcode ID: 517ca263281c53b5cd76e9ce5941c5d4189d80b806d2477d0c36f1bf6c04b451
                                                      • Instruction ID: ff4cedb1693c875f1a013169fe2dec4a48fc6155a1e19358d6e329776e9987ff
                                                      • Opcode Fuzzy Hash: 517ca263281c53b5cd76e9ce5941c5d4189d80b806d2477d0c36f1bf6c04b451
                                                      • Instruction Fuzzy Hash: 3E016CB090175A7DE3008F5A8C85B52FFA8FF19354F00411BE15C47941C7F5A864CBE5
                                                      APIs
                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00B4569B
                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00B456B1
                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 00B456C0
                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B456CF
                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B456D9
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B456E0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 839392675-0
                                                      • Opcode ID: 5650ad6f6cd7c755f8c0bf028e9a44cf6ce20cb531c20c2dd5312dc4d320ca95
                                                      • Instruction ID: 414e3891e124c2dcebdd22455ef94b2be46caf95dfff19e51f03648cdc339fc3
                                                      • Opcode Fuzzy Hash: 5650ad6f6cd7c755f8c0bf028e9a44cf6ce20cb531c20c2dd5312dc4d320ca95
                                                      • Instruction Fuzzy Hash: 20F01D3224155ABBE7215BA2EC0DEBB7A7CEBC7B51F000169FA04D20919AE91A01C6B5
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,?), ref: 00B474E5
                                                      • EnterCriticalSection.KERNEL32(?,?,00AF1044,?,?), ref: 00B474F6
                                                      • TerminateThread.KERNEL32(00000000,000001F6,?,00AF1044,?,?), ref: 00B47503
                                                      • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00AF1044,?,?), ref: 00B47510
                                                        • Part of subcall function 00B46ED7: CloseHandle.KERNEL32(00000000,?,00B4751D,?,00AF1044,?,?), ref: 00B46EE1
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B47523
                                                      • LeaveCriticalSection.KERNEL32(?,?,00AF1044,?,?), ref: 00B4752A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                      • String ID:
                                                      • API String ID: 3495660284-0
                                                      • Opcode ID: 36380af025cf90736b0197be00d42c6664bb98cefdc1ed7b02c4f98e18a067de
                                                      • Instruction ID: e45742552b8170f26015bfaca98c85827c40262993935010d84e829a77c4c7dc
                                                      • Opcode Fuzzy Hash: 36380af025cf90736b0197be00d42c6664bb98cefdc1ed7b02c4f98e18a067de
                                                      • Instruction Fuzzy Hash: 71F03A3A184613ABDB112B64FC989EA776AFF45302B000571F202A60E0CFB95901DE50
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B38E7F
                                                      • UnloadUserProfile.USERENV(?,?), ref: 00B38E8B
                                                      • CloseHandle.KERNEL32(?), ref: 00B38E94
                                                      • CloseHandle.KERNEL32(?), ref: 00B38E9C
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00B38EA5
                                                      • HeapFree.KERNEL32(00000000), ref: 00B38EAC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                      • String ID:
                                                      • API String ID: 146765662-0
                                                      • Opcode ID: bfe19bd48bbae22b9b19d0ef5651086657162256bd9caa8a02ed807c39cd1e8b
                                                      • Instruction ID: a60ee33ee980f88e76009cce13fc4a0b19a4efabfa0329e68f67ceacbe9d9318
                                                      • Opcode Fuzzy Hash: bfe19bd48bbae22b9b19d0ef5651086657162256bd9caa8a02ed807c39cd1e8b
                                                      • Instruction Fuzzy Hash: 28E0C236004002FBDA011FE1FC0C92ABB69FB8A362B108230F229921B0CFBA9420DB50
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00B58928
                                                      • CharUpperBuffW.USER32(?,?), ref: 00B58A37
                                                      • VariantClear.OLEAUT32(?), ref: 00B58BAF
                                                        • Part of subcall function 00B47804: VariantInit.OLEAUT32(00000000), ref: 00B47844
                                                        • Part of subcall function 00B47804: VariantCopy.OLEAUT32(00000000,?), ref: 00B4784D
                                                        • Part of subcall function 00B47804: VariantClear.OLEAUT32(00000000), ref: 00B47859
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                      • API String ID: 4237274167-1221869570
                                                      • Opcode ID: eec1466b45f876666ce39c773ba48118fde87fd354bdf53d0b076dc21fa529d8
                                                      • Instruction ID: d7ac0d8a3a7de9126755d73319bcc9e129ec0fa91666bb92b302c5dca5909c0c
                                                      • Opcode Fuzzy Hash: eec1466b45f876666ce39c773ba48118fde87fd354bdf53d0b076dc21fa529d8
                                                      • Instruction Fuzzy Hash: 8C919F71608341DFC700DF25C584A6BBBE4EF88355F1449AEF88A9B362DB31E909CB52
                                                      APIs
                                                        • Part of subcall function 00AFFEC6: _wcscpy.LIBCMT ref: 00AFFEE9
                                                      • _memset.LIBCMT ref: 00B43077
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B430A6
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B43159
                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00B43187
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                      • String ID: 0
                                                      • API String ID: 4152858687-4108050209
                                                      • Opcode ID: 39dd0105c72968d9f138640c0d83f3169a3803e79fc5fa5f53569c2347e1fc79
                                                      • Instruction ID: 387458985d4b54453d5ba32eac353bf471625a13e5ba4e4de78561f7548988ee
                                                      • Opcode Fuzzy Hash: 39dd0105c72968d9f138640c0d83f3169a3803e79fc5fa5f53569c2347e1fc79
                                                      • Instruction Fuzzy Hash: A751E1716083009AD7159F28D845B6BBBE8EF55B20F080AAEF895E32D0DB74CF44E752
                                                      APIs
                                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00B3DAC5
                                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00B3DAFB
                                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00B3DB0C
                                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00B3DB8E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                                      • String ID: DllGetClassObject
                                                      • API String ID: 753597075-1075368562
                                                      • Opcode ID: ec9082dfa0ee425150dfef1e222d95c18613cbb9642b286471704e08b0087d39
                                                      • Instruction ID: 694890c346971b5ad84e53875edd2f9e66751e790753c1cea28f98dfed08b712
                                                      • Opcode Fuzzy Hash: ec9082dfa0ee425150dfef1e222d95c18613cbb9642b286471704e08b0087d39
                                                      • Instruction Fuzzy Hash: 8F417171600208EFDF15CF54E884A9ABBE9EF48350F2580E9ED059F255E7B1DA44CBA0
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B42CAF
                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00B42CCB
                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 00B42D11
                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00BA6890,00000000), ref: 00B42D5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Menu$Delete$InfoItem_memset
                                                      • String ID: 0
                                                      • API String ID: 1173514356-4108050209
                                                      • Opcode ID: 5888acecf46db86ce24dbf2761150a2621e447bad6d5b6d94e5cdef6f79a5b48
                                                      • Instruction ID: eb325c61fbd3b0ae531568d3209b618326d36afcd0d8c8003ee5d21ed921cbbc
                                                      • Opcode Fuzzy Hash: 5888acecf46db86ce24dbf2761150a2621e447bad6d5b6d94e5cdef6f79a5b48
                                                      • Instruction Fuzzy Hash: F741A3705043029FDB10DF24DC85B1AB7E4EF85324F5446ADF966972D1DB70EA04EB92
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00B5DAD9
                                                        • Part of subcall function 00AE79AB: _memmove.LIBCMT ref: 00AE79F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: BuffCharLower_memmove
                                                      • String ID: cdecl$none$stdcall$winapi
                                                      • API String ID: 3425801089-567219261
                                                      • Opcode ID: 65d1ddc9789ab44cd91342bcf0d7075767f6203e2a033c6c09bb51661aee0626
                                                      • Instruction ID: 21d8e8ca3c3b95c7f377fff0a27016f41529c479432b0f30e604cb4060c5c21a
                                                      • Opcode Fuzzy Hash: 65d1ddc9789ab44cd91342bcf0d7075767f6203e2a033c6c09bb51661aee0626
                                                      • Instruction Fuzzy Hash: 3531A17190421AABCF10EF64CD81AAEB7F5FF15310F1087A9E865976D1CB71A909CB90
                                                      APIs
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                        • Part of subcall function 00B3B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B3B0E7
                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00B393F6
                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00B39409
                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00B39439
                                                        • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$_memmove$ClassName
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 365058703-1403004172
                                                      • Opcode ID: 596a5448b03688502f6dcad7ef865f3c24ec4cca8fdef53509cd0bfd1248fcdc
                                                      • Instruction ID: d0e13a275eb2e43b5ff0b9bd6c0254cddbee0f68d988972b96647054a67e7069
                                                      • Opcode Fuzzy Hash: 596a5448b03688502f6dcad7ef865f3c24ec4cca8fdef53509cd0bfd1248fcdc
                                                      • Instruction Fuzzy Hash: C221B171904104BADB28AB75DC85CFFB7A8DF45360F2041A9F926972E1DBB94E0A9620
                                                      APIs
                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B51B40
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B51B66
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B51B96
                                                      • InternetCloseHandle.WININET(00000000), ref: 00B51BDD
                                                        • Part of subcall function 00B52777: GetLastError.KERNEL32(?,?,00B51B0B,00000000,00000000,00000001), ref: 00B5278C
                                                        • Part of subcall function 00B52777: SetEvent.KERNEL32(?,?,00B51B0B,00000000,00000000,00000001), ref: 00B527A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                      • String ID:
                                                      • API String ID: 3113390036-3916222277
                                                      • Opcode ID: fdabef68c7b9660d2f9d10b136b3df20b074a8fdd397d08d9e13c8d6ffdc144c
                                                      • Instruction ID: 11837403e21247b366bff5038e7933658333a944a160fa964306ac7ba924e693
                                                      • Opcode Fuzzy Hash: fdabef68c7b9660d2f9d10b136b3df20b074a8fdd397d08d9e13c8d6ffdc144c
                                                      • Instruction Fuzzy Hash: 2E21BEB1500209BFEB119F289CC5FBB77ECEB4974AF1005EAF905A7240EA649D089761
                                                      APIs
                                                        • Part of subcall function 00AE1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00AE1D73
                                                        • Part of subcall function 00AE1D35: GetStockObject.GDI32(00000011), ref: 00AE1D87
                                                        • Part of subcall function 00AE1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AE1D91
                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00B666D0
                                                      • LoadLibraryW.KERNEL32(?), ref: 00B666D7
                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00B666EC
                                                      • DestroyWindow.USER32(?), ref: 00B666F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                      • String ID: SysAnimate32
                                                      • API String ID: 4146253029-1011021900
                                                      • Opcode ID: 08ba6a998a96465365f09b250ef2ebf5506fb336186588103ccbf016bd42d694
                                                      • Instruction ID: 3b6437d2b6022df26a1e712c451f2e9d689d439a6d7b86be537003df8483fcbc
                                                      • Opcode Fuzzy Hash: 08ba6a998a96465365f09b250ef2ebf5506fb336186588103ccbf016bd42d694
                                                      • Instruction Fuzzy Hash: DD216AB1600206ABEF104F64EC81EFB77EDEB59368F104669FA11931A0DBB9DC519760
                                                      APIs
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00B4705E
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B47091
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00B470A3
                                                      • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00B470DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CreateHandle$FilePipe
                                                      • String ID: nul
                                                      • API String ID: 4209266947-2873401336
                                                      • Opcode ID: dbf56367c000ddac8b3fc686775ee6e8b0e569a035069d7e6d6f50187b6fff1a
                                                      • Instruction ID: a3b734090e98891a498dc30cec303d0cd25346353e379bf40c1d6b43cbe511d5
                                                      • Opcode Fuzzy Hash: dbf56367c000ddac8b3fc686775ee6e8b0e569a035069d7e6d6f50187b6fff1a
                                                      • Instruction Fuzzy Hash: 3221817454520AABDF209F78DC05A9A77E8FF45720F204AA9FCA0D73D0DBB09A40DB51
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00B4712B
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B4715D
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00B4716E
                                                      • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00B471A8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CreateHandle$FilePipe
                                                      • String ID: nul
                                                      • API String ID: 4209266947-2873401336
                                                      • Opcode ID: d4c8018f9d968666574bdefa0d0cdd8dc805a3399157393c670fab7fc03ddb46
                                                      • Instruction ID: a7df1dbf79c6c7ef89e76c0bb35a75470dc82e945c2c0a3c04fe8e5906049a20
                                                      • Opcode Fuzzy Hash: d4c8018f9d968666574bdefa0d0cdd8dc805a3399157393c670fab7fc03ddb46
                                                      • Instruction Fuzzy Hash: 2021C5755843069BDF209F689C44AAAB7E8EF55730F200A99FCB0E32D0DF709A41DB51
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00B4AEBF
                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00B4AF13
                                                      • __swprintf.LIBCMT ref: 00B4AF2C
                                                      • SetErrorMode.KERNEL32(00000000,00000001,00000000,00B6F910), ref: 00B4AF6A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$InformationVolume__swprintf
                                                      • String ID: %lu
                                                      • API String ID: 3164766367-685833217
                                                      • Opcode ID: 1a239c70344bfa97c3c275c6b2bc7a4052fd9063cd2521002630941a4ae92d6c
                                                      • Instruction ID: afd56fec415a2b000895479b4f2f6b301c47a28df144d1dfd4b553c468a21e9b
                                                      • Opcode Fuzzy Hash: 1a239c70344bfa97c3c275c6b2bc7a4052fd9063cd2521002630941a4ae92d6c
                                                      • Instruction Fuzzy Hash: 28214130A00249AFCB10DF65DD85DEE7BF8EF49704B1040A9F909EB251DB71EA45DB61
                                                      APIs
                                                        • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                                                        • Part of subcall function 00B3A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00B3A399
                                                        • Part of subcall function 00B3A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B3A3AC
                                                        • Part of subcall function 00B3A37C: GetCurrentThreadId.KERNEL32 ref: 00B3A3B3
                                                        • Part of subcall function 00B3A37C: AttachThreadInput.USER32(00000000), ref: 00B3A3BA
                                                      • GetFocus.USER32 ref: 00B3A554
                                                        • Part of subcall function 00B3A3C5: GetParent.USER32(?), ref: 00B3A3D3
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00B3A59D
                                                      • EnumChildWindows.USER32(?,00B3A615), ref: 00B3A5C5
                                                      • __swprintf.LIBCMT ref: 00B3A5DF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                      • String ID: %s%d
                                                      • API String ID: 1941087503-1110647743
                                                      • Opcode ID: ef0385e5388935738956f4a4337184a798aeaf260b71b9ff749c93044f19530e
                                                      • Instruction ID: 5b6bfa6168142791da5d3a4b6fd5ca06d6cdb920050563161b84fcb09941249e
                                                      • Opcode Fuzzy Hash: ef0385e5388935738956f4a4337184a798aeaf260b71b9ff749c93044f19530e
                                                      • Instruction Fuzzy Hash: 5811AF71604209ABDF10BF64EC8AFFA37B8AF48700F2440B5F948AA192CA7559458B75
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 00B42048
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper
                                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                      • API String ID: 3964851224-769500911
                                                      • Opcode ID: e896710dd04b178d483ddc0b11166a243969051f0e8fcbfd849e36628c37565f
                                                      • Instruction ID: fbe40cdae612deef70cabbc877a89c788a378115e0f420adfc94a39915cf13b5
                                                      • Opcode Fuzzy Hash: e896710dd04b178d483ddc0b11166a243969051f0e8fcbfd849e36628c37565f
                                                      • Instruction Fuzzy Hash: CF1139319101199FCF00EFA4D9815AEB7F4FF26304F5085E8E855A7392EB326A06EB50
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00B5EF1B
                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00B5EF4B
                                                      • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00B5F07E
                                                      • CloseHandle.KERNEL32(?), ref: 00B5F0FF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                      • String ID:
                                                      • API String ID: 2364364464-0
                                                      • Opcode ID: c0861e24de3c23b7f27f3c648de6e407ccb46b034dcbf89fa479578e76e244e8
                                                      • Instruction ID: a9fbab13bff9741229de76450bcbb317e60808341128039bd938723391102156
                                                      • Opcode Fuzzy Hash: c0861e24de3c23b7f27f3c648de6e407ccb46b034dcbf89fa479578e76e244e8
                                                      • Instruction Fuzzy Hash: 90816FB16043019FD720EF29C986B2AB7E5EF48710F14886DF999DB292DBB0ED058B51
                                                      APIs
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                        • Part of subcall function 00B610A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B60038,?,?), ref: 00B610BC
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B60388
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B603C7
                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00B6040E
                                                      • RegCloseKey.ADVAPI32(?,?), ref: 00B6043A
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00B60447
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                      • String ID:
                                                      • API String ID: 3440857362-0
                                                      • Opcode ID: 07e2483a62de7a5eb5e89a911a040ed83f2af1b6e5adf356ade2dda83e231835
                                                      • Instruction ID: c846f851292bf3601ecff966e150963381672cd6bfa6ebe90f5017908d74012f
                                                      • Opcode Fuzzy Hash: 07e2483a62de7a5eb5e89a911a040ed83f2af1b6e5adf356ade2dda83e231835
                                                      • Instruction Fuzzy Hash: B6516731218245AFD704EF65D981E6FB7E8FF88304F04896DF596872A2DB74E904CB52
                                                      APIs
                                                        • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                                                        • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                                                      • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00B5DC3B
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00B5DCBE
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00B5DCDA
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00B5DD1B
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00B5DD35
                                                        • Part of subcall function 00AE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00B47B20,?,?,00000000), ref: 00AE5B8C
                                                        • Part of subcall function 00AE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00B47B20,?,?,00000000,?,?), ref: 00AE5BB0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 327935632-0
                                                      • Opcode ID: e15f6714e37449ce999a58b5a70fb092829f05293e4119b6b36e3353a50e70cb
                                                      • Instruction ID: 6797020acafb76e12e079a78e87e6c3d6ecf95f4900afd77668056551b8b78ae
                                                      • Opcode Fuzzy Hash: e15f6714e37449ce999a58b5a70fb092829f05293e4119b6b36e3353a50e70cb
                                                      • Instruction Fuzzy Hash: 53514935A00205DFCB10EF68C584AAEB7F4FF49311B1481A9E815AB362DB70ED45CF90
                                                      APIs
                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00B4E88A
                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00B4E8B3
                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00B4E8F2
                                                        • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                                                        • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00B4E917
                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00B4E91F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 1389676194-0
                                                      • Opcode ID: 250efabc24e6c32effbd1107ae0749d116f60130e7bd0dfb5efc079bb54f8bd2
                                                      • Instruction ID: 2e95a3a261a1c0145d9a821767a96f67e26fdf79dab3a75d28e0f89a5a67f007
                                                      • Opcode Fuzzy Hash: 250efabc24e6c32effbd1107ae0749d116f60130e7bd0dfb5efc079bb54f8bd2
                                                      • Instruction Fuzzy Hash: 6F510A35A00245EFCF05EF65C9819AEBBF5FF48314B1480A9E949AB3A2DB31ED11DB50
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5099b1a8b1b46bda84eda4c344958c7fbdf517669aa0e874dafa0b4c04b4a218
                                                      • Instruction ID: 2fb22d3cb1523ca05b60b045093cb877aaa6537bd471f0c4a9ef22de2fdf578c
                                                      • Opcode Fuzzy Hash: 5099b1a8b1b46bda84eda4c344958c7fbdf517669aa0e874dafa0b4c04b4a218
                                                      • Instruction Fuzzy Hash: 4541B235900104ABDB10DF28DC98FB9BBE8FB09310F1441A5E866B73E1DB78AD41DE55
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 00AE2357
                                                      • ScreenToClient.USER32(00BA67B0,?), ref: 00AE2374
                                                      • GetAsyncKeyState.USER32(00000001), ref: 00AE2399
                                                      • GetAsyncKeyState.USER32(00000002), ref: 00AE23A7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AsyncState$ClientCursorScreen
                                                      • String ID:
                                                      • API String ID: 4210589936-0
                                                      • Opcode ID: a09779fe503f6c2126f166f0c112dfd92ef8f2b1c879ec1dd6134f56320d03d2
                                                      • Instruction ID: ab58e08fca7b8fd5c3fa5c55aea6935eddaff53c95b9c550040853c6fcc3abc7
                                                      • Opcode Fuzzy Hash: a09779fe503f6c2126f166f0c112dfd92ef8f2b1c879ec1dd6134f56320d03d2
                                                      • Instruction Fuzzy Hash: 44418E3150415AFBDF159F69C844BE9BBB8FB05320F20436AF829A62A0C774AD90DF91
                                                      APIs
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B3695D
                                                      • TranslateAcceleratorW.USER32(?,?,?), ref: 00B369A9
                                                      • TranslateMessage.USER32(?), ref: 00B369D2
                                                      • DispatchMessageW.USER32(?), ref: 00B369DC
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B369EB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                      • String ID:
                                                      • API String ID: 2108273632-0
                                                      • Opcode ID: 3da3e5031b56dba6ce852ffd0be1ec18658f0fdf8c686ae89892864efd3075d6
                                                      • Instruction ID: 8abca749482a7b9912b7c7e58bcc4435181b8622ebc81368579737f2d08baaf9
                                                      • Opcode Fuzzy Hash: 3da3e5031b56dba6ce852ffd0be1ec18658f0fdf8c686ae89892864efd3075d6
                                                      • Instruction Fuzzy Hash: 5831E571904246BADB21CF74DC85BB67BECEB16300F2482A5E421C71A0DB74D885D790
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 00B38F12
                                                      • PostMessageW.USER32(?,00000201,00000001), ref: 00B38FBC
                                                      • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00B38FC4
                                                      • PostMessageW.USER32(?,00000202,00000000), ref: 00B38FD2
                                                      • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00B38FDA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleep$RectWindow
                                                      • String ID:
                                                      • API String ID: 3382505437-0
                                                      • Opcode ID: aa1819a4e56e37303691b3835a64007582147734f37220e2fea185486aa474bc
                                                      • Instruction ID: d1a69ae2a42c37ede75609c29da105fedc79f4d9f58537aa8d619e80ee305b35
                                                      • Opcode Fuzzy Hash: aa1819a4e56e37303691b3835a64007582147734f37220e2fea185486aa474bc
                                                      • Instruction Fuzzy Hash: 9B31E07150021AEFDF00CF68D94CAAE7BB6FB04315F204669F924EB1D0CBB49910CB91
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 00B3B6C7
                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00B3B6E4
                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00B3B71C
                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00B3B742
                                                      • _wcsstr.LIBCMT ref: 00B3B74C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                      • String ID:
                                                      • API String ID: 3902887630-0
                                                      • Opcode ID: ad571d03d5c0c77cd940af00864d81c8f95084ecece02819f03cdea2aa0bd5ec
                                                      • Instruction ID: 2747b0c480f4b58001abf48848958848dae971312b8e0260a0969b3074f5002c
                                                      • Opcode Fuzzy Hash: ad571d03d5c0c77cd940af00864d81c8f95084ecece02819f03cdea2aa0bd5ec
                                                      • Instruction Fuzzy Hash: C5210732204204BAEB255B39EC4AE7B7BD8DF85710F2040ADF905CA1A5EF65CC4092A0
                                                      APIs
                                                        • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00B6B44C
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00B6B471
                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00B6B489
                                                      • GetSystemMetrics.USER32(00000004), ref: 00B6B4B2
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00B51184,00000000), ref: 00B6B4D0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$MetricsSystem
                                                      • String ID:
                                                      • API String ID: 2294984445-0
                                                      • Opcode ID: 7f5704a267e931129c011b26a29b24b24cf7402de3bc978d66d5a2afdda7faf2
                                                      • Instruction ID: 9ac40388bdcf1d9bd3ea6cd9a0d34d733a2e701f4c0c334ed571482142944c1e
                                                      • Opcode Fuzzy Hash: 7f5704a267e931129c011b26a29b24b24cf7402de3bc978d66d5a2afdda7faf2
                                                      • Instruction Fuzzy Hash: 8A216071514256AFCB109F389C44E6A37E4FB05720B144779F926D72E1EF389890DB90
                                                      APIs
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B39802
                                                        • Part of subcall function 00AE7D2C: _memmove.LIBCMT ref: 00AE7D66
                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B39834
                                                      • __itow.LIBCMT ref: 00B3984C
                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B39874
                                                      • __itow.LIBCMT ref: 00B39885
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$__itow$_memmove
                                                      • String ID:
                                                      • API String ID: 2983881199-0
                                                      • Opcode ID: 5cb11c68208e2760b12a209a0620253aefdb127d7e8056376f3812501a8aa664
                                                      • Instruction ID: 0fa226f9fadd5026301607061ffe05d7e27fcde736c9f93f891e4519335fedc3
                                                      • Opcode Fuzzy Hash: 5cb11c68208e2760b12a209a0620253aefdb127d7e8056376f3812501a8aa664
                                                      • Instruction Fuzzy Hash: 7D21C531B00244BBDB109A65DC8AEAE7BE8EF8A750F1400A9F904DB291DAB08D41C7A1
                                                      APIs
                                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AE134D
                                                      • SelectObject.GDI32(?,00000000), ref: 00AE135C
                                                      • BeginPath.GDI32(?), ref: 00AE1373
                                                      • SelectObject.GDI32(?,00000000), ref: 00AE139C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$BeginCreatePath
                                                      • String ID:
                                                      • API String ID: 3225163088-0
                                                      • Opcode ID: a131847c3b908001d029bbc27369447c25539c5af05acd15460c0e841515d202
                                                      • Instruction ID: 0b89d42393cb608581bd8ca65b81d5e85d2d74006a87ea4fdf93366104a67f2a
                                                      • Opcode Fuzzy Hash: a131847c3b908001d029bbc27369447c25539c5af05acd15460c0e841515d202
                                                      • Instruction Fuzzy Hash: A12160B0900256EFDB108F26EC057A97BBDFB11721F184226F8109B1E0DBB99891DB90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID:
                                                      • API String ID: 2931989736-0
                                                      • Opcode ID: d2163d3ce5a9684874646cc4fa77f9cbf629a2a9a09df5fe0fa9f6a28731af51
                                                      • Instruction ID: 4da7c571c91ca85e603397d853411738e6b78722d5eeacdd2cfb12f62d04f480
                                                      • Opcode Fuzzy Hash: d2163d3ce5a9684874646cc4fa77f9cbf629a2a9a09df5fe0fa9f6a28731af51
                                                      • Instruction Fuzzy Hash: 8D01B9726046057BD218A6645C52F7B7FDCDB213D4F1480A1FD14B6293EB61EE11A3E4
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00B44D5C
                                                      • __beginthreadex.LIBCMT ref: 00B44D7A
                                                      • MessageBoxW.USER32(?,?,?,?), ref: 00B44D8F
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00B44DA5
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00B44DAC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                      • String ID:
                                                      • API String ID: 3824534824-0
                                                      • Opcode ID: d1df664ec6a9f0fe3aaa2722c34c584d970eddd3505b5a4d1d5d1b23e0a67e81
                                                      • Instruction ID: e27f1f5b792eea81f23f97dadcbbc2556c71c19cd2be221b9219f857bf0691a7
                                                      • Opcode Fuzzy Hash: d1df664ec6a9f0fe3aaa2722c34c584d970eddd3505b5a4d1d5d1b23e0a67e81
                                                      • Instruction Fuzzy Hash: 521108B2D04245BBC7119FA8EC04BAB7FECEB46320F1442B9F914D3291DBB58D1087A0
                                                      APIs
                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B38766
                                                      • GetLastError.KERNEL32(?,00B3822A,?,?,?), ref: 00B38770
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00B3822A,?,?,?), ref: 00B3877F
                                                      • HeapAlloc.KERNEL32(00000000,?,00B3822A,?,?,?), ref: 00B38786
                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B3879D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 842720411-0
                                                      • Opcode ID: 5d0e6bd4494906c63e6dd9779e41df2380384ad8e0eedc1c04933d706b98d2e4
                                                      • Instruction ID: 93ef8699e65a717b676c4bfcc437ab95ff550f8e9eb576fbf32cbab62bda8b1f
                                                      • Opcode Fuzzy Hash: 5d0e6bd4494906c63e6dd9779e41df2380384ad8e0eedc1c04933d706b98d2e4
                                                      • Instruction Fuzzy Hash: CC014F71600205EFDB104FA5EC48D677BADFF86395B200469F949C3260DE758C10CA60
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B45502
                                                      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00B45510
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B45518
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00B45522
                                                      • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B4555E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                      • String ID:
                                                      • API String ID: 2833360925-0
                                                      • Opcode ID: 4389b844d0347753cf5e079553695ea9eb01f8a7c2b99ace8590d6e90e07f61d
                                                      • Instruction ID: 7de786e574efed333247297c9a5b81ecba3262e016c2898c56e4a613db46309c
                                                      • Opcode Fuzzy Hash: 4389b844d0347753cf5e079553695ea9eb01f8a7c2b99ace8590d6e90e07f61d
                                                      • Instruction Fuzzy Hash: 91010936D00A1EDBCF109BE8E888AFDBBB9FB19711F400096E905B2151DB745654DBA1
                                                      APIs
                                                      • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?,?,00B3799D), ref: 00B3766F
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?), ref: 00B3768A
                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?), ref: 00B37698
                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?), ref: 00B376A8
                                                      • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00B3758C,80070057,?,?), ref: 00B376B4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                      • String ID:
                                                      • API String ID: 3897988419-0
                                                      • Opcode ID: a50a525222cfb2857c32c71201424e425fb65fcd8ba9538b2e0b534798071ce9
                                                      • Instruction ID: 7c3cc9905375e8db397964e4806cea9867d0115d9a945e3b472ff736fc324252
                                                      • Opcode Fuzzy Hash: a50a525222cfb2857c32c71201424e425fb65fcd8ba9538b2e0b534798071ce9
                                                      • Instruction Fuzzy Hash: 5301B1B2604605BBDB208F99EC45AAA7BECEB44751F2040A8FD04D3211EF75DD0087A0
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B38608
                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B38612
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B38621
                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B38628
                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B3863E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: bcd8dc414f8079873e8c81cd30f8015ea36db8788162472c7c4063b395e2c1aa
                                                      • Instruction ID: 944597a9d90be6f922da197278c37633567ca48de5a2fa01e5f5a3f3386a7238
                                                      • Opcode Fuzzy Hash: bcd8dc414f8079873e8c81cd30f8015ea36db8788162472c7c4063b395e2c1aa
                                                      • Instruction Fuzzy Hash: 50F04931241305AFEB100FA5EC8AE7B3BACEF8A794F100469FA49D7190CFA59C41DA61
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00B38669
                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00B38673
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B38682
                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00B38689
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B3869F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: 46d52ff915d62103fe86bb4d80a5300352aa4e00e586a1dc43ad1b73c1159fd5
                                                      • Instruction ID: fe0662423256520705804e57f0e8d30e6af9a68b99a55758700e5eaca07566b3
                                                      • Opcode Fuzzy Hash: 46d52ff915d62103fe86bb4d80a5300352aa4e00e586a1dc43ad1b73c1159fd5
                                                      • Instruction Fuzzy Hash: 54F04FB1200305AFEB111FA5EC89E773BACEF8A754F200065F945D7190CEA9D941DA61
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00B3C6BA
                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00B3C6D1
                                                      • MessageBeep.USER32(00000000), ref: 00B3C6E9
                                                      • KillTimer.USER32(?,0000040A), ref: 00B3C705
                                                      • EndDialog.USER32(?,00000001), ref: 00B3C71F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                      • String ID:
                                                      • API String ID: 3741023627-0
                                                      • Opcode ID: 770482a12882d8a54e2bdda421fbf91ffe9a7cdb82f215e11f41b0de9cca8187
                                                      • Instruction ID: f036a800a66dac23d333ff3df05a24c539d141ea4f0b9b0e607cfd11d7cec952
                                                      • Opcode Fuzzy Hash: 770482a12882d8a54e2bdda421fbf91ffe9a7cdb82f215e11f41b0de9cca8187
                                                      • Instruction Fuzzy Hash: 8D014F30500705ABEB21AB64ED8EBA67BB8FB00745F1006A9F542A24E1DBE5AD54CF90
                                                      APIs
                                                      • EndPath.GDI32(?), ref: 00AE13BF
                                                      • StrokeAndFillPath.GDI32(?,?,00B1BAD8,00000000,?), ref: 00AE13DB
                                                      • SelectObject.GDI32(?,00000000), ref: 00AE13EE
                                                      • DeleteObject.GDI32 ref: 00AE1401
                                                      • StrokePath.GDI32(?), ref: 00AE141C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                                      • String ID:
                                                      • API String ID: 2625713937-0
                                                      • Opcode ID: 3811e276d042b2e6a93f0eab4b10873850ee937fce218d860687b28765043c03
                                                      • Instruction ID: c247d33ce331849defb4b50e7e2715744c18dbcc165954448e9dd4ddc82bd3b7
                                                      • Opcode Fuzzy Hash: 3811e276d042b2e6a93f0eab4b10873850ee937fce218d860687b28765043c03
                                                      • Instruction Fuzzy Hash: 4DF0FFB4004349EBDB155F26EC0D7683FA9A712726F08C226F4298A1F1CF794995DF51
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00B4C69D
                                                      • CoCreateInstance.OLE32(00B72D6C,00000000,00000001,00B72BDC,?), ref: 00B4C6B5
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                      • CoUninitialize.OLE32 ref: 00B4C922
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CreateInitializeInstanceUninitialize_memmove
                                                      • String ID: .lnk
                                                      • API String ID: 2683427295-24824748
                                                      • Opcode ID: 6c942b0c09e2a6a7ac5f8be56038f71b8d48d443e8fd475b57c34531afcf1cc3
                                                      • Instruction ID: 1463151c15a2d2e4ed3ad9989889e6f940f22dc6883d9466e5e532f0c27e5ff5
                                                      • Opcode Fuzzy Hash: 6c942b0c09e2a6a7ac5f8be56038f71b8d48d443e8fd475b57c34531afcf1cc3
                                                      • Instruction Fuzzy Hash: 3DA13DB1108345AFD700EF65C991EAFB7E8EF94744F00496CF1569B1A2EB70EA09CB52
                                                      APIs
                                                        • Part of subcall function 00B00FF6: std::exception::exception.LIBCMT ref: 00B0102C
                                                        • Part of subcall function 00B00FF6: __CxxThrowException@8.LIBCMT ref: 00B01041
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                        • Part of subcall function 00AE7BB1: _memmove.LIBCMT ref: 00AE7C0B
                                                      • __swprintf.LIBCMT ref: 00AF302D
                                                      Strings
                                                      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00AF2EC6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                      • API String ID: 1943609520-557222456
                                                      • Opcode ID: 204d8cc2914be9f8f271f8bd04aa92a3cb47d1b672c623f699ca38f39b93f0a3
                                                      • Instruction ID: 9ad0a96ad3f96fe8ea8b05c7dbfcb93cacc06d2eb795829139ef23f65868edb0
                                                      • Opcode Fuzzy Hash: 204d8cc2914be9f8f271f8bd04aa92a3cb47d1b672c623f699ca38f39b93f0a3
                                                      • Instruction Fuzzy Hash: 8F918D325083559FCB18EF64DA85C7EB7E4EF85740F00495EF9869B2A1EA20EE44CB52
                                                      APIs
                                                        • Part of subcall function 00AE48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AE48A1,?,?,00AE37C0,?), ref: 00AE48CE
                                                      • CoInitialize.OLE32(00000000), ref: 00B4BC26
                                                      • CoCreateInstance.OLE32(00B72D6C,00000000,00000001,00B72BDC,?), ref: 00B4BC3F
                                                      • CoUninitialize.OLE32 ref: 00B4BC5C
                                                        • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                                                        • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                      • String ID: .lnk
                                                      • API String ID: 2126378814-24824748
                                                      • Opcode ID: bd28a97321b08e2124a42e979b8e562425352c4c7fdccc79c477b5127596cd7c
                                                      • Instruction ID: f6357d2599319e39d0cc36befe0f5fc9026bd5a86ee31a4752455230402513fc
                                                      • Opcode Fuzzy Hash: bd28a97321b08e2124a42e979b8e562425352c4c7fdccc79c477b5127596cd7c
                                                      • Instruction Fuzzy Hash: A4A154756043419FCB00DF25C584E6ABBE5FF88314F148998F99A9B3A2CB31EE45CB91
                                                      APIs
                                                      • __startOneArgErrorHandling.LIBCMT ref: 00B052DD
                                                        • Part of subcall function 00B10340: __87except.LIBCMT ref: 00B1037B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandling__87except__start
                                                      • String ID: pow
                                                      • API String ID: 2905807303-2276729525
                                                      • Opcode ID: ebf5dee7f7a5d27c6ac60a8430355a4c6073794e1134fa6f854dc745e1f9ead2
                                                      • Instruction ID: c3f0686ad4dde34c881bf8281b47e2eb12191facd80092f98a037301ef603311
                                                      • Opcode Fuzzy Hash: ebf5dee7f7a5d27c6ac60a8430355a4c6073794e1134fa6f854dc745e1f9ead2
                                                      • Instruction Fuzzy Hash: 8E513B21A2D60187D7317724D9813BF2FE4DF00750FA049D8E09A866E5EEB48CD49E4A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #$+
                                                      • API String ID: 0-2552117581
                                                      • Opcode ID: 43a8e6954e139e522e74beacaf0189725226d10e3f21262a9506228d70dddb39
                                                      • Instruction ID: 5d4e9c75761b9263e1a667f68873513168546bccd020d622f4acf610b4574abf
                                                      • Opcode Fuzzy Hash: 43a8e6954e139e522e74beacaf0189725226d10e3f21262a9506228d70dddb39
                                                      • Instruction Fuzzy Hash: FA5101755046469FDF26AF29D888AFE7BE4FF19310F2440A5EC919B2E0DB349D42CB60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memset$_memmove
                                                      • String ID: ERCP
                                                      • API String ID: 2532777613-1384759551
                                                      • Opcode ID: 9cff7d90b3edefcbedddc6009d94ec0d46b6d91dc42e5744e8a00d128476c3ac
                                                      • Instruction ID: ae2c22e81e36854755efee6a740aacf2128a7987e1b0caddfa66bc9b6f4f8740
                                                      • Opcode Fuzzy Hash: 9cff7d90b3edefcbedddc6009d94ec0d46b6d91dc42e5744e8a00d128476c3ac
                                                      • Instruction Fuzzy Hash: 6551A5719007099BDB24DF95C981BEABBF8EF04715F2085AEEA4ADB241E771D584CB40
                                                      APIs
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00B6F910,00000000,?,?,?,?), ref: 00B67C4E
                                                      • GetWindowLongW.USER32 ref: 00B67C6B
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B67C7B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$Long
                                                      • String ID: SysTreeView32
                                                      • API String ID: 847901565-1698111956
                                                      • Opcode ID: a01bf71fd0abf4bc1594198557fb3b02c0bff71912bf1dce3ac4e0bb623b08cd
                                                      • Instruction ID: 02ff54d31defc5d78dca0117606a7c2d10764faa0dd34c855dd8c8e06ad24695
                                                      • Opcode Fuzzy Hash: a01bf71fd0abf4bc1594198557fb3b02c0bff71912bf1dce3ac4e0bb623b08cd
                                                      • Instruction Fuzzy Hash: B3319C31244206ABDB118F38DC45BEA77E9EB49328F244765F875A32E0DB39EC919B50
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00B676D0
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00B676E4
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B67708
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window
                                                      • String ID: SysMonthCal32
                                                      • API String ID: 2326795674-1439706946
                                                      • Opcode ID: dd135e73f5253f3dd1dd28d1a4e2db2101d518efb61590fe558f65311d0d96eb
                                                      • Instruction ID: e4dfebb0af720eae67136ba89d7507b5796bacfcf47b5b71079701f95d9cf0ba
                                                      • Opcode Fuzzy Hash: dd135e73f5253f3dd1dd28d1a4e2db2101d518efb61590fe558f65311d0d96eb
                                                      • Instruction Fuzzy Hash: 4A21D132544219BBDF11CFA4CC86FEA3BB9EF48718F110254FE156B1D0DAB5AC508BA0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00B66FAA
                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00B66FBA
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00B66FDF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MoveWindow
                                                      • String ID: Listbox
                                                      • API String ID: 3315199576-2633736733
                                                      • Opcode ID: aca76ee4f15a160f4680b79f94eb3513477bcd731495ba963a7f0d925746b0b8
                                                      • Instruction ID: 8e1be360e57057e1fb1a99a728ed958d6a073f2b8e2ce1c0016f99f2e09a76d7
                                                      • Opcode Fuzzy Hash: aca76ee4f15a160f4680b79f94eb3513477bcd731495ba963a7f0d925746b0b8
                                                      • Instruction Fuzzy Hash: 7D21A172610118BFDF118F54EC85FBB3BAAEF89764F018164FA149B1A0CA75AC51CBA0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00B679E1
                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00B679F6
                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00B67A03
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: msctls_trackbar32
                                                      • API String ID: 3850602802-1010561917
                                                      • Opcode ID: e01dbfedd46639750f31f50128811a1df2f53d88217163de0a73ee7ad9f45187
                                                      • Instruction ID: 94c8f9b565d32d8dab937902f6ef040a16d0ac1ea58243a25838fdfd8d8071c2
                                                      • Opcode Fuzzy Hash: e01dbfedd46639750f31f50128811a1df2f53d88217163de0a73ee7ad9f45187
                                                      • Instruction Fuzzy Hash: F211E772294208BADF109F70CC45FAB37E9EF89768F110519FA41A70E0D6759851CB60
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00AE4C2E), ref: 00AE4CA3
                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00AE4CB5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetNativeSystemInfo$kernel32.dll
                                                      • API String ID: 2574300362-192647395
                                                      • Opcode ID: ae78e103a9072c715cd90e514ce4c5a5ce414fd68712f2c0ffb9763b5ead8d6b
                                                      • Instruction ID: 961b373b067470ea6a2e4ca6a1ddb77357daf7c7e44338afbed0a6aeb64919e5
                                                      • Opcode Fuzzy Hash: ae78e103a9072c715cd90e514ce4c5a5ce414fd68712f2c0ffb9763b5ead8d6b
                                                      • Instruction Fuzzy Hash: 44D05B30510723CFD7209F32ED5871676D9AF05791B25CC7DD885D71A0DBB8D480C650
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00AE4CE1,?), ref: 00AE4DA2
                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00AE4DB4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                      • API String ID: 2574300362-1355242751
                                                      • Opcode ID: efabf278cbcba020795a061cfa151a61db1097236187ba5013bea9c2ab3be3aa
                                                      • Instruction ID: e81970fa7f96051af6408d891ebe2fd32f4e755e1f86689a5e90b9e1cae49b4c
                                                      • Opcode Fuzzy Hash: efabf278cbcba020795a061cfa151a61db1097236187ba5013bea9c2ab3be3aa
                                                      • Instruction Fuzzy Hash: 5AD01231550713CFD7209F31EC4879676D8AF09395B158879D8C5D61A0DBB4D480C650
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00AE4D2E,?,00AE4F4F,?,00BA62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00AE4D6F
                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00AE4D81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                      • API String ID: 2574300362-3689287502
                                                      • Opcode ID: 90bc526678b3d974d2ed80ce7a431afc6b3ff18cd68c54b441c85ce90e8f7100
                                                      • Instruction ID: ab134ef772330e332d65d35ea9094aa66300b3dffabf0f6d3ada002062bf616d
                                                      • Opcode Fuzzy Hash: 90bc526678b3d974d2ed80ce7a431afc6b3ff18cd68c54b441c85ce90e8f7100
                                                      • Instruction Fuzzy Hash: 99D01230510753CFD7209F31EC4876676D8BF1A391B158879D486D66A0DAB4D480CA50
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,00B612C1), ref: 00B61080
                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B61092
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                      • API String ID: 2574300362-4033151799
                                                      • Opcode ID: 7f5afdec3733b0844c8078e6abfc5eb4b47a198e5b15da5f1563daa52a0074a7
                                                      • Instruction ID: a3eb2e0a6d4b3d2fad2ef996e2185fe2989a73109381b9fc70ee8aea8cb78abe
                                                      • Opcode Fuzzy Hash: 7f5afdec3733b0844c8078e6abfc5eb4b47a198e5b15da5f1563daa52a0074a7
                                                      • Instruction Fuzzy Hash: 1CD01231510713CFDB205F35E918A2676E4EF05791B15DC79E585D61A0DBB8C4C0C650
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00B59009,?,00B6F910), ref: 00B59403
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00B59415
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetModuleHandleExW$kernel32.dll
                                                      • API String ID: 2574300362-199464113
                                                      • Opcode ID: a9aaf494437667c0b579ae24ca2e5d41b27e4ae9ce2cb6cfd859f01ec653f6dc
                                                      • Instruction ID: f4ef858ec8468322d6a32f72f0c36b92b5aaffb22828e17cdd6f8a4f00d5badc
                                                      • Opcode Fuzzy Hash: a9aaf494437667c0b579ae24ca2e5d41b27e4ae9ce2cb6cfd859f01ec653f6dc
                                                      • Instruction Fuzzy Hash: F5D01734514713CFDB209F31E90971676E5EF06392B15C8BAE886E66A0EAB8C884DA50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: LocalTime__swprintf
                                                      • String ID: %.3d$WIN_XPe
                                                      • API String ID: 2070861257-2409531811
                                                      • Opcode ID: 3a0c8c9c2155c705731cf54ee1d29ceb5d89b27a0f7dc7a0ca1cb27ae3c89afe
                                                      • Instruction ID: c07b68cde15da104a931ffedfb1af1484e95cc77a999d0d09a55c11ecb18db68
                                                      • Opcode Fuzzy Hash: 3a0c8c9c2155c705731cf54ee1d29ceb5d89b27a0f7dc7a0ca1cb27ae3c89afe
                                                      • Instruction Fuzzy Hash: 40D01271C08168EACB049B94AC888F977FCAB18311F1049E2F90A92040F2749B859B21
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7af0f85e6ad9413c4e28454049037190cd52bf66e1cd0bce691a31c7451c9669
                                                      • Instruction ID: 46ad21119fbe3951d4964e5acfbffe6b980953710c658191b0f9e63e8ac3b3d4
                                                      • Opcode Fuzzy Hash: 7af0f85e6ad9413c4e28454049037190cd52bf66e1cd0bce691a31c7451c9669
                                                      • Instruction Fuzzy Hash: 36C12AB5A44216EFCB24CF94C884AAEB7F5FF48714B2186D9E805EB251DB30DD41DB90
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?), ref: 00B5E3D2
                                                      • CharLowerBuffW.USER32(?,?), ref: 00B5E415
                                                        • Part of subcall function 00B5DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00B5DAD9
                                                      • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00B5E615
                                                      • _memmove.LIBCMT ref: 00B5E628
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: BuffCharLower$AllocVirtual_memmove
                                                      • String ID:
                                                      • API String ID: 3659485706-0
                                                      • Opcode ID: 57ad32b59e56d1a5094ae7bc688dbb64e1695c415523613526cdcad365b0b0a1
                                                      • Instruction ID: 0d40eb06b7f30e4f6b88423d22ccf05e0a991b4f7fe072514947f8ff4a7a31b9
                                                      • Opcode Fuzzy Hash: 57ad32b59e56d1a5094ae7bc688dbb64e1695c415523613526cdcad365b0b0a1
                                                      • Instruction Fuzzy Hash: 0BC16E716083519FC714DF28C480A6ABBE4FF48714F1489ADF8A99B351D771EA49CF82
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00B583D8
                                                      • CoUninitialize.OLE32 ref: 00B583E3
                                                        • Part of subcall function 00B3DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00B3DAC5
                                                      • VariantInit.OLEAUT32(?), ref: 00B583EE
                                                      • VariantClear.OLEAUT32(?), ref: 00B586BF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                      • String ID:
                                                      • API String ID: 780911581-0
                                                      • Opcode ID: 21ebc794f12351ea5a0950e29fcc80126adb34d14321ffce5966586bb6bc2d66
                                                      • Instruction ID: bc3bacf87ce59e9eb88ce345283954a762e9a4ad0a89af83c076656020fdd512
                                                      • Opcode Fuzzy Hash: 21ebc794f12351ea5a0950e29fcc80126adb34d14321ffce5966586bb6bc2d66
                                                      • Instruction Fuzzy Hash: 06A138752047419FDB10EF15C581B2AB7E4FF88355F144499F99AAB3A2DB30ED04CB92
                                                      APIs
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00B72C7C,?), ref: 00B37C32
                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00B72C7C,?), ref: 00B37C4A
                                                      • CLSIDFromProgID.OLE32(?,?,00000000,00B6FB80,000000FF,?,00000000,00000800,00000000,?,00B72C7C,?), ref: 00B37C6F
                                                      • _memcmp.LIBCMT ref: 00B37C90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: FromProg$FreeTask_memcmp
                                                      • String ID:
                                                      • API String ID: 314563124-0
                                                      • Opcode ID: 71652806e55dcf5b3d2b01084ac8ba6e50e6f8fcd2cf6f3e868fcf336a20bf1f
                                                      • Instruction ID: 0580430ede6ec63d305d1729a194f53b921de634b15d8120947333508c138565
                                                      • Opcode Fuzzy Hash: 71652806e55dcf5b3d2b01084ac8ba6e50e6f8fcd2cf6f3e868fcf336a20bf1f
                                                      • Instruction Fuzzy Hash: EE811B75A00109EFCB14DF94C994EEEB7F9FF89315F208198E515AB250DB71AE05CB60
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Variant$AllocClearCopyInitString
                                                      • String ID:
                                                      • API String ID: 2808897238-0
                                                      • Opcode ID: ca72033bd903733d91c062a576d16bf1795893f72bda68efbc42c8f2ce1204b7
                                                      • Instruction ID: 18c7c8d946595dd0f374338f15548202ead568223d4ac85b5db8ec95c3322778
                                                      • Opcode Fuzzy Hash: ca72033bd903733d91c062a576d16bf1795893f72bda68efbc42c8f2ce1204b7
                                                      • Instruction Fuzzy Hash: F551E374658302AADB34AF69D8D5A3EB3E4EF48310F30C85FE596DB691DF7098449B01
                                                      APIs
                                                      • GetWindowRect.USER32(011AE818,?), ref: 00B69AD2
                                                      • ScreenToClient.USER32(00000002,00000002), ref: 00B69B05
                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00B69B72
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientMoveRectScreen
                                                      • String ID:
                                                      • API String ID: 3880355969-0
                                                      • Opcode ID: b42b58221e872786aa25e2fe1b11cad22d6d362c6f7219a7e8879f5b91c594a6
                                                      • Instruction ID: e3f9292b2c5113088b50d3fef46fdb427a41661e5a788c99ba78a46ab06aef99
                                                      • Opcode Fuzzy Hash: b42b58221e872786aa25e2fe1b11cad22d6d362c6f7219a7e8879f5b91c594a6
                                                      • Instruction Fuzzy Hash: 2E515374A00209EFCF10DF64D9819AE7BF9FF55760F1481A9F8259B2A0D774AD41CB50
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00B56CE4
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00B56CF4
                                                        • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                                                        • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00B56D58
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00B56D64
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$__itow__swprintfsocket
                                                      • String ID:
                                                      • API String ID: 2214342067-0
                                                      • Opcode ID: c9c065983f39e988a569054ecf0b594e73f0d522d26f64dcfef3b6cd69ba14c5
                                                      • Instruction ID: d15af0c4aa295c3fda9538ed2f9c901a8c86d711bbbc40eba8616e732bbf0d8a
                                                      • Opcode Fuzzy Hash: c9c065983f39e988a569054ecf0b594e73f0d522d26f64dcfef3b6cd69ba14c5
                                                      • Instruction Fuzzy Hash: 9141B474740300AFEB20AF25DD86F3A77E5EF48B10F4484A8FA599B2D2DAB49C008791
                                                      APIs
                                                      • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00B6F910), ref: 00B567BA
                                                      • _strlen.LIBCMT ref: 00B567EC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _strlen
                                                      • String ID:
                                                      • API String ID: 4218353326-0
                                                      • Opcode ID: ee2c814c9a4c7f270cb44dba634d35f754dfad0ac30796b49166e7f5afe615a7
                                                      • Instruction ID: 9bc3209db138c25907fe2269156ae668b21d7c2706585a2a7a93ddc2261696d5
                                                      • Opcode Fuzzy Hash: ee2c814c9a4c7f270cb44dba634d35f754dfad0ac30796b49166e7f5afe615a7
                                                      • Instruction Fuzzy Hash: 0B41C231A00204AFCB14EB65DDC5FAEB7E8EF58314F6481E9F8169B292DB30AD04C750
                                                      APIs
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00B4BB09
                                                      • GetLastError.KERNEL32(?,00000000), ref: 00B4BB2F
                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00B4BB54
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00B4BB80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                      • String ID:
                                                      • API String ID: 3321077145-0
                                                      • Opcode ID: 597cf25d6fc8f58c7a7d84db7afc700f903e950fc8f7d06538b9a8f072f46a11
                                                      • Instruction ID: 26644e1e0b6ef7ba58a353546be6fe6163d6098e543b85cb6c473746785411f9
                                                      • Opcode Fuzzy Hash: 597cf25d6fc8f58c7a7d84db7afc700f903e950fc8f7d06538b9a8f072f46a11
                                                      • Instruction Fuzzy Hash: 99412639200651DFCB10EF16C684A5EBBE1EF89310B198498F94A9B362CB34FD01DB91
                                                      APIs
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B68B4D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: InvalidateRect
                                                      • String ID:
                                                      • API String ID: 634782764-0
                                                      • Opcode ID: 6aaef161731937ec2e1aa22beace1994b7d8d0d4a0cbe2a0a98687a66f24e01e
                                                      • Instruction ID: abde132d305ed000db8088a69b3687d8bcc1a85baede9f486f289bea0ce9bfe1
                                                      • Opcode Fuzzy Hash: 6aaef161731937ec2e1aa22beace1994b7d8d0d4a0cbe2a0a98687a66f24e01e
                                                      • Instruction Fuzzy Hash: 2C31C6B4604204BFEF209F58DC99FA937E5EB0A310F284796FA51D72E0CE7AA9409751
                                                      APIs
                                                      • ClientToScreen.USER32(?,?), ref: 00B6AE1A
                                                      • GetWindowRect.USER32(?,?), ref: 00B6AE90
                                                      • PtInRect.USER32(?,?,00B6C304), ref: 00B6AEA0
                                                      • MessageBeep.USER32(00000000), ref: 00B6AF11
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                      • String ID:
                                                      • API String ID: 1352109105-0
                                                      • Opcode ID: e0bf70e12609bd632dd2269faa0e7c8d8c45aa2b72ee42ca5cdf0253aeee5416
                                                      • Instruction ID: d3d408702d16d216539ff60a079007f1b13fef55247b212730b7576b2fe4908b
                                                      • Opcode Fuzzy Hash: e0bf70e12609bd632dd2269faa0e7c8d8c45aa2b72ee42ca5cdf0253aeee5416
                                                      • Instruction Fuzzy Hash: 4E417C70600119DFCF11DF58D885A69BBF5FB49740F2881A9E419EB291DB39A901CF92
                                                      APIs
                                                      • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00B41037
                                                      • SetKeyboardState.USER32(00000080,?,00000001), ref: 00B41053
                                                      • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00B410B9
                                                      • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00B4110B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: 4fd23db7dd16ce90bf92e9802d03043fe6eed989c840534836657e3d4056457f
                                                      • Instruction ID: f9900cb58a98c31039288a3e66c40f6ef9b3b44f912efde1260ecded46f3e532
                                                      • Opcode Fuzzy Hash: 4fd23db7dd16ce90bf92e9802d03043fe6eed989c840534836657e3d4056457f
                                                      • Instruction Fuzzy Hash: 8C314830E40688AEFF348B6D8C05BF9BBE9EB54310F04469AE591522D1C3748FC0B752
                                                      APIs
                                                      • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00B41176
                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 00B41192
                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 00B411F1
                                                      • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00B41243
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: b0aa1c14f892fd4b42b4e950eec54bf1cf22890478689e6b07d3a905dc24e275
                                                      • Instruction ID: 4619fb0d459d0f05b41a81f8a041138e02030f88efd23b29526e1f22960df8a6
                                                      • Opcode Fuzzy Hash: b0aa1c14f892fd4b42b4e950eec54bf1cf22890478689e6b07d3a905dc24e275
                                                      • Instruction Fuzzy Hash: 3531E730E407186AEF20DB6D88097FA7BFAEB49310F044B9AE695A21D1C3784FD5A751
                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00B1644B
                                                      • __isleadbyte_l.LIBCMT ref: 00B16479
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00B164A7
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00B164DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: 1225fef7fea8ee32df0c449a5c3965ff625078ba648ce5e9ecccf395b191966e
                                                      • Instruction ID: ecd32a87e3a528b7540f6566095908c579cf34567d97dfdce29b2fdc0fb6907c
                                                      • Opcode Fuzzy Hash: 1225fef7fea8ee32df0c449a5c3965ff625078ba648ce5e9ecccf395b191966e
                                                      • Instruction Fuzzy Hash: F831EF31600256AFDB21CF69CC84BFA7BE9FF41310F5540A9E864872A0EB31D990DB90
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 00B65189
                                                        • Part of subcall function 00B4387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00B43897
                                                        • Part of subcall function 00B4387D: GetCurrentThreadId.KERNEL32 ref: 00B4389E
                                                        • Part of subcall function 00B4387D: AttachThreadInput.USER32(00000000,?,00B452A7), ref: 00B438A5
                                                      • GetCaretPos.USER32(?), ref: 00B6519A
                                                      • ClientToScreen.USER32(00000000,?), ref: 00B651D5
                                                      • GetForegroundWindow.USER32 ref: 00B651DB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                      • String ID:
                                                      • API String ID: 2759813231-0
                                                      • Opcode ID: 022fe638ec98703ee93eabaadee479c0fcb108ffb2dd035cba63ff19951166d5
                                                      • Instruction ID: 73ab733be9f919ca3309dbae34db9e5a8e7b4c3dc008057f68a5c59ab390e74c
                                                      • Opcode Fuzzy Hash: 022fe638ec98703ee93eabaadee479c0fcb108ffb2dd035cba63ff19951166d5
                                                      • Instruction Fuzzy Hash: 7831F0B1900248AFDB10EFA5DD859EFB7F9EF98300F1040AAE415E7251EA759E45CBA0
                                                      APIs
                                                        • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                                                      • GetCursorPos.USER32(?), ref: 00B6C7C2
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00B1BBFB,?,?,?,?,?), ref: 00B6C7D7
                                                      • GetCursorPos.USER32(?), ref: 00B6C824
                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00B1BBFB,?,?,?), ref: 00B6C85E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                      • String ID:
                                                      • API String ID: 2864067406-0
                                                      • Opcode ID: 53054d03954daa9bfe9543269fe7db497f9db59003c6191642ef71c1e565641d
                                                      • Instruction ID: 943c33076804059a11f459f4f759633aa14a900eeb83d7f4fbbdf89fe8ad93ff
                                                      • Opcode Fuzzy Hash: 53054d03954daa9bfe9543269fe7db497f9db59003c6191642ef71c1e565641d
                                                      • Instruction Fuzzy Hash: 11317436600018AFCB25CF59D898EFA7FFAEB49710F0481A9F9458B2A1C7399D50DF60
                                                      APIs
                                                        • Part of subcall function 00B38652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00B38669
                                                        • Part of subcall function 00B38652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00B38673
                                                        • Part of subcall function 00B38652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B38682
                                                        • Part of subcall function 00B38652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00B38689
                                                        • Part of subcall function 00B38652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B3869F
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00B38BEB
                                                      • _memcmp.LIBCMT ref: 00B38C0E
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B38C44
                                                      • HeapFree.KERNEL32(00000000), ref: 00B38C4B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                      • String ID:
                                                      • API String ID: 1592001646-0
                                                      • Opcode ID: 584e2572523d6d9a41a234fee6b6515f1a0188f3326ed0d0b57e9c8c492e563e
                                                      • Instruction ID: ba476d31aa104a0f6c94b7104e6f2213611aad75e28f95e2cb5974fc5e22e031
                                                      • Opcode Fuzzy Hash: 584e2572523d6d9a41a234fee6b6515f1a0188f3326ed0d0b57e9c8c492e563e
                                                      • Instruction Fuzzy Hash: 1D21AC71E01209EFCB00CFA4C955BEEB7F8EF40340F644099E554A7240EB75AE06CB61
                                                      APIs
                                                      • __setmode.LIBCMT ref: 00B00BF2
                                                        • Part of subcall function 00AE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00B47B20,?,?,00000000), ref: 00AE5B8C
                                                        • Part of subcall function 00AE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00B47B20,?,?,00000000,?,?), ref: 00AE5BB0
                                                      • _fprintf.LIBCMT ref: 00B00C29
                                                      • OutputDebugStringW.KERNEL32(?), ref: 00B36331
                                                        • Part of subcall function 00B04CDA: _flsall.LIBCMT ref: 00B04CF3
                                                      • __setmode.LIBCMT ref: 00B00C5E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                      • String ID:
                                                      • API String ID: 521402451-0
                                                      • Opcode ID: 1f2f1f0095dcc4cec0dc7af73b04f314ecaf62ffca501c34fbc85307eeae5608
                                                      • Instruction ID: 3e61ef3332ff1028db49140622369d58750dd1e2ea44ee2951adf2ba4813e04f
                                                      • Opcode Fuzzy Hash: 1f2f1f0095dcc4cec0dc7af73b04f314ecaf62ffca501c34fbc85307eeae5608
                                                      • Instruction Fuzzy Hash: 8A1136729042047EDB14B7B9AC83ABE7FE8DF45320F1441EAF204971E2DF605D819795
                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B51A97
                                                        • Part of subcall function 00B51B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B51B40
                                                        • Part of subcall function 00B51B21: InternetCloseHandle.WININET(00000000), ref: 00B51BDD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Internet$CloseConnectHandleOpen
                                                      • String ID:
                                                      • API String ID: 1463438336-0
                                                      • Opcode ID: b43e1c6aff52642442f693a0874e3eaa08e656bb127c4622d487e7f96ef11153
                                                      • Instruction ID: a3a54a688ea6424f55e61200a96e03b8c1890a1be87c9546922a447ff7c6a0a9
                                                      • Opcode Fuzzy Hash: b43e1c6aff52642442f693a0874e3eaa08e656bb127c4622d487e7f96ef11153
                                                      • Instruction Fuzzy Hash: 4721A135201601BFEB129F649C41FBAB7EDFF48702F14489AFE1196690EB71D8199BA0
                                                      APIs
                                                        • Part of subcall function 00B3F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00B3E1C4,?,?,?,00B3EFB7,00000000,000000EF,00000119,?,?), ref: 00B3F5BC
                                                        • Part of subcall function 00B3F5AD: lstrcpyW.KERNEL32(00000000,?,?,00B3E1C4,?,?,?,00B3EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00B3F5E2
                                                        • Part of subcall function 00B3F5AD: lstrcmpiW.KERNEL32(00000000,?,00B3E1C4,?,?,?,00B3EFB7,00000000,000000EF,00000119,?,?), ref: 00B3F613
                                                      • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00B3EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00B3E1DD
                                                      • lstrcpyW.KERNEL32(00000000,?,?,00B3EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00B3E203
                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,00B3EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00B3E237
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: lstrcmpilstrcpylstrlen
                                                      • String ID: cdecl
                                                      • API String ID: 4031866154-3896280584
                                                      • Opcode ID: 3c0b8c29eedcb8aa6a357d9fe4a8de0312ff3fe6dce7e9b449a6030f856b983e
                                                      • Instruction ID: 2bc4aacc7403d0385bd6e70c2bd8d33622cdad797c3da4738d2b85682a56d787
                                                      • Opcode Fuzzy Hash: 3c0b8c29eedcb8aa6a357d9fe4a8de0312ff3fe6dce7e9b449a6030f856b983e
                                                      • Instruction Fuzzy Hash: 25117C36200246EFCB25AF64DC45A7A77E9FF85350F50406AF816CB2A0EB71D85197A0
                                                      APIs
                                                      • _free.LIBCMT ref: 00B15351
                                                        • Part of subcall function 00B0594C: __FF_MSGBANNER.LIBCMT ref: 00B05963
                                                        • Part of subcall function 00B0594C: __NMSG_WRITE.LIBCMT ref: 00B0596A
                                                        • Part of subcall function 00B0594C: RtlAllocateHeap.NTDLL(01190000,00000000,00000001,00000000,?,?,?,00B01013,?), ref: 00B0598F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap_free
                                                      • String ID:
                                                      • API String ID: 614378929-0
                                                      • Opcode ID: 383b1bf8cb3be5807bc3446eb6224c5c9f7909ba04db1d9ec50cb7301d9521d4
                                                      • Instruction ID: 112af60bd330b5efad37ce6e00cf22fd459141d7790801eed3403caa22541a62
                                                      • Opcode Fuzzy Hash: 383b1bf8cb3be5807bc3446eb6224c5c9f7909ba04db1d9ec50cb7301d9521d4
                                                      • Instruction Fuzzy Hash: 0F112B32404A05EFCB312F70BC4569D3BD8AF903E0B6046BAF456D71D0DFB48A809758
                                                      APIs
                                                      • _memset.LIBCMT ref: 00AE4560
                                                        • Part of subcall function 00AE410D: _memset.LIBCMT ref: 00AE418D
                                                        • Part of subcall function 00AE410D: _wcscpy.LIBCMT ref: 00AE41E1
                                                        • Part of subcall function 00AE410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00AE41F1
                                                      • KillTimer.USER32(?,00000001,?,?), ref: 00AE45B5
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00AE45C4
                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00B1D6CE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                      • String ID:
                                                      • API String ID: 1378193009-0
                                                      • Opcode ID: a22c094a71bffb9a857dd9f64cb9b735a0d420ff7f236607b4c2a71ff02f3f79
                                                      • Instruction ID: 1d676b0e8d2551e128f040a4480d117ad45372cf8ef2a53c8e0bf6c07f48f0f0
                                                      • Opcode Fuzzy Hash: a22c094a71bffb9a857dd9f64cb9b735a0d420ff7f236607b4c2a71ff02f3f79
                                                      • Instruction Fuzzy Hash: A521A4B0904794AFEB328B24DC95BFBBBEC9F05308F44009EE69E57281C7B45E849B51
                                                      APIs
                                                        • Part of subcall function 00AE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00B47B20,?,?,00000000), ref: 00AE5B8C
                                                        • Part of subcall function 00AE5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00B47B20,?,?,00000000,?,?), ref: 00AE5BB0
                                                      • gethostbyname.WSOCK32(?), ref: 00B566AC
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00B566B7
                                                      • _memmove.LIBCMT ref: 00B566E4
                                                      • inet_ntoa.WSOCK32(?), ref: 00B566EF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                      • String ID:
                                                      • API String ID: 1504782959-0
                                                      • Opcode ID: 319298e7f82e7b89aea2533dd5a977f9bca97ffafed963cb59b536d0e1666e5f
                                                      • Instruction ID: 64dd76a0e3782dfd066717969bcbd9b1bac5394e83fe577d6b18dd5f16c94f9e
                                                      • Opcode Fuzzy Hash: 319298e7f82e7b89aea2533dd5a977f9bca97ffafed963cb59b536d0e1666e5f
                                                      • Instruction Fuzzy Hash: B8116035900509AFCB04EBA5EE86DEEB7B8EF48315B1440A5F906A71A1DF70AE04CB61
                                                      APIs
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00B39043
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B39055
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B3906B
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B39086
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: bc923fea257c710168e751a87ba1695bcd09334a65d7bc7396e3f2133814e421
                                                      • Instruction ID: 8fc3c433ebc54917c623648ba786a58fc22c8dd28a37e6b77e695a42b272e342
                                                      • Opcode Fuzzy Hash: bc923fea257c710168e751a87ba1695bcd09334a65d7bc7396e3f2133814e421
                                                      • Instruction Fuzzy Hash: E5112E79901218FFDB11DFA5CD85EADBBB4FB48710F204095E904B7290D6716E50DB94
                                                      APIs
                                                        • Part of subcall function 00AE2612: GetWindowLongW.USER32(?,000000EB), ref: 00AE2623
                                                      • DefDlgProcW.USER32(?,00000020,?), ref: 00AE12D8
                                                      • GetClientRect.USER32(?,?), ref: 00B1B84B
                                                      • GetCursorPos.USER32(?), ref: 00B1B855
                                                      • ScreenToClient.USER32(?,?), ref: 00B1B860
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Client$CursorLongProcRectScreenWindow
                                                      • String ID:
                                                      • API String ID: 4127811313-0
                                                      • Opcode ID: c551057a020ed67b37da770552268b385e9952fbd753f248f92bbf2dcde03965
                                                      • Instruction ID: 7dca236a59ed3cc1f23b626d0ca23c5183f76a6a885bac5386e92b78f7bf8245
                                                      • Opcode Fuzzy Hash: c551057a020ed67b37da770552268b385e9952fbd753f248f92bbf2dcde03965
                                                      • Instruction Fuzzy Hash: AE11283590006AABCB00DF95DC859FE77B8FB05300F1004A6FA11E7150CB74BA528BA5
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00B401FD,?,00B41250,?,00008000), ref: 00B4166F
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00B401FD,?,00B41250,?,00008000), ref: 00B41694
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00B401FD,?,00B41250,?,00008000), ref: 00B4169E
                                                      • Sleep.KERNEL32(?,?,?,?,?,?,?,00B401FD,?,00B41250,?,00008000), ref: 00B416D1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CounterPerformanceQuerySleep
                                                      • String ID:
                                                      • API String ID: 2875609808-0
                                                      • Opcode ID: 97ecf11aebee225ada30420e5eebcfe7d0a3e913fed1d9e86bf20e819e1efaa6
                                                      • Instruction ID: 2470bcd13c9db3226db277cd06118e18992711576ec26db09e7a9d71b98418f0
                                                      • Opcode Fuzzy Hash: 97ecf11aebee225ada30420e5eebcfe7d0a3e913fed1d9e86bf20e819e1efaa6
                                                      • Instruction Fuzzy Hash: DB113031C0151DD7CF009FA9E984AFEBBB8FF09751F064495D940B6180CB749690AB95
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                      • String ID:
                                                      • API String ID: 3016257755-0
                                                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction ID: fe5fb4c47473e8db816b6e24c9bac1773000a4dbbf5a8eff2f6a0eb9acdd3b5a
                                                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction Fuzzy Hash: 2501833208414ABBCF125E84DC41CEE3FB2FF2A350B948595FA1856031CA37C9B2AB81
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 00B6B59E
                                                      • ScreenToClient.USER32(?,?), ref: 00B6B5B6
                                                      • ScreenToClient.USER32(?,?), ref: 00B6B5DA
                                                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B6B5F5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ClientRectScreen$InvalidateWindow
                                                      • String ID:
                                                      • API String ID: 357397906-0
                                                      • Opcode ID: d863e93303c86fded5daac16233debf2eb3440d871c0c93d8a33ecf736aac8c8
                                                      • Instruction ID: 5469daecd0f32b4b52c115811a33fdc510cf178a81b6e4de7fc20f8cc5486d8f
                                                      • Opcode Fuzzy Hash: d863e93303c86fded5daac16233debf2eb3440d871c0c93d8a33ecf736aac8c8
                                                      • Instruction Fuzzy Hash: 331164B5D0020AEFDB01DF99D4449EEBBF9FB18310F104166E915E3260D775AA51CF50
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B6B8FE
                                                      • _memset.LIBCMT ref: 00B6B90D
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00BA7F20,00BA7F64), ref: 00B6B93C
                                                      • CloseHandle.KERNEL32 ref: 00B6B94E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _memset$CloseCreateHandleProcess
                                                      • String ID:
                                                      • API String ID: 3277943733-0
                                                      • Opcode ID: 226e37064d3f91b93836efc34057c3af7621d1bf81ff870883610c7d0ebba3b3
                                                      • Instruction ID: c321da806bd86b548593c9d52f0d0291935c508b840ea67891ac81121196398c
                                                      • Opcode Fuzzy Hash: 226e37064d3f91b93836efc34057c3af7621d1bf81ff870883610c7d0ebba3b3
                                                      • Instruction Fuzzy Hash: 46F0F4B258C3957FE2106765AC4AF7B7ADCDB0A754F004061FA08D62D1EF765A1087A8
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00B46E88
                                                        • Part of subcall function 00B4794E: _memset.LIBCMT ref: 00B47983
                                                      • _memmove.LIBCMT ref: 00B46EAB
                                                      • _memset.LIBCMT ref: 00B46EB8
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00B46EC8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection_memset$EnterLeave_memmove
                                                      • String ID:
                                                      • API String ID: 48991266-0
                                                      • Opcode ID: 8aee7bac81a3d7da60c96ed3a085a04e3d4ac3d46ddcf602f7d8e1b0b807fe88
                                                      • Instruction ID: 1ee9e9d9cda023490a5d297dc34efa06e76e8be079eead73101bcf3e0c3cd3aa
                                                      • Opcode Fuzzy Hash: 8aee7bac81a3d7da60c96ed3a085a04e3d4ac3d46ddcf602f7d8e1b0b807fe88
                                                      • Instruction Fuzzy Hash: 57F0543A104210BBCF016F55EC85A59BB69EF45320B0480A1FE085F256CB75A911DBB4
                                                      APIs
                                                        • Part of subcall function 00AE12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AE134D
                                                        • Part of subcall function 00AE12F3: SelectObject.GDI32(?,00000000), ref: 00AE135C
                                                        • Part of subcall function 00AE12F3: BeginPath.GDI32(?), ref: 00AE1373
                                                        • Part of subcall function 00AE12F3: SelectObject.GDI32(?,00000000), ref: 00AE139C
                                                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B6C030
                                                      • LineTo.GDI32(00000000,?,?), ref: 00B6C03D
                                                      • EndPath.GDI32(00000000), ref: 00B6C04D
                                                      • StrokePath.GDI32(00000000), ref: 00B6C05B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                      • String ID:
                                                      • API String ID: 1539411459-0
                                                      • Opcode ID: 87dd5e4ea60c584ce43e04515a6bf92906390de53dd9c60f8e54d2693575b98e
                                                      • Instruction ID: 9c138d8a6a5b68d71202e8b7bd39d6b53cb24069aa7d9324d6f5c630ccfa64da
                                                      • Opcode Fuzzy Hash: 87dd5e4ea60c584ce43e04515a6bf92906390de53dd9c60f8e54d2693575b98e
                                                      • Instruction Fuzzy Hash: D6F0BE3100525ABBDB122F51AC0AFEE3F98AF06310F044011FA11620E28BBD0550CFE5
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00B3A399
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B3A3AC
                                                      • GetCurrentThreadId.KERNEL32 ref: 00B3A3B3
                                                      • AttachThreadInput.USER32(00000000), ref: 00B3A3BA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 2710830443-0
                                                      • Opcode ID: 23f85a4531b5114d610ee98d583248c7b770aab80b7d0b19688df76eb56a12c2
                                                      • Instruction ID: 4831b1530dab8663f2a2af69dd35c73df4e941837471dcf4a978cdc3b79a2f3b
                                                      • Opcode Fuzzy Hash: 23f85a4531b5114d610ee98d583248c7b770aab80b7d0b19688df76eb56a12c2
                                                      • Instruction Fuzzy Hash: 6DE06D31141328BADB201FA2EC0CEE73F5CFF167A1F108034F508960A0CAB5C540CBA1
                                                      APIs
                                                      • GetSysColor.USER32(00000008), ref: 00AE2231
                                                      • SetTextColor.GDI32(?,000000FF), ref: 00AE223B
                                                      • SetBkMode.GDI32(?,00000001), ref: 00AE2250
                                                      • GetStockObject.GDI32(00000005), ref: 00AE2258
                                                      • GetWindowDC.USER32(?,00000000), ref: 00B1C0D3
                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B1C0E0
                                                      • GetPixel.GDI32(00000000,?,00000000), ref: 00B1C0F9
                                                      • GetPixel.GDI32(00000000,00000000,?), ref: 00B1C112
                                                      • GetPixel.GDI32(00000000,?,?), ref: 00B1C132
                                                      • ReleaseDC.USER32(?,00000000), ref: 00B1C13D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                      • String ID:
                                                      • API String ID: 1946975507-0
                                                      • Opcode ID: 6461151ac5600d5ceb7ce49ccd0f3668d6d1df2d92e1d8e4673b7049de0659f8
                                                      • Instruction ID: 62099b0ac864c57e1cb30678e060175d441d1c896474889a5c17a75805b5b185
                                                      • Opcode Fuzzy Hash: 6461151ac5600d5ceb7ce49ccd0f3668d6d1df2d92e1d8e4673b7049de0659f8
                                                      • Instruction Fuzzy Hash: 64E06D32544245EBDB215FA4FC0D7E83F14EB16336F0083A6FA69A80E18BB549D0DB12
                                                      APIs
                                                      • GetCurrentThread.KERNEL32 ref: 00B38C63
                                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,00B3882E), ref: 00B38C6A
                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00B3882E), ref: 00B38C77
                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,00B3882E), ref: 00B38C7E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CurrentOpenProcessThreadToken
                                                      • String ID:
                                                      • API String ID: 3974789173-0
                                                      • Opcode ID: 65e9f77b6a9c837475c206f7388a6f7ee90331d58d0f23ecd5d7cdd13d7d7572
                                                      • Instruction ID: 41b6713dcfddffc9a6167eb5e948d4a17ba9ad3c924ae016129747b7e868d4ec
                                                      • Opcode Fuzzy Hash: 65e9f77b6a9c837475c206f7388a6f7ee90331d58d0f23ecd5d7cdd13d7d7572
                                                      • Instruction Fuzzy Hash: D1E04F36646312ABD7205FB07D0CB663BA8EF50792F244868F245CA080DE7894418B61
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 00B22187
                                                      • GetDC.USER32(00000000), ref: 00B22191
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00B221B1
                                                      • ReleaseDC.USER32(?), ref: 00B221D2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: 64e4e960941807193e2a4d32d4bb2c56de005708e66fcebfa82327f7720efdcd
                                                      • Instruction ID: b6539ec16c0addbb4f24641ee44c5a45fa22a89c1565e96ccb77cd38874ad740
                                                      • Opcode Fuzzy Hash: 64e4e960941807193e2a4d32d4bb2c56de005708e66fcebfa82327f7720efdcd
                                                      • Instruction Fuzzy Hash: A7E0E5B5800215EFDB019F61E808AAD7BF1FF4C351F108425F95AE72A0CBB88142DF40
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 00B2219B
                                                      • GetDC.USER32(00000000), ref: 00B221A5
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00B221B1
                                                      • ReleaseDC.USER32(?), ref: 00B221D2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: f8c7a4aaf6c8d6949149aa8c77ec17225598578ba935ae80973667c85c24399f
                                                      • Instruction ID: c202ec543e5c8a45960fa228de9be8c94c1115524db7aecdcd6631b303d5c74b
                                                      • Opcode Fuzzy Hash: f8c7a4aaf6c8d6949149aa8c77ec17225598578ba935ae80973667c85c24399f
                                                      • Instruction Fuzzy Hash: 98E0E5B5800205AFCB019F61E8086AD7BB1BB4C351F108025F95A972A0CBB89142DF40
                                                      APIs
                                                      • OleSetContainedObject.OLE32(?,00000001), ref: 00B3B981
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ContainedObject
                                                      • String ID: AutoIt3GUI$Container
                                                      • API String ID: 3565006973-3941886329
                                                      • Opcode ID: e8d2d4d596e3ad2af7e01f7a5c97d673568fdb75aa7a98a070d954a050606c53
                                                      • Instruction ID: 0e7a6a1646860f60caead7d8de122ba6a993dfd48ceece76da493eb32b21c17a
                                                      • Opcode Fuzzy Hash: e8d2d4d596e3ad2af7e01f7a5c97d673568fdb75aa7a98a070d954a050606c53
                                                      • Instruction Fuzzy Hash: 75914C706006019FDB64DF68C884F66BBE9FF48710F2485ADFA49CB695DB70E841CB50
                                                      APIs
                                                        • Part of subcall function 00AFFEC6: _wcscpy.LIBCMT ref: 00AFFEE9
                                                        • Part of subcall function 00AE9997: __itow.LIBCMT ref: 00AE99C2
                                                        • Part of subcall function 00AE9997: __swprintf.LIBCMT ref: 00AE9A0C
                                                      • __wcsnicmp.LIBCMT ref: 00B4B298
                                                      • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00B4B361
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                      • String ID: LPT
                                                      • API String ID: 3222508074-1350329615
                                                      • Opcode ID: b5167bb2b6ddaf3e1ddeb9ad4720cc19559c48ec3853163cb59f2d8329659ebd
                                                      • Instruction ID: bedd92bc4a63c909dbe5f33f5a2317176b076f0c52a01ea8e2cda5db80e5c791
                                                      • Opcode Fuzzy Hash: b5167bb2b6ddaf3e1ddeb9ad4720cc19559c48ec3853163cb59f2d8329659ebd
                                                      • Instruction Fuzzy Hash: FA615175A00215AFCB14DF99C985EAEB7F4EF08310F1540AAFA46AB291DB70EE40DB54
                                                      APIs
                                                      • Sleep.KERNEL32(00000000), ref: 00AF2AC8
                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 00AF2AE1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: GlobalMemorySleepStatus
                                                      • String ID: @
                                                      • API String ID: 2783356886-2766056989
                                                      • Opcode ID: 922fdfe5e37ad1e4c08fce7d504b4b2388abc231e82c1eae9a4717f44150d183
                                                      • Instruction ID: 2082879b3d17b2096268a0232eeb0e053c0b79d56db875d79dfdf97c76c6bcf5
                                                      • Opcode Fuzzy Hash: 922fdfe5e37ad1e4c08fce7d504b4b2388abc231e82c1eae9a4717f44150d183
                                                      • Instruction Fuzzy Hash: D25149B14187859BD320AF15DD86BAFBBE8FF84310F82485DF1D9521A1DF308929CB16
                                                      APIs
                                                        • Part of subcall function 00AE506B: __fread_nolock.LIBCMT ref: 00AE5089
                                                      • _wcscmp.LIBCMT ref: 00B49AAE
                                                      • _wcscmp.LIBCMT ref: 00B49AC1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: _wcscmp$__fread_nolock
                                                      • String ID: FILE
                                                      • API String ID: 4029003684-3121273764
                                                      • Opcode ID: 256946da5479d424fe5ba4cab19d12b4088f0c62082dd4a10dd6338433069638
                                                      • Instruction ID: ddbe1e93ec4ecbc76577c4b40e80adbde957c20130feb9638dd54ff39461483b
                                                      • Opcode Fuzzy Hash: 256946da5479d424fe5ba4cab19d12b4088f0c62082dd4a10dd6338433069638
                                                      • Instruction Fuzzy Hash: 3D41F471A00609BEDF219EA1DC86FEFBBFDDF45714F0000B9F900A7181DA75AA0497A1
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B52892
                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00B528C8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CrackInternet_memset
                                                      • String ID: |
                                                      • API String ID: 1413715105-2343686810
                                                      • Opcode ID: 9b4875ba153317725ee296984fe8983d2ac34013e57a0cbc6a206b562c7901ad
                                                      • Instruction ID: c5f4a409dc829da2c195a203fbf71b3b1b94271aeead000487d0560d3fd6849b
                                                      • Opcode Fuzzy Hash: 9b4875ba153317725ee296984fe8983d2ac34013e57a0cbc6a206b562c7901ad
                                                      • Instruction Fuzzy Hash: DA313D71801119AFCF41DFA1DC85EEEBFB9FF19300F1040A9F815A6265DB315A56DBA0
                                                      APIs
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00B67DD0
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B67DE5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: '
                                                      • API String ID: 3850602802-1997036262
                                                      • Opcode ID: f98cb1c3dd5b4a9c07bbbcd37a6dd52472c767000daafa9a8cd9ee6945d3ab6c
                                                      • Instruction ID: 2a08bb94647ec9140b0e21ce3453db3219ce8087bf4149bd073ec6f34236f4c8
                                                      • Opcode Fuzzy Hash: f98cb1c3dd5b4a9c07bbbcd37a6dd52472c767000daafa9a8cd9ee6945d3ab6c
                                                      • Instruction Fuzzy Hash: 594119B4A452099FDB10CF68D881BEA7BF9FF09304F1045BAE9159B391DB34A941CFA0
                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?,?), ref: 00B66D86
                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00B66DC2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$DestroyMove
                                                      • String ID: static
                                                      • API String ID: 2139405536-2160076837
                                                      • Opcode ID: f5727f451895d95f42c2d66bf10e373e125b3bc8331b3b47edf04c856f3b2ce3
                                                      • Instruction ID: e87b91654631e855bd4825c5aa2c2882d4f7fc3323ba5b9d7472c65446517fab
                                                      • Opcode Fuzzy Hash: f5727f451895d95f42c2d66bf10e373e125b3bc8331b3b47edf04c856f3b2ce3
                                                      • Instruction Fuzzy Hash: 26317C71210604AADB109F68DC80AFB77F9FF48760F109629F9A697190DA75AC91CB60
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B42E00
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B42E3B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: InfoItemMenu_memset
                                                      • String ID: 0
                                                      • API String ID: 2223754486-4108050209
                                                      • Opcode ID: d3427533cad4e81c2216f9944d5f3ab672d8f4c887d8df74e9483ba2a7ebb2db
                                                      • Instruction ID: 9fe83fb8fab37f76b50367cafd4915ab7c2299bbbf1a6cfaec8eff86dc1e98b7
                                                      • Opcode Fuzzy Hash: d3427533cad4e81c2216f9944d5f3ab672d8f4c887d8df74e9483ba2a7ebb2db
                                                      • Instruction Fuzzy Hash: EE31C131A40309ABEB248F58D985BAEBBF9EF05350F5404AAF985971A0E7709B44FB50
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00B669D0
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B669DB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: Combobox
                                                      • API String ID: 3850602802-2096851135
                                                      • Opcode ID: 671cb55c6015d38bfeea34e26626b72b1bbbac11228722a125e78fd1f894bd85
                                                      • Instruction ID: 7f6fc428091b7a5600a94b3a91c83ff440e011d1c99abd2ba8fda6a3755bea01
                                                      • Opcode Fuzzy Hash: 671cb55c6015d38bfeea34e26626b72b1bbbac11228722a125e78fd1f894bd85
                                                      • Instruction Fuzzy Hash: F511C4717002097FEF159F64DC80EBB3BAAEB893A4F110264FD58972E0D6799C518BA0
                                                      APIs
                                                        • Part of subcall function 00AE1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00AE1D73
                                                        • Part of subcall function 00AE1D35: GetStockObject.GDI32(00000011), ref: 00AE1D87
                                                        • Part of subcall function 00AE1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AE1D91
                                                      • GetWindowRect.USER32(00000000,?), ref: 00B66EE0
                                                      • GetSysColor.USER32(00000012), ref: 00B66EFA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                      • String ID: static
                                                      • API String ID: 1983116058-2160076837
                                                      • Opcode ID: aae94415ea6e66fe12c9fba52bac4f5afefc2ba481ffacbf4ecd74d8161678b6
                                                      • Instruction ID: aadbabd5d6da0e13758371033dba13cd84f5d9250ba778b6bb728e915130f3a5
                                                      • Opcode Fuzzy Hash: aae94415ea6e66fe12c9fba52bac4f5afefc2ba481ffacbf4ecd74d8161678b6
                                                      • Instruction Fuzzy Hash: 7A21597261020AAFDB04DFA8DD45AFA7BF8FB08314F004668FD55D3250D679E861DB50
                                                      APIs
                                                      • GetWindowTextLengthW.USER32(00000000), ref: 00B66C11
                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00B66C20
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: LengthMessageSendTextWindow
                                                      • String ID: edit
                                                      • API String ID: 2978978980-2167791130
                                                      • Opcode ID: 895a53f7998769b41c45bacbb7c8f32f664b5db78ef162d5a1edbfc8f7a206e2
                                                      • Instruction ID: 570cf79158325f34edfd7529e8b008eef4851eedf3108bf912e1ca2054c251a8
                                                      • Opcode Fuzzy Hash: 895a53f7998769b41c45bacbb7c8f32f664b5db78ef162d5a1edbfc8f7a206e2
                                                      • Instruction Fuzzy Hash: 11116A71505208ABEB108F64DC82ABA37AAEB15368F244764F961D71E0CA79DC919B60
                                                      APIs
                                                      • _memset.LIBCMT ref: 00B42F11
                                                      • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00B42F30
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: InfoItemMenu_memset
                                                      • String ID: 0
                                                      • API String ID: 2223754486-4108050209
                                                      • Opcode ID: 273289b46692830742115d01fed412ec55924967f182d360a0348a47ff59a5fc
                                                      • Instruction ID: 334fc44396cf795accab6e73ab4fe403e296ff41d6afaab1d27c0a8276e55573
                                                      • Opcode Fuzzy Hash: 273289b46692830742115d01fed412ec55924967f182d360a0348a47ff59a5fc
                                                      • Instruction Fuzzy Hash: 1C11B672901124ABDF21DB98DC84BAD77F9EB15310F9800E5F855A72A0DBB0AF08F791
                                                      APIs
                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00B52520
                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00B52549
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Internet$OpenOption
                                                      • String ID: <local>
                                                      • API String ID: 942729171-4266983199
                                                      • Opcode ID: bbbce9a2b9e3289eee72325cd8b9361daa1bd9d6bc19b3d7c528987c26e54532
                                                      • Instruction ID: 79b9d5fdcebce600d659c904d664c863e1c1d2c05d40a5fc0914849051f3f3b0
                                                      • Opcode Fuzzy Hash: bbbce9a2b9e3289eee72325cd8b9361daa1bd9d6bc19b3d7c528987c26e54532
                                                      • Instruction Fuzzy Hash: 5711E070102225BADB248F519CD9FBBFFE8FB27352F1081EAFE4542140E2706949DAE0
                                                      APIs
                                                        • Part of subcall function 00B5830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00B580C8,?,00000000,?,?), ref: 00B58322
                                                      • inet_addr.WSOCK32(00000000), ref: 00B580CB
                                                      • htons.WSOCK32(00000000), ref: 00B58108
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWidehtonsinet_addr
                                                      • String ID: 255.255.255.255
                                                      • API String ID: 2496851823-2422070025
                                                      • Opcode ID: c95d620326fce9beeef0ccf47fea4870421c67ec61aac0df6244c61ce7dcd0e1
                                                      • Instruction ID: 4c621c1ea0fea3624a5f0893c0b1e5773da116e8c04bfa468d4f4d041022b28f
                                                      • Opcode Fuzzy Hash: c95d620326fce9beeef0ccf47fea4870421c67ec61aac0df6244c61ce7dcd0e1
                                                      • Instruction Fuzzy Hash: 3611A135600245ABDB20AF64DC86FBDB3B4FF04321F2085AAFD11A72D1DE72A819C795
                                                      APIs
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                        • Part of subcall function 00B3B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B3B0E7
                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00B39355
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 372448540-1403004172
                                                      • Opcode ID: cbc75ad07dc99693ee478ec5e2a4758b86fd7adfb0611b35c21fc82703934d86
                                                      • Instruction ID: 7e3bcba3b4d17327d6fc52ec1ddae1a39ff5489aec9575d16c514ca43d47a3c1
                                                      • Opcode Fuzzy Hash: cbc75ad07dc99693ee478ec5e2a4758b86fd7adfb0611b35c21fc82703934d86
                                                      • Instruction Fuzzy Hash: C501B571A45215ABCB04EB65CC91CFE77A9FF46320F240699F932572D1DB715908C650
                                                      APIs
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                        • Part of subcall function 00B3B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B3B0E7
                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00B3924D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 372448540-1403004172
                                                      • Opcode ID: 474dd245255b7b3a9fee5d26dae318c9eb763f810572af9b43ce036b1429c730
                                                      • Instruction ID: 1f5c117b689f76b41f67fb583360d695de1d62f36a8d25890bd9cd0c57d3285c
                                                      • Opcode Fuzzy Hash: 474dd245255b7b3a9fee5d26dae318c9eb763f810572af9b43ce036b1429c730
                                                      • Instruction Fuzzy Hash: ED018F71A412087BCB08EBA4CD96EFFB3E8DF55340F2400A9B91267291EA556E0C96B1
                                                      APIs
                                                        • Part of subcall function 00AE7F41: _memmove.LIBCMT ref: 00AE7F82
                                                        • Part of subcall function 00B3B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00B3B0E7
                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00B392D0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 372448540-1403004172
                                                      • Opcode ID: 4879e2b8bb61a344a218bc9710775802df280255a40efbc9ba5e5ea59b15638c
                                                      • Instruction ID: 96cc6b11af0780454d8571619ba5fffc2e3076f0a4e7e0d0303a09751626b0b9
                                                      • Opcode Fuzzy Hash: 4879e2b8bb61a344a218bc9710775802df280255a40efbc9ba5e5ea59b15638c
                                                      • Instruction Fuzzy Hash: 5E01A271A4120877CF04EAA4CD82EFF77EC9F15340F2401A9B91267292DA615E0C9671
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: ClassName_wcscmp
                                                      • String ID: #32770
                                                      • API String ID: 2292705959-463685578
                                                      • Opcode ID: e57923a28512d69b57fdd99977d6b00f60d979643c794481b5b7b1f448591503
                                                      • Instruction ID: e492041353e4fdbba2a464c05348b55abf9f9247d518ef7037518ec6cf8ef9f2
                                                      • Opcode Fuzzy Hash: e57923a28512d69b57fdd99977d6b00f60d979643c794481b5b7b1f448591503
                                                      • Instruction Fuzzy Hash: 9CE0D17390422D27D7209B95AC49FA7F7ECEB55B71F0001A7FD14D3051D9609E4587E1
                                                      APIs
                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00B381CA
                                                        • Part of subcall function 00B03598: _doexit.LIBCMT ref: 00B035A2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: Message_doexit
                                                      • String ID: AutoIt$Error allocating memory.
                                                      • API String ID: 1993061046-4017498283
                                                      • Opcode ID: 6b29d1f2779bd30752235e1e867bf264159fe8e78396d18f008470c8f2c6593a
                                                      • Instruction ID: 7d8c7fa156a02f907410adc4325da2c0bef817c5162615d7fc485980dfae809f
                                                      • Opcode Fuzzy Hash: 6b29d1f2779bd30752235e1e867bf264159fe8e78396d18f008470c8f2c6593a
                                                      • Instruction Fuzzy Hash: E8D02B323C431832D21532FD6D0BFC539CC8B09F51F0044A6FB48551E38DD5488142ED
                                                      APIs
                                                        • Part of subcall function 00B1B564: _memset.LIBCMT ref: 00B1B571
                                                        • Part of subcall function 00B00B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00B1B540,?,?,?,00AE100A), ref: 00B00B89
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,00AE100A), ref: 00B1B544
                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00AE100A), ref: 00B1B553
                                                      Strings
                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00B1B54E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                      • API String ID: 3158253471-631824599
                                                      • Opcode ID: 96adb746af73d0b8a2eb18eecec5b122b3fc9eb2359d956c44fad6ec30538e79
                                                      • Instruction ID: eeb4c698504525d8501b881fc3eee881b90a41a0d6df7b6da5c541e3e16300e9
                                                      • Opcode Fuzzy Hash: 96adb746af73d0b8a2eb18eecec5b122b3fc9eb2359d956c44fad6ec30538e79
                                                      • Instruction Fuzzy Hash: 69E06DB16103528BD720EF28E414B827BE0EB14705F0489ACE446C36A0DBB8D484CBA1
                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B65BF5
                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00B65C08
                                                        • Part of subcall function 00B454E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00B4555E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1697317501.0000000000AE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AE0000, based on PE: true
                                                      • Associated: 00000000.00000002.1697298078.0000000000AE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B6F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697363119.0000000000B95000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697411789.0000000000B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1697425377.0000000000BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ae0000_SOA NOV.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: a1e60799c2aa156950cb52674a4f56d1717c764798da19ce13e87465eaaf32d4
                                                      • Instruction ID: e0f7930928e1317cba0b2b025edc9d1eb614a62f879d42a09bcf58b791131a06
                                                      • Opcode Fuzzy Hash: a1e60799c2aa156950cb52674a4f56d1717c764798da19ce13e87465eaaf32d4
                                                      • Instruction Fuzzy Hash: A7D0A931388312B7E774AB30BC0BFA32A50AB00B00F000835B306AA1E1CCE85800C240